Rss Feed Like Us on facebook Google Plus
Showing posts with label Innovation. Show all posts
Showing posts with label Innovation. Show all posts

September 9, 2011

5 things to do at the time of Earthquake


The rule of thumb for earth quake protection is simple: "Duck and Cover". In wake of the recent earth quakes,Tech Impulsion has compiled a list of the top 5 essential tips to remember if you witness an earth-quake.

1. DROP & COVER

During an earthquake, the one most important thing to remember is the "DROP and COVER RULE". Simply fall flat on the floor if you're out in the open. If you're indoors, it is extremely important that you maintain being calm and try to take cover under a heavy object like study tables.

2. Stay away from Buildings

If you are outdoors, stay as far away from buildings as possible. Take special precaution from being far away from Glass buildings.

3. Stay away from things that can Fall

Stay away from pretty much anything that you feel could 'Possibly' Fall.
4. Surviving Crowded Areas




If you find yourself in a crowded area, stay calm. Do not attempt to sprint to the nearest exit. More often than not, a greater percentage of lives are lost due to panic situations during an earthquake leading to stampedes. All you need to remember is to take cover under something heavy and stay at a fair distance from anything that could possible fall on you.

5. Aftershocks



Be aware of aftershocks after the initial earthquake has ended. Aftershocks are follow-up earthquakes. They are smaller than the first one, but still are very dangerous.
For those with anxiety problems, here are a few tips that may come in handy. Dealing with difficult people, especially at your work place may prove to be essential in case of a crisis situation.

__________________________________________________________________________________________

Read More

August 18, 2011

Vacation Hotels ready for guests in Space by 2016

Orbiting Hotels in Space
The age of space tourism might be closer than you think. In fact, if you have an extra $1 million lying around, five years from now you could be one of the first off-world adventurers to stay for five days in this orbiting hotel built by Russian company Orbital Technologies


You’ll get there via a Russian Soyuz rocket, taking you about a day to reach the Commercial Space Station 217 miles above the earth. Once you catch up to the orbiting abode, you’ll settle in with your comrades — up to six other space tourists (or researchers) — for an unparalleled adventure, residing in four cabins aboard the space station. 


While you’re traveling at 17,500 miles per hour in low earth orbit, you’ll be pampered with all the spacely amenities you can imagine, such as plenty of gourmet foods, a specially designed sealed shower, your choice of a vertical or horizontal bed (does it really matter in the microgravity of space?), and you might even get to sip some Tang spiked with your favorite vodka (okay, we made that last one up — unfortunately, alcohol will not be available).


Perhaps the best feature of the Commercial Space Station will be its large portholes, which will probably occupy most of your time as you gaze out into the cosmos and down at the earth below. 


We’re just wondering if this trip can really be done for $1 million apiece, when Russia and the U.S. agreed in 2009 on a $51 million price for each Soyuz round trip. No matter what, it’s not going to be cheap. We can only hope there will be many private space ventures in operation during the next decade or two (so far, we’ve counted 9 private sector companies ready to take off into space), creating a competitive environment for such spectacular vacations that could bring the price down to mere stratospheric levels.

Some Snapshots of these hotels:-






 


Read More

August 11, 2011

Think & Innovate like Apple's CEO Steve Jobs

Do you want to think and innovate like Steve Jobs? Well Apple University is the place that you need to be with. This place is the ultimate galore to take lessons of leadership and long term vision that will benefit your organization.

Way back in 2008, Apple University was launched with the sole motive to teach Apple employees on how to think like Steve Jobs and make decisions he would make. The ultimate goal is to teach the executive team the thought process to be the future leaders.
Think like Steve Jobs
Steve Jobs

"Steve Jobs is the person who oversees the whole process surrounding Apple University. Joel Podonly, who was a former Yale professor, is the manager of Apple University. Tim Cook, COO and Apple CEO, and Ron Johnson, senior Vice President is the teachers of Apple University."

According to Forbes, Job is ensuring that his teachings are being collected, curated and preserved so that future generation of Apple's leaders can consult and interpret them.


According to Business Insider, the company prepares case studies of major decisions that Apple executives have made throughout their history, such as why they decided to build Apple retail stores, or focus on having one factory in China manufacture the iPhone, and then they discuss them in class.

These are precious lessons that will shape up the future course of leadership in Apple. And every organization desperately wants to get the format in which apple cultural phenomenon had worked. It has cultivated the tradition of working in a more creative, forward-thinking environment. Their strategy is remarkably common sense more down-to-earth than artsy.

Apple ignores what's going on in the tech industry instead the company develops products by paying strict attention to its audience, high-end consumers. And one of the reasons of their high voltage anticipation of its products is their vaunted secrecy that keeps industry buzzing all the time about its next move. They develop their marketing strategies and executions by listening to their audiences instead of aping the competitor up the street. Moreover, the best things get done by top-down leadership.

Apple also turns down many more ideas than it approves for production. The company believes in the principle of perfection. Apart from its creative arena, it also outsells all other organization as far as the marketing strategies is concerned. Apple is totally a user experience, especially when it comes to serving their customers.

Apple University is not the only educational initiative of Apple. There is also Apple University Consortium, iTunes U and also a special store developed specially for students and educational institutions. Apple University Consortium fosters Apple technologies in universities. It works for about 37 member universities and associate members, including Australian National University, University of Melbourne and University of Queensland. It offers low cost technologies grants and scholarships.

Apple University has been called as solution to Apple after Steve Jobs. And the future of Apple surely lies on Apple University.
Read More

August 5, 2011

Questionnaire of massive cyber attack is dubbed

Cyber Attack
Hackers breached the computer networks of 72 organizations around the world over a five-year period, in the biggest hacking campaign discovered to date, security firm McAfee said on Wednesday.

Here are questions and answers on the attacks, dubbed "Operation Shady RAT" by McAfee, which was bought by Intel Corp earlier this year:

Ques. Who are the victims?
Ans.   They include:
- Governments of Canada, India, South Korea, Taiwan, United States and Vietnam.
- International bodies such as the United Nations, the Association of Southeast Asian Nations (ASEAN), the International Olympic Committee, the World Anti-Doping Agency.
- 12 U.S. defense contractors, 1 U.K. defense contractor.
- Companies in construction, steel, energy, solar power, technology, satellite communications, accounting and media.
- Other groups ranging from a U.S. insurance association to the Nevada county government and think tanks.

McAfee declined to identify many of the victims by name.


Ques. When and how did the attacks take place?
Ans.   McAfee found evidence of security breaches dating back to mid-2006, but said the hacking might have begun well before that. Some of the attacks lasted just a month, others stretched to as many as 28 months.

The hackers sent so-called spear-phishing emails, which are tainted with malicious software, to specific people at the targeted organizations. When the unsuspecting individual clicks on an infected link, it allows intruders to jump on to the machine and use it to infiltrate the computer network.

Ques. What information was stolen?
Ans. McAfee investigators have done their best to guess what was likely stolen, based on interviews with a number of victims. McAfee Vice President of Threat Research Dmitri Alperovitch said the attacker sought data that would give it military, diplomatic and economic advantage.

"If you look at an industry and think about what is most valuable in terms of intellectual property, that is what they were going after," Alperovitch said. As examples, he cited email archives, negotiation documents and schematics for electronics.

Ques. Who did it?
Ans. McAfee's Alperovitch said he believes that a nation state was behind the attacks, but he declined to identify it. He said the attacker is the same country that was behind other security breaches that McAfee has previously investigated.

Jim Lewis, an expert in cyber attacks with the Center for Strategic and International Studies, was briefed by McAfee. Lewis said the presence of Taiwan and the International Olympic Committee in the victims list suggest China is most likely the perpetrator of the attack.

Ques. How valuable is the data that was stolen?
Ans. "This is the biggest transfer of wealth in terms of intellectual property in history," Alperovitch said. "The scale at which this is occurring is really, really frightening."
"Companies and government agencies are getting raped and pillaged every day. They are losing economic advantage and national secrets to unscrupulous competitors," he said.

Ques. How did McAfee learn of these attacks?
Ans. While investigating some attacks against defense contractors, McAfee researchers found a "command and control" server in 2009 used to manage the campaign. In March of this year, they returned to that computer and found logs that revealed all of the attacks.

McAfee is typically unable to discuss its investigations because of non-disclosure agreements. The company was able to discuss Operation Shady RAT because it was not bound by any confidentiality agreements in this case.

Ques. What does the "RAT" in Operation Shady RAT stand for?
Ans. RAT stands for "remote access tool," a type of software that hackers and security professionals often use to access computer networks from afar.

Read More

April 19, 2011

© 2011-2016 Techimpulsion All Rights Reserved.


The content is copyrighted to Tech Impulsion and may not be reproduced on other websites.