Happy, Healthy and Successful Year For Entire Universe

I feel responsibility for:


Stray dogs and all other animals..

I feel responsibility for:



Children and people, who need my help.

and I feel responsibility for:



the planet, where I live.


http://www.youtube.com/watch?v=tUnz4Bu0m9s

I want to see everyday a better world than yesterday. For this aim I'm living.

Sermaye Piyasası Kanunu

30 Aralık 2012 PAZAR
Resmî Gazete
Sayı : 28513
KANUN
SERMAYE PİYASASI KANUNU
Kanun No. 6362 Kabul Tarihi: 6/12/2012
BİRİNCİ KISIM
Genel Hükümler
BİRİNCİ BÖLÜM
Amaç, Kapsam ve Tanımlar
Amaç
MADDE 1 – (1) Bu Kanunun amacı; sermaye piyasasının güvenilir, şeffaf, etkin, istikrarlı, adil ve rekabetçi bir ortamda işleyişinin ve gelişmesinin sağlanması, yatırımcıların hak ve menfaatlerinin korunması için sermaye piyasasının düzenlenmesi ve denetlenmesidir.
Kapsam
MADDE 2 – (1) Sermaye piyasası araçları, bu araçların ihracı, ihraççılar, halka arz edenler, sermaye piyasası faaliyetleri, sermaye piyasası kurumları, borsalar ile sermaye piyasası araçlarının işlem gördüğü diğer teşkilatlanmış piyasalar, piyasa işleticileri, Türkiye Sermaye Piyasaları Birliği, Türkiye Değerleme Uzmanları Birliği, merkezî takas kuruluşları, merkezî saklama kuruluşları, Merkezî Kayıt Kuruluşu ve Sermaye Piyasası Kurulu bu Kanun hükümlerine tabidir. Halka açık olmayan anonim ortaklıkların halka arz edilmeyen pay ihraçları, bu Kanun kapsamı dışındadır.
(2) Bu Kanunda ve bu Kanuna dayanılarak yürürlüğe konulan ikincil mevzuatta hüküm bulunmayan ve diğer kanunlarda bu Kanunun uygulanmayacağının belirtildiği hâllerde genel hükümler uygulanır.

Gümrük ve Ticaret Bakanlığı'ndan Tebliğ

30 Aralık 2012 PAZAR
Resmî Gazete
Sayı : 28513
TEBLİĞ
Gümrük ve Ticaret Bakanlığından:
MÜNFESİH OLMASINA VEYA SAYILMASINA RAĞMEN TASFİYE EDİLMEMİŞ ANONİM VE LİMİTED ŞİRKETLER İLE KOOPERATİFLERİN TASFİYELERİNE VE TİCARET
S
İCİLİ KAYITLARININ SİLİNMESİNE İLİŞKİN TEBLİĞ
Amaç
MADDE 1 (1) Bu Tebliğin amacı; münfesih olmasına veya sayılmasına rağmen tasfiye edilmemiş anonim ve limited şirketler ile kooperatiflerin, ilgili kanunlardaki tasfiye usullerine uyulmaksızın tasfiyelerine ve ticaret sicili kayıtlarının silinmesine ilişkin usul ve esasları düzenlemektir.
Kapsam
MADDE 2 (1) Bu Tebliğ, 29/6/1956 tarihli ve 6762 sayılı mülga Türk Ticaret Kanununda sayılan sebeplerle münfesih olan veya sayılan anonim ve limited şirketleri; 13/1/2011 tarihli ve 6102 sayılı Türk Ticaret Kanununun yürürlük tarihinden itibaren iki yıl içinde münfesih olacak anonim ve limited şirketler ile 24/4/1969 tarihli ve 1163 sayılı Kooperatifler Kanunu uyarınca halen münfesih olan veya 1/7/2014 tarihine kadar münfesih olacak kooperatifleri kapsar.

10 Mind-Blowing Augmented Reality Campaigns

See:
http://www.business2community.com/marketing/10-mind-blowing-augmented-reality-campaigns-0160078

Wired Science’s Top Image Galleries of the Year

Planned Cities Seen From Space

Many of our most popular posts are image galleries, and this year our readers favorite collections included microscope photos, doomsday scenarios, auroras and lots of images of Earth from space.

The satellite image above of Brasilia is part of the most popular post of the year.
Above:


Strange, Beautiful and Unexpected: Planned Cities Seen From Space


I think it's safe to say that our readers like looking at images of Earth from space almost as much as we do. Satellite imagery was the subject of four of Wired Science's 10 most popular galleries of 2012, with this gallery of planned cities topping the list.

See full gallery:
http://www.wired.com/wiredscience/2012/12/most-popular-galleries-of-2012/

Cybersecurity Handbook for Cities and Countries

Quarterly Report of Digital Communities December 2012

See:
http://msisac.cisecurity.org/resources/guides/documents/DC_Mag_Dec12.pdf

Global Agenda 2013

United Nations International Year of Water Cooperation
UN-Water (no irony intended) is focusing on water in its broadest sense: Unesco is supposed to promote “actions at all levels in relevant areas, including education, culture, gender, the sciences, conflict prevention and resolution, as well as ethics, among others.” (For those planning to quote “The Rime of the Ancient Mariner,” it’s “nor any drop to drink.”)
ABU DHABI
World Future Energy Summit, Jan. 15-17
Yes, oil has made Abu Dhabi the richest city on the planet. But the emirate is hedging its bets and also trying to become a global leader in renewable energy, including an intriguing project to build a zero-carbon, zero-waste, car- free, solar-only neighborhood, Masdar City.
CHRISTCHURCH, NEW ZEALAND
World Buskers Festival, Jan. 17-27
A busker, of course, is a street performer, and for the past 19 years the best jugglers, clowns, mimes, living statues, magicians et al. have descended annually on Hagley Park.
WORLDWIDE (sort of)
National Hugging Day, Jan. 21
The Rev. Kevin Zaborney came up with the holiday to address what he saw as a reluctance among Americans to show feelings in public, and it has spread to many unfeeling corners of the world. But do heed this warning from nationalhuggingday.com: “While some encourage hugging everyone, National Hugging Day always suggests at least asking first.” Especially in America, where a lot of people are armed.
WASHINGTON
U.S. Presidential Inauguration, Jan. 21
Didn’t we just have one?
DENMARK
Invasion by the British retail chain Tesco, Jan. 21
This according to the BBC mockumentary Time Trumpet. Jan. 21 will be a very busy day (see above).
DAVOS, SWITZERLAND
World Economic Forum, Jan. 23-27
If you haven’t received an invitation by now, you are not a very important person.
SAPPORO, JAPAN
Sapporo Snow Festival, Feb. 5-11
This is the 64th annual festival, which now draws about two million people to view hundreds of stunning sculptures made of ice and snow.
RIO DE JANEIRO
Carnival, Feb. 9-12
Many Catholic towns and cities hold carnivals on the week before the start of Lent to say farewell to the pleasures of the flesh, but none come anywhere close to Rio’s riotous bacchanalia at the steamy peak of the Southern summer.
NEW ORLEANS
Super Bowl XLVII, Feb. 3
Few sporting events can match the hoopla and hype of the championship game of American football — a sport few outside the U.S. understand (alas!! – ed). XLVII means foreigners can watch only under parental supervision.
VAL DI FIEMME, ITALY
FIS Nordic World Ski Championships, Feb. 20-March 3
“Nordic” refers to the cross-country type of skiing and to all the winners.
HOLLYWOOD
Academy Awards, Feb. 24
If “World War Z” gets one, it’ll be the first zombie movie to get an Oscar. Brad Pitt stars.
LONDON, ONTARIO
World Figure Skating Championships, March 10-17
Not to be confused with the Super Bowl (see above).
THAILAND
Songkran Festival, April 12-15
The traditional Thai New Year, when in addition to various religious and family obligations, people everywhere throw water at each other. It’s in good fun, and it’s at the peak of the hot season.
WORLDWIDE
Earth Day, April 22
Some 20 million people participated in the first Earth Day in 1970, and more than a billion people in 190 countries celebrate it now. Anti-environmentalists point out that it is Lenin’s birth date.
PARIS
French Open at Roland Garros, May 21-June 9
Still the only Grand Slam tennis tournament on clay.
BROCKWORTH, ENGLAND
Cooper’s Hill Cheese-Rolling and Wake, May 27
A Double Gloucester cheese is rolled down the hill and people chase after it. The winner gets the cheese, and everybody retires to a pub. The nearest are The Cross Hands and The Victoria.
VENICE
International Art Exhibition of la Biennale di Venezia, June 1-Nov. 24
Showing in Venice is the premier seal of artistic quality. You can’t buy it here, though, for that you hop the train to...
BASEL
Art Basel, June 13-16
“See it in Venice, buy it in Basel.” Nearly 300 leading galleries and more than 2,500 artists are represented.
BORLANGE, SWEDEN
Peace & Love Festival, June 25-29
For those who missed the Sixties. It’s about nonviolence, equality, diversity, fellowship, solidarity, freedom, understanding — oh yes, and music. Peace & Love is the biggest annual festival in Sweden, which just goes to show.
AMSTERDAM
Keti Koti Festival, July 1
It means “the chains are cut” in Sranan Tongo, the Creole language of Suriname, and Keti Koti celebrates the abolition of slavery in the Netherlands’ former Caribbean colonies of the Dutch West Indies and Suriname with a festival of food, music, dance and ceremony at the Oosterpark. This is the 150th anniversary, so it will be especially festive.
LONDON
Wimbledon, June 24-July 7
Still the only Grand Slam tennis tournament on grass.
KAZAN, RUSSIA
27th Summer Universiade, July 6-17
Also known as the World University Games, these will be a dress rehearsal for Russia’s staging of the Winter Olympics in Sochi in 2014.
PAMPLONA, SPAIN
Running of the Bulls, July 6-14
If you’ve not yet had the ultimate adrenaline rush, do it now, before animal- rights groups succeed in shutting it down. Fifteen people have been killed since 1924, almost all by goring.
 
Source:

Electronic Devices on Planes Are Dangerous Because of F.A.A. Rules

Over the last year, flying with phones and other devices has become increasingly dangerous.
In September, a passenger was arrested in El Paso after refusing to turn off his cellphone as the plane was landing. In October, a man in Chicago was arrested because he used his iPad during takeoff. In November, half a dozen police cars raced across the tarmac at La Guardia Airport in New York, surrounding a plane as if there were a terrorist on board. They arrested a 30-year-old man who had also refused to turn off his phone while on the runway.
Who is to blame in these episodes? You can’t solely condemn the passengers. Some of the responsibility falls on the Federal Aviation Administration, for continuing to uphold a rule that is based on the unproven idea that a phone or tablet can interfere with the operation of a plane.
These conflicts have been going on for several years. In 2010, a 68-year-old man punched a teenager because he didn’t turn off his phone. Lt. Kent Lipple of the Boise Police Department in Idaho, who arrested the puncher, said the man “felt he was protecting the entire plane and its occupants.” And let’s not forget Alec Baldwin, who was kicked off an American Airlines plane in 2011 for playing Words With Friends while parked at the gate.
Dealing with the F.A.A. on this topic is like arguing with a stubborn teenager. The agency has no proof that electronic devices can harm a plane’s avionics, but it still perpetuates such claims, spreading irrational fear among the millions of people who fly within the United States each year — there were 643 million passengers on flights in the year ending in September.
A year ago, when I first asked Les Dorr, a spokesman for the F.A.A., why the rule existed, he said the agency was being cautious because there was no proof that device use was completely safe. He also said it was because passengers needed to pay attention during takeoff.
When I asked why I can read a printed book but not a digital one, the agency changed its reasoning. I was told by another F.A.A. representative that it was because an iPad or Kindle could put out enough electromagnetic emissions to disrupt the flight. Yet a few weeks later, the F.A.A. proudly announced that pilots could now use iPads in the cockpit instead of paper flight manuals.
The F.A.A. then told me that “two iPads are very different than 200.” But tests performed for The New York Times by EMT Labs, an independent testing facility in Mountain View, Calif., indicated that there was no difference in radio output between two iPads and 200. “Electromagnetic energy doesn’t add up like that,” said Kevin Bothmann, the EMT Labs testing manager.
It’s not a matter of a flying device hitting another passenger, either. Kindles weigh less than six ounces; Walter Isaacson’s biography of Steve Jobs weighs 2.1 pounds in hardcover. I’d rather be hit in the head by an iPad Mini than a 650-page book.
In October, after months of pressure from the public and the news media, the F.A.A. finally said it would begin a review of its policies on electronic devices in all phases of flight, including takeoff and landing. But the agency does not have a set time frame for announcing its findings. An F.A.A. spokeswoman told me last week that the agency was preparing to move to the next phase of its work in this area, and would appoint members to a rule-making committee that will begin meeting in January.
The F.A.A. should check out an annual report issued by NASA that compiles cases involving electronic devices on planes. None of those episodes have produced scientific evidence that a device can harm a plane’s operation. Reports of such interference have been purely speculation by pilots about the cause of a problem.
Other government agencies and elected officials are finally getting involved.
This month, Julius Genachowski, chairman of the Federal Communications Commission, sent a letter to the F.A.A. telling the agency that it had a responsibility to “enable greater use of tablets, e-readers and other portable devices” during flights, as they empower people and allow “both large and small businesses to be more productive and efficient, helping drive economic growth and boost U.S. competitiveness.”
A week later, Senator Claire McCaskill, Democrat of Missouri, sent a letter to the F.A.A. noting that the public was “growing increasingly skeptical of prohibitions” on devices on airplanes. She warned that she was “prepared to pursue legislative solutions should progress be made too slowly.”
If there is no progress on this issue, there will eventually be an episode on a plane in which someone is seriously harmed as a result of a device being on during takeoff. But it won’t be because the device is interfering with the plane’s systems. Instead, it will be because one passenger harms another, believing they are protecting the plane from a Kindle, which creates less electromagnetic emissions than a calculator.

Source:
http://bits.blogs.nytimes.com/2012/12/30/f-a-a-rules-make-electronic-devices-on-planes-dangerous/

A Small Ski Break at Kartalkaya/Kaya Palazzo Hotel






Source and for other details:
http://www.kayahotels.com.tr/#!/tr/oteller/kaya-palazzo-skimountain-resort/galeri

NIST Mini-sensor Measures Magnetic Activity in Human Brain

A miniature atom-based magnetic sensor developed by the National Institute of Standards and Technology (NIST) has passed an important research milestone by successfully measuring human brain activity. Experiments reported this week* verify the sensor's potential for biomedical applications such as studying mental processes and advancing the understanding of neurological diseases.
brain sensor
 
 
NIST and German scientists used the NIST sensor to measure alpha waves in the brain associated with a person opening and closing their eyes as well as signals resulting from stimulation of the hand. The measurements were verified by comparing them with signals recorded by a SQUID (superconducting quantum interference device). SQUIDs are the world's most sensitive commercially available magnetometers and are considered the "gold standard" for such experiments. The NIST mini-sensor is slightly less sensitive now but has the potential for comparable performance while offering potential advantages in size, portability and cost.
The study results indicate the NIST mini-sensor may be useful in magnetoencephalography (MEG), a noninvasive procedure that measures the magnetic fields produced by electrical activity in the brain. MEG is used for basic research on perceptual and cognitive processes in healthy subjects as well as screening of visual perception in newborns and mapping brain activity prior to surgery to remove tumors or treat epilepsy. MEG also might be useful in brain-computer interfaces.
MEG currently relies on SQUID arrays mounted in heavy helmet-shaped flasks containing cryogenic coolants because SQUIDs work best at 4 degrees above absolute zero, or minus 269 degrees Celsius. The chip-scale NIST sensor is about the size of a sugar cube and operates at room temperature, so it might enable lightweight and flexible MEG helmets. It also would be less expensive to mass produce than typical atomic magnetometers, which are larger and more difficult to fabricate and assemble.
"We're focusing on making the sensors small, getting them close to the signal source, and making them manufacturable and ultimately low in cost," says NIST co-author Svenja Knappe. "By making an inexpensive system you could have one in every hospital to test for traumatic brain injuries and one for every football team."
The mini-sensor consists of a container of about 100 billion rubidium atoms in a gas, a low-power infrared laser and fiber optics for detecting the light signals that register magnetic field strength—the atoms absorb more light as the magnetic field increases. The sensor has been improved since it was used to measure human heart activity in 2010.** NIST scientists redesigned the heaters that vaporize the atoms and switched to a different type of optical fiber to enhance signal clarity.
The brain experiments were carried out in a magnetically shielded facility at the Physikalisch Technische Bundesanstalt (PTB) in Berlin, Germany, which has an ongoing program in biomagnetic imaging using human subjects. The NIST sensor measured magnetic signals of about 1 picotesla (trillionths of a tesla). For comparison, the Earth's magnetic field is 50 million times stronger (at 50 millionths of a tesla). NIST scientists expect to boost the mini-sensor's performance about tenfold by increasing the amount of light detected. Calculations suggest an enhanced sensor could match the sensitivity of SQUIDS. NIST scientists are also working on a preliminary multi-sensor magnetic imaging system in a prelude to testing clinically relevant applications.
* T.H. Sander, J. Preusser, R. Mhaskar, J. Kitching, L. Trahms and S. Knappe. Magnetoencephalography with a chip-scale atomic magnetometer. Biomedical Optics Express. Vol. 3, Issue 5, pp. 981–990. Published online April 17.
Source:
http://www.nist.gov/pml/div688/brain-041912.cfm

OECD: Your Better Life Index

Better Life Index

The Better Life Index allows citizens to compare well-being across 36 countries based on 11 dimensions in the areas of material living conditions and quality of life. The updated version integrates data on gender and inequality and strengthens existing topics.

See:
http://www.oecdbetterlifeindex.org/

UK.gov: You didn't trust us with your ID, so we gave it to the private sector

2012 review Earlier this year your correspondent was standing tantalisingly close to Matt Smith in the ACTUAL TARDIS - long story, not gonna Facebook it, never gonna tweet it. However, many Brits are happy to noisily ricochet chunks of their private lives across any number of websites and systems, in a year in which the British government has pushed for sweeping online surveillance powers.
The end result of our government's desire to catch these flying bits and bytes of our lives could be more internet-bothering laws. Perhaps the defining moment of this year's campaign was Home Secretary Theresa May's resurrection of NuLabour's shelved Interception Modernisation Programme as the not-exactly-catchy-sounding Communications Capabilities Development Programme. In opposition, the Tories had deeply opposed any such grand snooping plans and argued that civil liberties would be eroded by Labour's National ID-obsessed database state.
But now that the Conservative Party is the senior partner in the ruling coalition, the mood has changed: May was accused of pandering to the needs and desires of MI5, while many of her Cabinet colleagues continued to toil away at their own pet projects involving the online world.
May has pushed - at times incoherently - for surveillance of the internet by spooks and police to be massively beefed up in the UK while being careful to insist that no "central database" would be built. Instead, the Home Sec wants to transfer the burden of storing such sensitive data onto ISPs, who under the proposed law would be required to retain subscriber information, usage and traffic data for 12 months.
Indeed, much of this offloading of data-hoarding responsibility to the private sector has been in play for some time now - even as junior coalition partner the Liberal Democrats watched from the sidelines chewing on their lips before occasionally wading in with a suggestion that "we perhaps need to rethink that one".
Deputy Prime Minister Nick Clegg certainly showed his mettle by forcing May to introduce a draft communications data bill so it could be appropriately prodded at by MPs and peers. That climbdown happened and, after many months of trying to untangle the planned legislative overhaul, the Home Affairs Select Committee concluded that the bill - in its current form - was "too sweeping", "misleading" and "suspicious".
In response, Clegg said the Home Sec needed to go back to the drawing board. May kind of agreed, but said she'll be back fighting fit in 2013 ready to wipe the floor with her critics who oppose her beloved web snooping bill that will apparently eradicate terrorism and pedophilia.
Her department, steered on this issue by Director of the Office for Security and Counter Terrorism Charles Farr, now has to discuss properly with internet players about the technical aspects and the "fanciful" £1.8bn 10-year cost figures of the bill.
It means that pushing such a law through this Parliament - which ends in 2015 - has hit something of a roadblock. That said, the committee of MPs and peers who examined the proposed law all recognised that legislation is needed as long as it is measured and proportionate.
Microsoft and Google were among the tech giants quizzed by the panel, which is chaired by Lord Blencathra. Their evidence submitted to the committee underlined the frustration expressed privately to your correspondent about how little the industry was involved in working out how the proposed network-snooping law would work, if at all.
Microsoft's EU policy wonk Stephen Collins said he failed to get many answers out of the Home Office, while Google's UK public policy boss Sarah Hunter said the search giant was unable to even consult with May's department ahead of a closed committee hearing on 6 September.
Collins had told the committee that it appeared that spooks were clueless on the types of data they needed access to. He said:
[F]or me there is a danger that we are trying to address a capability gap when there is a lack of capability of understanding among law enforcement agencies of 21st century technologies and the data sets that are generated and how they can be accessed and used for investigations... I do not know what the solution is to bridge that capability gap, but it is like a sledgehammer to crack a nut to try to introduce primary legislation on the basis of a supposed information gap that really does not exist.
The draft bill called on ISPs to retain communications data by logging every website visit, as well as any access made by its customers to email accounts, Facebook and difficult-to-tap tech such as peer-to-peer communications and Skype. However, Hunter warned the committee of how “complex” and “expensive” the securing of user data on a massive scale would be.
She said:
Our company runs search, and in engineering terms it genuinely is rocket science. So the more you protect, the more you require a communication service provider to store, the more you have to be able to search through it. That is very difficult. At Google, we employ, I think, 250 engineers just to protect data overlaps. This is not something that should be taken lightly.
Had May's proposed law passed through the Lords and Commons unchallenged, then one of the biggest areas of concern would have been how access to such data might have been controlled. The UK government has a long and poor record on data protection, which underlines only too well the fallibility of civil servants and police officers who are required to protect and safeguard sensitive information they retain and process. But they don't always manage to, especially when staffing numbers are short and resources are squeezed.

Source and Full Text:
http://www.theregister.co.uk/2012/12/29/fiveash_year_in_review/

Big Data's International Influence

Can simple text messages alert a team halfway around the world that there may be a disease outbreak in the remote Sub-Saharan region? Could mobile payments help predict a possible coming food shortage?

While analysis of big data is nothing new for private companies and the government, the nonprofit sector's introduction to that technology and data could play a crucial role in many international development initiatives.

Earlier this year, the World Economic Forum released a report on its many uses in the international community earlier this year entitled, "Big Data, Big Impact: New Possibilities for International Development." The report detailed how policy-makers, corporate leaders and development experts are just now realizing the potential applications for large amounts of data created by individuals who use GPS, social media, and mobile phones. Sources such as online or mobile financial transactions, social media traffic and GPS coordinates now generate over 2.5 quintillion bytes of so-called "big data" every day, and the growth of mobile data traffic in emerging markets is expected to double each year through 2015, according to the report. Plus, it's easier to link mobile-generated data to individuals.

It was mobile data that alerted researchers to potential health problems in the wake of Haiti's devastating 2010 earthquake. Researchers at the Karolinska Institute and Columbia University used mobile data patterns to understand the movement of refugees and the consequent health risks posed by these movements. By tracking the movement of nearly two million SIM cards, data was obtained on the outflow of people from Port-au-Prince following the earthquake. The researchers were able to analyze the destinations of over 600,000 people displaced from the city, and they made this information available to government and humanitarian organizations dealing with the crisis.

Big data and social media are used to spot food shortages around the world. Global Pulse, a United Nation's initiative to develop methods of harnessing data for public policy, found very strong correlations with food price inflation while researching the amount of food-related conversations on Twitter. "This information comes from two brand new sources: what people are doing and what they are saying," said Robert Kirkpatrick, director of Global Pulse. "As a government or aid agency, you might know that food prices are rising or rains aren't coming, but what if you could see where and how people are already changing their behavior and priorities where you put resources in response?"

However, as analysis and research with massive amounts of data has come into vogue, a major shortage of data-savvy talent is quickly becoming apparent. The McKinsey Global Institute estimates there will be an annual shortage of 140,000 to 190,000 graduates in deep analytical fields by 2018 in the United States alone. It is likely shortages in this field will be even more challenging in the social sector, which typically pays less than other industries.

"There's a deficiency," said Chris Wilson, vice president and counsel for TechAmerica and also staff director of the group's Big Data Commission. "There is a need for people with those types of degrees and multidisciplinary skills. There is certainly a need to be filled."

In the end, sharing and open participation by all sectors may be needed for big data to realize its full potential on the international front. "Development organizations can continue supporting governments and demonstrating both the public good and the business value that data philanthropy can deliver," the World Economic Forum report says. "And the private sector can move faster to create mechanisms for the sharing of data that can benefit the public. Despite the challenges and risks, the opportunities available to better serve individuals in emerging markets should outweigh these risks."

Source:
http://www.theatlantic.com/sponsored/thinking-big-data/archive/2012/12/big-datas-international-influence/265870/

Statistical Approaches for Wind Resource Assessment


Abstract

We describe and evaluate a set of computational intelligence techniques for long-term wind resource assessment. Short term sensor measurements at a potential wind farm site are correlated with pub-licly available wind data sources in close spatial proximity in order to extrapolate long-term predictions for the site. This general approach to assessment is called \MCP": Measure, Correlate and Predict. Our tech-niques are based upon statistical inference. They aim to address accurately correlating inexpensive but noisy, short term measurements at the site. Each technique relies upon estimating the joint distribution of wind speeds at the site and the publicly available neighbouring sources. For a site at the Boston Museum of Science when the availability of site data varies between 3, 6 and 8 months, we find that copula modeling is robust to data availability and consistently best overall.
Authors: Kalyan Veeramachaneni, Xiang Ye, and Una-May O'Reilly

Source: and Full Article:
http://groups.csail.mit.edu/EVO-DesignOpt/groupWebSite/uploads/Site/WRE-Chapter.pdf

One Piece at a Time: This Brit Is Building an F1 Car in His Backyard—Can You Help?

One Piece at a Time: This Brit Is Building an F1 Car in His Backyard—Can You Help?

Dumpster diving yields better results when it’s done in the correct dumpster. Kevin Thomas, a regular bloke living near Brighton, England, is surrounded by fantastic dumpsters. In his garden shed, Thomas is slowly putting together his own Formula 1 car based on parts from a 2001 British American Racing 003. The idea came to him after seeing an F1 car in a Renault showroom. Not long after, he saw an F1 tub listed on eBay. The auction ended with no bidders, so he sent the lister an e-mail. It worked. Thomas told Racecar Engineering magazine: “[The seller] turned up on my doorstep with a Reynard BAR  01 and a BAR 003. I paid him cash for the pair.”


Thomas isn’t an engineer; his expertise is merely that of a hard-core fan’s. But with two tubs in hand, he decided he had to put one on the track. He needed only an appropriate drivetrain, suspension, seat, and, well, everything else that makes up a modern Formula 1 car. Resources were—and remain—scarce. He says: “It quickly became clear that it was very difficult, or even impossible, to get the right parts. I have to use what I can get.” He trades among a community of  F1 parts collectors, and he checks eBay every day. His shed is filled with F1 components, and he says making them fit has been part of the fun. His sidepods, for example, are from a later Williams-BMW. He learned to work with carbon fiber, chopped up the pods, and modified them to fit with a BAR engine cover. This resourcefulness has served him well: His total outlay has been only about $13,000, and from the look of it, you’d think he had a complete car.
He doesn’t. He’s still short a drivetrain—among other things—and a 600-plus-hp 3.0-liter V-10 like the one that first powered the BAR is unlikely to show up on eBay. “I’ll probably go for a Formula Renault 3.5-liter engine,” Thomas says. “That will be plenty fast enough to scare the living daylights out of me.” Even a well-sorted Formula 1 car can be a nasty beast. One built from pieces scavenged from various sources and cobbled together in a shed on a shoestring will likely be downright evil. But that’s not the point. It’s the construction of the car—the sheer lunacy and joy of making diverse parts come together and work as one—that counts.
You can help! If you think you (seriously) can get Kevin Thomas what he needs—or know someone who can—e-mail us at editors@caranddriver.com and we’ll put you in touch.

Source:
http://blog.caranddriver.com/one-piece-at-a-time-this-brit-is-building-an-f1-car-in-his-backyard-can-you-help/

Senate Approves Warrantless Electronic Spy Powers

The Senate on Friday reauthorized for five years broad electronic eavesdropping powers that legalized and expanded the President George W. Bush administration’s warrantless wiretapping program.

The FISA Amendments Act, (.pdf) which was expiring Monday at midnight, allows the government to electronically eavesdrop on Americans’ phone calls and e-mails without a probable-cause warrant so long as one of the parties to the communication is believed outside the United States. The communications may be intercepted “to acquire foreign intelligence information.”

The House approved the measure in September. President Barack Obama, who said the spy powers were a national security priority, is expected to quickly sign the package before the law Congress codified in 2008 expires in the coming days. Over the past two days, the Senate debated and voted down a handful of amendments in what was seen as largely political theater to get Sen. Ron Wyden (D-Oregon) to lift a procedural hold on the FISA Amendments Act legislation that barred lawmakers from voting on the package.

In the end, the identical package the House passed 301-118 swept through the Senate on a 73-23 vote.

The American Civil Liberties Union immediately blasted the vote.

“The Bush administration’s program of warrantless wiretapping, once considered a radical threat to the Fourth Amendment, has become institutionalized for another five years,” said Michelle Richardson, the ACLU’s legislative counsel.

Amendments senators refused to enact included extending the measure for just three years, another one requiring the government to account for how many times Americans’ communications have been intercepted, and one by Wyden prohibiting U.S. spy agencies from reviewing the communications of Americans ensnared in the program.

“The amendment I fought to include would have helped bring the constitutional principles of security and liberty back into balance and intend to work with my colleagues to see that the liberties of individual Americans are maintained,” Wyden said immediately after the vote.

The legislation does not require the government to identify the target or facility to be monitored. It can begin surveillance a week before making the request, and the surveillance can continue during the appeals process if, in a rare case, the secret FISA court rejects the surveillance application. The court’s rulings are not public.

The government has also interpreted the law to mean that as long as the real target is al-Qaeda, the government can wiretap purely domestic e-mails and phone calls without getting a warrant from a judge. That’s according to David Kris, a former top anti-terrorism attorney at the Justice Department.

In short, Kris said the FISA Amendments Act gives the government nearly carte blanche spying powers.

Kris, who headed the Justice Department’s National Security Division between 2009 and 20011, writes in the revised 2012 edition of National Security Investigations and Prosecutions:

For example, an authorization targeting ‘al Qaeda’ — which is a non-U.S. person located abroad—could allow the government to wiretap any telephone that it believes will yield information from or about al Qaeda, either because the telephone is registered to a person whom the government believes is affiliated with al Qaeda, or because the government believes that the person communicates with others who are affiliated with al Qaeda, regardless of the location of the telephone.

The National Security Agency told lawmakers that it would be a violation of Americans’ privacy to disclose how the measure is being used in practice.

After Obama signs the legislation Friday, the spy powers won’t expire until December 31, 2017.

The law is the subject of a Supreme Court challenge. The Obama administration argues that the American Civil Liberties Union and a host of other groups suing don’t have the legal standing to even bring a challenge.

A federal judge agreed, ruling the ACLU, Amnesty International, Global Fund for Women, Global Rights, Human Rights Watch, International Criminal Defence Attorneys Association, The Nation magazine, PEN American Center, Service Employees International Union and other plaintiffs did not have standing to bring the case because they could not demonstrate that they were subject to the warrantless eavesdropping.

The groups appealed to the 2nd U.S. Circuit Court of Appeals, arguing that they often work with overseas dissidents who might be targets of the National Security Agency program. Instead of speaking with those people on the phone or through e-mails, the groups asserted that they have had to make expensive overseas trips in a bid to maintain attorney-client confidentiality. The plaintiffs, some of them journalists, also claim the 2008 legislation chills their speech, and violates their Fourth Amendment privacy rights.

Without ruling on the merits of the case, the appeals court agreed with the plaintiffs last year that they have ample reason to fear the surveillance program, and thus have legal standing to pursue their claim.

The case, argued last month, is pending an opinion from the Supreme Court.
 
Source:

Türkiye'de İnternet

İnternet Geliştirme Kurulu Başkanı Serhat Özeren ile Bloomberg TV'de Türkiye'de internetin gelişimi, İnternet Gelişitrme Kurulunun faaliyetleri, online reklamcılık, güvenli internet, internet bağlantı ücretleri, e-sağlık gibi birçok farklı konuyu kapsayan haber programını aşağıdaki linkten izleyebilirsiniz:

Source:
http://tvarsivi.com/internet-gelistirme-kurulu-baskani-serhat-ozeren-ve-internet-gelistirme-kurulu-uyesi-leyla-keser-ber-26-12-2012-izle-i_2012120741815.html

A biplane to break the sound barrier

Cheaper, quieter and fuel-efficient biplanes could put supersonic travel on the horizon.

For 27 years, the Concorde provided its passengers with a rare luxury: time saved. For a pricey fare, the sleek supersonic jet ferried its ticketholders from New York to Paris in a mere three-and-a-half hours — just enough time for a nap and an aperitif. Over the years, expensive tickets, high fuel costs, limited seating and noise disruption from the jet’s sonic boom slowed interest and ticket sales. On Nov. 26, 2003, the Concorde — and commercial supersonic travel — retired from service.

Since then, a number of groups have been working on designs for the next generation of supersonic jets. Now an MIT researcher has come up with a concept that may solve many of the problems that grounded the Concorde. Qiqi Wang, an assistant professor of aeronautics and astronautics, says the solution, in principle, is simple: Instead of flying with one wing to a side, why not two?

Wang and his colleagues Rui Hu, a postdoc in the Department of Aeronautics and Astronautics, and Antony Jameson, a professor of engineering at Stanford University, have shown through a computer model that a modified biplane can, in fact, produce significantly less drag than a conventional single-wing aircraft at supersonic cruise speeds. The group will publish their results in the Journal of Aircraft.

This decreased drag, according to Wang, means the plane would require less fuel to fly. It also means the plane would produce less of a sonic boom.

“The sonic boom is really the shock waves created by the supersonic airplanes, propagated to the ground,” Wang says. “It’s like hearing gunfire. It’s so annoying that supersonic jets were not allowed to fly over land.”

Double the wings, double the fun

With Wang’s design, a jet with two wings — one positioned above the other — would cancel out the shock waves produced from either wing alone. Wang credits German engineer Adolf Busemann for the original concept. In the 1950s, Busemann came up with a biplane design that essentially eliminates shock waves at supersonic speeds.

Normally, as a conventional jet nears the speed of sound, air starts to compress at the front and back of the jet. As the plane reaches and surpasses the speed of sound, or Mach 1, the sudden increase in air pressure creates two huge shock waves that radiate out at both ends of the plane, producing a sonic boom.

Through calculations, Busemann found that a biplane design could essentially do away with shock waves. Each wing of the design, when seen from the side, is shaped like a flattened triangle, with the top and bottom wings pointing toward each other. The configuration, according to his calculations, cancels out shock waves produced by each wing alone.

However, the design lacks lift: The two wings create a very narrow channel through which only a limited amount of air can flow. When transitioning to supersonic speeds, the channel, Wang says, could essentially “choke,” creating incredible drag. While the design could work beautifully at supersonic speeds, it can’t overcome the drag to reach those speeds.

Giving lift to a grounded theory

To address the drag issue, Wang, Hu and Jameson designed a computer model to simulate the performance of Busemann’s biplane at various speeds. At a given speed, the model determined the optimal wing shape to minimize drag. The researchers then aggregated the results from a dozen different speeds and 700 wing configurations to come up with an optimal shape for each wing.

They found that smoothing out the inner surface of each wing slightly created a wider channel through which air could flow. The researchers also found that by bumping out the top edge of the higher wing, and the bottom edge of the lower wing, the conceptual plane was able to fly at supersonic speeds, with half the drag of conventional supersonic jets such as the Concorde. Wang says this kind of performance could potentially cut the amount of fuel required to fly the plane by more than half.

“If you think about it, when you take off, not only do you have to carry the passengers, but also the fuel, and if you can reduce the fuel burn, you can reduce how much fuel you need to carry, which in turn reduces the size of the structure you need to carry the fuel,” Wang says. “It’s kind of a chain reaction.”

The team’s next step is to design a three-dimensional model to account for other factors affecting flight. While the MIT researchers are looking for a single optimal design for supersonic flight, Wang points out that a group in Japan has made progress in designing a Busemann-like biplane with moving parts: The wings would essentially change shape in mid-flight to attain supersonic speeds.

“Now people are having more ideas on how to improve [Busemann’s] design,” Wang says. “This may lead to a dramatic improvement, and there may be a boom in the field in the coming years.”

“There are many challenges in designing realistic supersonic aircraft, such as high drag, efficient engines and low sonic-boom signature,” says Karthik Duraisamy, assistant professor of aeronautics and astronautics at Stanford University, who was not involved in the research. “Dr. Wang’s paper presents an important first step towards reducing drag, and there is also potential to address structural issues.”

Source:
http://web.mit.edu/newsoffice/2012/supersonic-biplane-0319.html

Elcomsoft Forensic Disk Decryptor

Forensic Access to Encrypted BitLocker, PGP and TrueCrypt Disks and Containers

Elcomsoft Forensic Disk Decryptor

Perform the complete forensic analysis of encrypted disks and volumes protected with desktop and portable versions of BitLocker, PGP and TrueCrypt. Elcomsoft Forensic Disk Decryptor allows decrypting data from encrypted containers or mounting encrypted volumes, providing full forensic access to protected information stored in the three most popular types of crypto containers. Access to encrypted information is provided in real-time.

Features and Benefits


  • Decrypts information stored in three most popular crypto containers
  • Mounts encrypted BitLocker, PGP and TrueCrypt volumes
  • Supports removable media encrypted with BitLocker To Go
  • Supports both encrypted containers and full disk encryption
  • Acquires protection keys from RAM dumps, hibernation files
  • Extracts all the keys from a memory dump at once if there is more than one crypto container in the system
  • Fast acquisition (limited only by disk read speeds)
  • Zero-footprint operation leaves no traces and requires no modifications to encrypted volume contents
  • Recovers and stores original encryption keys
  • Supports all 32-bit and 64-bit versions of Windows

Access Information Stored in Popular Crypto Containers


ElcomSoft offers investigators a fast, easy way to access encrypted information stored in crypto containers created by BitLocker, PGP and TrueCrypt.

Two Access Modes*


Access is provided by either decrypting the entire content of an encrypted volume or by mounting the volume as a drive letter in unlocked, unencrypted mode.

Complete Decryption


In complete decryption mode, Elcomsoft Forensic Disk Decryptor will automatically decrypt the entire content of the encrypted container, providing investigators with full, unrestricted access to absolutely all information stored on encrypted volumes.

Real-Time Access to Encrypted Information


In real-time mode, Elcomsoft Forensic Disk Decryptor mounts the encrypted volume as a new drive letter on the investigator’s PC. In this mode, forensic specialists enjoy fast, real-time access to protected information. Information read from mounted disks and volumes is decrypted on-the-fly in real time.

* Another program Elcomsoft Distributed Password Recovery allows attacking plain-text passwords protecting the encrypted containers with a range of advanced attacks including dictionary, mask and permutation attacks in addition to brute-force.

Zero Footprint Operation


ElcomSoft offers a forensically sound solution. The tool provides true zero-footprint operation, leaving no traces and making no changes to the contents of encrypted volumes.

Three Ways to Acquire Encryption Keys


Elcomsoft Forensic Disk Decryptor needs the original encryption keys in order to access protected information stored in crypto containers. The encryption keys can be derived from hibernation files or memory dump files acquired while the encrypted volume was mounted. There are three ways available to acquire the original encryption keys:

  • By analyzing the hibernation file (if the PC being analyzed is turned off);
  • By analyzing a memory dump file *
  • By performing a FireWire attack ** (PC being analyzed must be running with encrypted volumes mounted).

* A memory dump of a running PC can be acquired with one of the readily available forensic tools such as MoonSols Windows Memory Toolkit
** A free tool launched on investigator’s PC is required to perform the FireWire attack (e.g. Inception)

Acquiring Encryption Keys


Generally, the choice of one of the three attacks depends on the running state of the PC being analyzed. It also depends on whether or not installation of a forensic tool is possible on a PC under investigation.

If the PC being investigated is turned off, the encryption keys can be retrieved from the hibernation file. The encrypted volume must be mounted before the computer went to sleep. If the volume is dismounted before hibernation, the encryption keys may not be derived from the hibernation file.

If the PC is turned on, a memory dump can be taken with any forensic tool if installation of such tool is permitted (e.g. the PC is unlocked and logged-in account has administrative privileges). The encrypted volume must be mounted at the time of memory dump acquisition. Good description of this technology (and complete list of free and commercial memory acquisition tools) is available at http://www.forensicswiki.org/wiki/Tools:Memory_Imaging.

Finally, if the PC being investigated is turned on but installing forensic tools is not possible (e.g. the PC is locked or logged-in account lacks administrative privileges), a remote attack via a FireWire port can be performed in order to obtain a memory dump. This attack requires the use of a free third-party tool (such as Inception: http://www.breaknenter.org/projects/inception/), and offers near 100% results due to the implementation of FireWire protocol that enables direct memory access. Both the target PC and the computer used for acquisition must have FireWire (IEEE 1394) ports.

Once the original encryption keys are acquired, Elcomsoft Forensic Disk Decryptor stores the keys for future access, and offers an option to either decrypt the entire content of encrypted container or mount the protected disk as another drive letter for real-time access.

Supported Disk Encryption Tools


Elcomsoft Forensic Disk Decryptor works with encrypted volumes created by current versions of BitLocker, PGP and TrueCrypt, including removable and flash storage media encrypted with BitLocker To Go. Supports PGP encrypted containers and full disk encryption.

Compatibility


Elcomsoft Forensic Disk Decryptor runs in all 32-bit and 64-bit editions of Windows XP, Vista, Windows 7, 2003 and 2008 Server.

Source:
http://www.elcomsoft.com/efdd.html

Fıkra Gibi Call Center Açılışı :)

Kars Belediyesi çağrı merkezinin açılışını Ulaştırma, Denizcilik ve Haberleşme Bakanı Binali Yıldırım yaptı. Bakan Yıldırım, ilk telefona da kendisi cevap verdi.
Çağrı merkezinde telefona bakan, Ulaştırma Bakanı Binali Yıldırım olunca ortaya ilginç diyaloglar çıktı.

Hattın diğer ucundaki vatandaş, konuştuğu kişinin bakan olduğuna bir türlü inanmadı.
 
'BÖYLE AKICI GÜZEL KONUŞAN BİR BAYAN YOK MU?'
Telefonu kadın görevliye veren Bakan Yıldırım, yaşanan diyaloğu gülerek anlattı.
Yıldırım, telefondaki vatandaşın kendisine ''Kardeşim ne yorgun yorgun konuşuyorsun yokuşa saran kamyonlar gibi... Böyle akıcı güzel konuşan bir bayan yok mu? Bula bula seni mi buldular'' dediğini söyledi.
Bakan Yıldırım'ın anlattıkları salondakileri de güldürdü. Yıldırım gülerek, ''Yemediğimiz laf kalmadı'' dedi.
Source and Video:

2013 IEEE Symposium on Computational Intelligence in healthcare and e-health (IEEE CICARE 2013)

15-19 April, 2013 Singapore


IEEE CICARE 2013 is the first Symposium of its kind, and will bring together leading research and clinical scientists, engineers, practitioners, technology and solution providers in healthcare and e-health from around the world to discuss latest advances in the field of computational intelligence applied to solving the growing scale and complexity of problems in these inter-disciplinary domains. This symposium will provide a forum for the presentation of recent results in the theory and practice of computational intelligence in healthcare and e-health systems and services, and there will also be Panel discussions to outline future research directions and challenges.

IEEE CICARE 2013 is being held as part of the IEEE Symposium Series on Computational Intelligence (SSCI’2013), Singapore, 15-19 April 2013. IEEE SSCI 2013 is one of the two flagship biennial international events sponsored by the IEEE Computational Intelligence Society (IEEE CIS) promoting all aspects of the theory and applications of computational intelligence. The IEEE SSCI co-locates several technical meetings at one location. This event attracts top researchers, professionals, and students from around the world. More details on: http://www.ntu.edu.sg/home/epnsugan/index_files/SSCI2013/ 
 
IEEE CICARE 2013 related topics include but are not limited to:
· Ontology Driven Knowledge Management
· Decision Support Systems
· Telemedicine
· Medical research using Grids
· Interoperability
· Medical and Nursing Informatics
· Confidentiality and Data Security
· Wearable Health Informatics
· Semantic Interoperability
· Therapeutic Systems and Technologies
· Cognitive Informatics
· Affective Computing
· Human-Machine Interfaces
· ICT, Ageing and Disability
· Design and development methodologies for Healthcare IT
· Mobile technologies for Healthcare applications (m-Health)
· Evaluation and use of Healthcare IT
· Health Knowledge Management
· Healthcare Management and Information Systems
· Electronic Health Records and Standards
· Software Systems in Medicine
· Pervasive Health Systems and Services
· Clinical problems and applications
· Data Mining and Visualization
· Consumer Health Informatics
· Virtual Healthcare Teams
· Pattern recognition and Machine Learning
· Practice-based Research Methods for Healthcare Informatics/IT
· e-Health for Public Health
· Integrating genetics with e-health
 
    Source and Details: