Immagine
 Trilingual World Observatory: italiano, english, română. GLOBAL NEWS & more... di Redazione
   
 
Di seguito tutti gli interventi pubblicati sul sito, in ordine cronologico.
 
 

Simulating these fluffy puffs of water vapor is so computationally complex that even today's most powerful supercomputers, working at quadrillions of calculations per second, cannot accurately model them.

"Clouds modulate the climate. They reflect some sunlight back into space, which cools the Earth; but they can also act as a blanket and trap heat," says Michael Wehner, a climate scientist at the Lawrence Berkeley National Laboratory (Berkeley Lab). "Getting their effect on the climate system correct is critical to increasing confidence in projections of future climate change."

In order to build the break-through supercomputers scientists like Wehner need, researchers are looking to the world of consumer electronics like microwave ovens, cameras and cellphones, where everything from chips to batteries to software is optimized to the device's application. This co-design approach brings scientists and computer engineers into the supercomputer design process, so that systems are purpose-built for a scientific application, such as climate modeling, from the bottom up.

"Co-design allows us to design computers to answer specific questions, rather than limit our questions by available machines," says Wehner.

Co-design Test Case: Clouds

In a paper entitled "Hardware/Software Co-design of Global Cloud System Resolving Models," recently published in Advances in Modeling Earth Systems, Shalf, Wehner and coauthors argue that the scientific supercomputing community should take a cue from consumer electronics like smart phones and microwave ovens: Start with an application—like a climate model—and use that as a metric for successful hardware and software design.

The paper which uses the climate community's global cloud resolving models (GCRMs) as a case-study argues that an aggressive co-design approach to scientific computing could increase code efficiency and enable chip designers to optimize the trade-offs between energy efficiency, cost and application performance.

According to coauthor David Donofrio, a co-designed system for modeling climate would contain about 20 million cores (today's most powerful scientific cluster, Japan's 'K Computer' contains about 705,000 cores) and be capable of modeling climate 1,000 times faster than what is currently possible.

"Most importantly, the system would remain fully programmable so that scientific codes with similar hardware needs to the GCRMs, like seismic exploration, could also benefit from this machine," says Donofrio, a computer scientist at Berkeley Lab.

"Today when we purchase a general purpose supercomputer, it comes with a lot of operating system functions that science applications don't need. When you are worried about power, these codes can be very costly," says Shalf. "Instead of repurposing a chip designed for another market, the scientific HPC (high performance computing) community should specify what they want on a chip—the intellectual property (IP)—and only buy that.'"

According to Shalf, a co-designed system for modeling climate would use about one quarter to one tenth the energy required for a conventional supercomputer with the same capabilities.

Consumers Pave the Way for Next Generation Supercomputers

Although innovative for scientific supercomputing, the idea of application-driven design is not new. Electronics like cell-phones and toaster ovens are built of simpler embedded processor cores optimized for one or a few dedicated functions.

"Because the ultimate goal of the embedded market is to maximize battery life, these technologies have always been driven by maximizing performance-per-watt and minimizing cost. Application-driven design is the key to accomplishing this," says Shalf. "Today we look at the motherboard as a canvas for building a supercomputer, but in the embedded market the canvas is the chip."

He notes that the most expensive part of developing a computer chip is designing and validating all of the IP blocks that are placed on the chip. These IP blocks serve different functions, and in the embedded market vendors profit by licensing them out to various product makers. With an application in mind, manufacturers purchase IP block licenses and then work with a system integrator to assemble the different pieces on a chip.

"You can think of these IP blocks as Legos or components of a home entertainment system," says Donofrio. "Each block has a purpose, you can buy them separately, and connect them to achieve a desired result, like surround sound in your living room."

"The expensive part is designing and verifying the IP blocks, and not the cost of the chip. These IP blocks are commodities because the development costs are amortized across the many different licenses for different applications," says Shalf. "Just as the consumer electronics chip designers choose a set of processor characteristics appropriate to the device at hand, HPC designers should also be able to chose processor characteristics appropriate to a specific application or set of applications, like the climate community's global cloud resolving model."

He notes that the resulting machine, while remaining fully programmable, would achieve maximum performance on the targeted set of applications, which were used as the benchmarks in the co-design process. In this sense, Shalf notes that the co-designed machine is less general purpose than the typical supercomputer of today, but much of what is included in modern supercomputers is of little use to scientific computing anyway and so it just wastes power.

"Before this work, if someone asked me when the climate community would be able to compute kilometer scale climate simulations, I would have answered 'not in my lifetime,'" says Wehner. "Now, with this roadmap I think we could be resolving cloud systems within the next decade."

Although climate was the focus of this paper, Shalf notes that future co-design studies will explore whether this will also be cost-effective for other compute intensive sciences such as combustion research.

Source: PhysOrg - via ZeitNews

Articolo (p)Link Commenti Commenti (0)  Storico Storico  Stampa Stampa
 

... CONTINUES.

A New Form of Architecture

In 1948, the geodesic dome was far from the amazingly sophisticated structure it would become only a few years later.  In fact, it consisted primarily of Bucky's idea and an enormous pile of calculations he had formulated.

Although Fuller was developing and studying the geodesic dome using small models, he was eager to expand his understanding through the construction of larger, more-practical projects.  Thus, when he was invited to participate in the summer institute of the somewhat notorious Black Mountain College in the remote hills of North Carolina near Asheville, Fuller eagerly accepted.  He had lectured at that rather unorthodox institution the previous year and had been so popular that he was asked back for the entire summer of 1948.

When he was not delivering lengthy thinking-out-loud lectures that summer, Fuller's primary concern was furthering an entirely new form of architecture. In his examination of traditional construction, he had discovered that most buildings focused on right-angle, squared configurations.

He understood that early human beings had developed that mode of construction without much thought by simply piling stone upon stone.  Such a simplistic system was acceptable for small structures, but when architects continued mindlessly utilizing that same technique for large buildings, major problems arose.  The primary issue created by merely stacking materials higher and higher is that taller walls require thicker and thicker base sections to support their upper sections.  Some designers attempted to circumvent that issue by using external buttressing, which kept walls from crumbling under the weight of upper levels, but even buttressing limited the size.

Fuller found that the compression force (i.e., pushing down) that caused such failure in heavy walls was always balanced by an equal amount of tensional force (i.e., pulling, which in buildings is seen in the natural tendency of walls to arc outward) in the structure.  In fact, he discovered that if tension and compression are not perfectly balanced in a structure, the building will collapse.  He also found that builders were not employing the tensional forces available.  Those forces are, instead, channeled into the ground, where solid foundations hold the compressional members, be they stones or steel beams, from being thrust outward by tension.  Always seeking maximum efficiency, Fuller attempted to employ tensional forces in his new construction idea.  The result was geodesic structures.

Because Bucky could not afford even the crude mechanical multiplier machines available during the late 1940s and was working with nothing but an adding machine, his first major dome required two years of calculations.  With the help of a young assistant, Donald Richter, Fuller was, however, able to complete those calculations.  Thus, he brought most of the material needed to construct the first geodesic dome to Black Mountain in the summer of 1948.

File:Dymaxion house.jpg

A Dymaxion House at The Henry Ford.

Disappointment before Success

His vision was of a 50-foot-diameter framework fabricated from lightweight aluminum, and, working with an austere budget, he had purchased a load of aluminum-alloy venetian-blind strips that he packed into the car for the trip to the college.  Over the course of that summer, Bucky also procured other materials locally, but he was not completely satisfied with the dome's constituent elements, which were neither custom-designed for the project nor of the best materials.  Still, with the help of his students, the revolutionary new dome was prepared for what was supposed to be a quick assembly in early September, just as the summer session was coming to an end.

The big day was dampened by a pouring rain.  Nonetheless, Bucky and his team of assistants scurried around the field that had been chosen as the site of the event, preparing the sections of their dome for final assembly, while faculty and students stood under umbrellas, watching in anticipation from a nearby hillside.  When the critical moment arrived, the final bolts were fastened and tension was applied to the structure, causing it to transform from a flat pile of components into the world's first large geodesic sphere. The spectators cheered, but their excitement lasted only an instant as the fragile dome almost immediately sagged in upon itself and collapsed, ending the project.

Although he must have been disappointed that day, Bucky's stoic New England character kept him from publicly acknowledging such emotion.  Instead, he maintained that he had deliberately designed an extremely weak structure in order to determine the critical point at which it would collapse and that he had learned a great deal from the experiment.  Certainly, the lessons learned from that episode were valuable, and his somewhat egocentric rationale was by no means a blatant lie.  However, had he really been attempting to find the point of destruction, Bucky would have proceeded, as he did in later years, to add weights to the completed framework until it broke down.

In his haste to test his calculations, Fuller had proceeded without the finances necessary to acquire the best materials.  Because of the use of substandard components, the dome was doomed to failure, and a demonstration of the geodesic dome's practical strength was condemned to wait another year.

During that year, Fuller taught at the Chicago Institute of Design.  He and his Institute students also devoted a great deal of time to developing his new concepts.  It was with the assistance of those design students that Fuller built a number of more successful dome models, each of which was more structurally sound than the previous one.

Then, when he was invited to return to Black Mountain College the following summer as dean of the Summer Institute, Fuller suggested that some of his best Chicago Institute students and their faculty accompany him, so that they could demonstrate the true potential of geodesic domes.

Having earned some substantial lecture fees during the previous year, Bucky was able to purchase the best of materials for his new Black Mountain dome. The project was a 14-foot-diameter hemisphere constructed of the finest aluminum aircraft tubing and covered with a vinyl-plastic skin.  Completely erected within days after his arrival, that dome remained a stable fixture on the campus throughout the summer.  To further prove the efficiency of the design to somewhat skeptical fellow instructors and students, Bucky and eight of his assistants daringly hung from the structure's framework, like children on a playground, immediately after its completion.

TO BE CONTINUED...

Articolo (p)Link Commenti Commenti (0)  Storico Storico  Stampa Stampa
 

Internet è stata creata una volta, e può essere ricreata una seconda, anche meglio: una Rete parallela a quella esistente, indipendente, e a prova di censura e di controllo. Per ora si tratta solo di un’idea, anche perché non sembra di facile realizzazione. Il progetto però ha già un nome: The Darknet Project, abbreviato nell’acronimo Tdp.

Secondo quanto riporta Arstechnica, alcuni cyber attivisti si sono incontrati la scorsa settimana in una chat. Al momento il gruppo si coordina attraverso i social network su Reddit. L’obiettivo sembra proprio quello di creare una darknet (cioè una rete privata) globale. O, meglio, un insieme di darknet: una rete di network che funzionino indipendentemente gli uni dagli altri (e da internet), ma interconnessi in alcuni nodi. Evitare la centralizzazione è infatti una priorità: in questo modo, se un nodo o uno dei web venissero oscurati, il sistema resterebbe in piedi comunque.

"Fondamentalmente, lo scopo del Darknet Project è di creare un’internet alternativa, più libera, attraverso una rete mondiale di network”, ha sottolineato uno dei coordinatori di Tdp che si fa chiamare Wolfeater (divoratore di lupi). In che modo? Il primo passo sarà costruire delle reti locali e connetterle servendosi delle infrastrutture wireless già esistenti, finché delle nuove non saranno in grado di sostenere il sistema.

Il progetto è stato probabilmente ispirato dalla cosiddetta Operation Mesh lanciata dal gruppo Anonymous come risposta all’ Anti-Counterfeiting Trade Agreement (Acta), e che chiedeva un supporto per creare, appunto, un Web parallelo a quello esistente, magari utilizzando il software della rete anonima e criptata I2P e il protocollo Wrp del sito Batman.   Al momento, dietro al Tdp non sembra esservi un gruppo in grado di coordinarsi allo stesso livello di Anonymous per portare avanti in modo concreto il progetto, fa notare Una . Non è escluso, però, che qualcuno in ascolto sul Web, e con le conoscenze e le capacità tecniche necessarie, risponda alla chiamata.

Anche perché l’idea circola da un po’. Era già balenata persino al governo statunitense, tra l’altro - riportava il New York Times lo scorso giugno - con l’obiettivo si sostenere i dissidenti dei paesi sotto un regime di censura e repressione. Dall’altra parte, progetti di software open source sostenuti da organizzazioni non profit avevano già captato nell’aria la crescente richiesta di tecnologie per mettere in piedi delle darknet. Uno di questi è Freenet, che vorrebbe realizzare darknet sulle infrastrutture internet esistenti. Un altro è Serval, che mira a creare reti indipendenti usando gli smartphone: ha già sviluppato un software prototipo per Android e cerca volontari per testarlo.

Fonte: daily.wired.it

Articolo (p)Link Commenti Commenti (0)  Storico Storico  Stampa Stampa
 

Topic:

Strategies for reaching people in various activist groups. How to concentrate on what we all have in common, and how to avoid alienating these groups when spreading your message. And the necessity of the various groups (Occupy, Tea Party, etc.) to join forces against common foes to affect real change. 

Free TZM Global Show Archives:
http://www.thezeitgeistmovement.com/radio_shows

Friends,

On Feb 1st 2012 at 4pm EDT Neil (A.K.A VTV) and Aaron (A.K.A StormCloudsGathering) will host this week's TZM Global Radio Show.

http://www.blogtalkradio.com/zmglobal/2012/02/01/tzm-global-radio-show-feb-1st-12-host-neil-aka-vtv

About : Started in 2009, TZM Global Radio is a weekly radio show presented by various coordinators/lecturers of The Zeitgeist Movement in a rotational fashion.

My name is Neil Kiernan, a.k.a VTV. V-RADIO is an activist radio show dedicated to spreading awareness of the need for mankind to focus on sustainability, equality, and peace. Topics frequently discussed on V-RADIO are: The Venus Project. The life's work of industrial designer and social engineer Jacque Fresco. The Zeitgeist Movement and the work of filmmaker Peter Joseph. Charlie Veitch and the love police. Ben Stewart of the Hanged Man Project. The "Occupy" movement particularly Occupy Detroit. Interviews with many other filmmakers, scientists and activists. V-RADIO is an effort funded by donations from it's listeners. If you would like to support V-RADIO click the "Donate" tab up at the top of this page.

If you are new to V-RADIO, you can check out the V-RADIO archives on one of the tabs above and get started. On the links page you will find links to my various social networking sites, (Facebook,MySpace, etc) and links to other radio shows dedicated to spreading awareness of this direction. Click on the "Must see TV" link for links to many great documentaries that are viewable for free on the internet that give more great information and insight into why we are doing what we are doing in the Zeitgeist movement. All of my shows are also on iTunes as well. And also, if you are here for Zeitgeist TV now you can view it and participate in the chat room right here on V-RADIO.org.

Thanks again to all of my supporters as you are the reason I am doing this.

Articolo (p)Link Commenti Commenti (0)  Storico Storico  Stampa Stampa
 

"Împreuna cu aliatii, pe care SUA îi conving în prezent sa cumpere vase echipate cu sistem de lupta Aegis, potentialul total poate fi estimat în prezent la circa 1.000 de interceptori", a spus Rogozin, care este si reprezentant special al presedintelui rus în discutiile cu NATO.

El a avertizat ca cifra se apropie în prezent de limitele stabilite de acordul semnat recent de Rusia si SUA pentru reducerea armelor strategice.

Vicepremierul rus, Dmitri Rogozin. (ALEXANDER NEMENOV / AFP / Getty Images)

Vicepremierul rus, Dmitri Rogozin. (ALEXANDER NEMENOV / AFP / Getty Images)

"Nu exista garantii ca, dupa finalizarea primei, celei de a doua, a treia faza (a scutului antiracheta al SUA - n.r.), nu va exista a patra, a cincea si a sasea. Chiar credeti ca îsi vor opri toate tehnologiile dupa 2020? Nu are sens! Vor merge înainte cu dezvoltarea si îmbunatatirea parametrilor tehnici ai interceptorilor si capacitatilor sistemelor de avertizare", a adaugat Rogozin.

El a subliniat ca interceptorii SUA acopera toata partea europeana a Rusiei, pâna la muntii Urali, si pot lovi atât rachetele cu raza scurta si medie de actiune ale unor tari precum Iran si Coreea de Nord, cât si rachetele balistice intercontinentale ruse.

"Faptul ca sistemul de aparare antiracheta poate lovi rachete strategice si faptul ca baze si flota sunt desfasurate în marile din nord demonstreaza (...) natura antirusa evidenta a sistemul antiracheta" american, considera el.

Sursa: epochtimes-romania.com - dupa un articol NewsIn

Articolo (p)Link Commenti Commenti (0)  Storico Storico  Stampa Stampa
 

Desi avem o multime de prieteni pe Facebook, numarul oamenilor care ne sunt cu adevarat aproape atunci când avem nevoie este din ce în ce mai mic, avertizeaza Matthew Brashears, sociolog la Universitatea Cornell.

Brashears a intervievat mai bine de 2.000 de adulti si a constat ca, desi din 1985 pâna în 2010 oamenii au socializat mai mult ca niciodata, numarul prietenilor adevarati s-a diminuat.

Efectul Facebook: avem mai puţini prieteni apropiaţi, dar cunoaştem mai multe persoane

Cercetarea a avut la baza un chestionar în care participantii erau rugati sa faca o lista cu numele persoanelor carora le-au marturisit ceva important în ultimele sase luni. Rezultatul studiului a indicat ca 48% din participanti au indicat o singura persoana, 18% au scris doua nume, 29% au mentionat mai mult de doua persoane, iar putin peste 4% nu au scris niciun nume.

În medie, participantii aveau 2.03 prieteni apropiati, comparativ cu 3, câti aveau într-un studiu similar efectuat în 1985.

Desi avem tendinta de a simti ca obtinem mai mult suport social din partea prietenilor din retelele de socializare, tindem din ce în ce mai mult sa ne limitam cercul de prieteni din lumea reala, afirma cercetatorul. Brashears spune ca acest fenomen nu ar trebui vazut ca unul negativ, din moment ce primim sustinere si sfaturi din partea prietenilor virtuali, doar ca nu ar trebui sa neglijam viata reala si importanta prietenilor adevarati.

Cercetatorul avertizeaza ca exista o diferenta între contactul online si cel personal. Astfel, chiar daca oamenii tind sa cunoasca mai multe persoane gratie Facebook si celorlalte retele sociale, nivelul de încredere scade, lucru indicat de faptul ca problemele cele mai intime sunt împartasite unui numar tot mai mic de prieteni.

Sursa: ABC News & descopera.ro

Articolo (p)Link Commenti Commenti (0)  Storico Storico  Stampa Stampa
 

It is already used in Swiss elections to ensure that electronic vote data is securely transmitted to central locations. And as far as we know, no current quantum cryptographic system has been compromised in the field. This may be due to the work of security researchers who spend all their waking moments—and quite a lot of their non-waking moments—trying to pick the lock on quantum systems.

Their general approach can be summed up as follows: if you can fool a detector into thinking a classical light pulse is actually a quantum light pulse, then you might just be able to defeat a quantum cryptographic system. But even then the attack should fail, because quantum entangled states have statistics that cannot be achieved with classical light sources—by comparing statistics, you could unmask the deception. In the latest of a series of papers devoted to this topic, a group of researchers has now shown that the statistics can also be faked.

Quantum cryptography relies on the concept of entanglement. With entanglement, some statistical correlations are measured to be larger than those found in experiments based purely on classical physics. Cryptographic security works by using the correlations between entangled photons pairs to generate a common secret key. If an eavesdropper intercepts the quantum part of the signal, the statistics change, revealing the presence of an interloper.

But there's a catch here. I can make a classical signal that is perfectly correlated to any signal at all, provided I have time to measure said signal and replicate it appropriately. In other words, these statistical arguments only apply when there is no causal connection between the two measurements.

You might think that this makes intercepting the quantum goodness of a cryptographic system easy. But you would be wrong. When Eve intercepts the photons from the transmitting station run by Alice, she also destroys the photons. And even though she gets a result from her measurement, she cannot know the photons' full state. Thus, she cannot recreate, at the single photon level, a state that will ensure that Bob, at the receiving station, will observe identical measurements.

That is the theory anyway. But this is where the second loophole comes into play. We often assume that the detectors are actually detecting what we think they are detecting. In practice, there is no such thing as a single photon, single polarization detector. Instead, what we use is a filter that only allows a particular polarization of light to pass and an intensity detector to look for light. The filter doesn't care how many photons pass through, while the detector plays lots of games to try and be single photon sensitive when, ultimately, it is not.

It's this gap between theory and practice that allows a carefully manipulated classical light beam to fool a detector into reporting single photon clicks.

Since Eve has measured the polarization state of the photon, she knows what polarization state to set on her classical light pulse in order to fake Bob into recording the same measurement result. When Bob and Alice compare notes, they get the right answers and assume everything is on the up and up.

The researchers demonstrated that this attack succeeds with standard (but not commercial) quantum cryptography equipment under a range of different circumstances. In fact, they could make the setup outperform the quantum implementation for some particular settings.

The researchers also claim that this attack will be very difficult to detect, but I disagree. The attack depends on very carefully setting the power in the light beams so that only a single photodetector is triggered in Bob's apparatus. Within the detector, the light beam gets divided into two and then passed through polarization filters and detected. For a single photon beam, this doesn't matter—only one detector can click at any one time. But Eve's bright bunch of photons could set multiple detectors clicking at the same time. If you periodically remove filters, then Eve will inadvertently trigger more than a single photodiode, revealing her presence.

Source: Physical Review Letters, 2011, DOI: 10.1103/PhysRevLett.107.170404 - Ars Technica - via ZeitNews.org

Articolo (p)Link Commenti Commenti (0)  Storico Storico  Stampa Stampa
 

Citation:    The Futurist, Nov-Dec 1989 v23 n6 p14(5)

------------------------------------------------------------------------------

Title:       The birth of the geodesic dome; how Bucky did it. (R. Buckminster Fuller)

Authors:     Sieden, Lloyd Steven

------------------------------------------------------------------------------

Subjects:    Geodesic domes_research & Dwellings_innovations

People:      Fuller, R. Buckminster_innovations

Reference #: A8121293

=============================================

Richard Buckminster Fuller, c. 1917.
Born: July 12, 1895
Milton, Massachusetts, United States
Died: July 1, 1983 (aged 87)
Los Angeles, United States
Occupation: designer, author, inventor
Spouse: Anne Fuller
Children 2: Allegra Fuller Snyder and Alexandra who died in childhood 

 

Full Text COPYRIGHT World Future Society 1989

The Birth of The Geodesic Dome

Although Buckminster Fuller invariably maintained that he was a comprehensivist who was interested in almost everything, his life and work were dominated by a single issue: shelter and housing.  Even as a young boy in the early 1900s, Fuller--who preferred to be called Bucky--was constructing rudimentary structures and inventing better "environment controlling artifacts."

The practical culmination of his quest to employ modern assembly-line manufacturing techniques and the best man-made materials in producing inexpensive, elegant housing came toward the end of World War II.  At that time, government officials contracted Fuller to build two prototype Dymaxion Houses at the Beech Aircraft Company in Wichita, Kansas.

The lightweight, circular houses were praised by all who toured them.  Because the Dymaxion House was to provide many new innovations at the very affordable suggested retail price of $6,500, orders flowed into the factory before plans for distribution were seriously considered.  However, Fuller's interests were not geared toward practical matters such as financing and marketing, and the

Dymaxion House never advanced beyond the prototype stage.  Fuller then moved on to consider other innovations that could benefit humanity in the areas of structure and housing.

He also returned to his less pragmatic quest to discover nature's coordinate system and employ that system in a structure that would, because it was based on natural rather than humanly developed principles, be extremely efficient. That structure is the geodesic dome, which, because it approximates a sphere, encloses much more space with far less material than conventional buildings.

In order to uncover nature's coordinate system, Fuller retreated from a great deal of his usual activities during 1947 and 1948.  The primary focus of that retreat was a single topic: spherical geometry.  He chose that area because he felt it would be most useful in further understanding the mathematics of engineering, in discovering nature's coordinate system, and eventually in building the spherical structures that he found to be the most efficient means of construction.

Dome Models

Having observed the problems inherent in conventional construction techniques (as opposed to the ease with which nature's structures are erected) and the indigenous strength of natural structures, Fuller felt certain that he could perfect an analogous, efficient, spherical-construction technique.  He was also aware that any such method would have to be predicated upon spherical trigonometry.  To do that, Bucky converted the small Long Island apartment that his wife, Anne, had rented into a combination workshop and classroom where he studied and discussed his ideas with others.

As those ideas started to take shape in the models and drawings he used for sharing his insights, Fuller considered names for his invention.  He selected "geodesic dome" because the sections or arcs of great circles (i.e., the shortest distance between two points on a sphere) are called geodesics, a term derived from the Greek word meaning "earth-dividing."  His initial dome models were nothing more than spheres or sections of spheres constructed from crisscrossing curved pieces of material (each of which represented an arc of a great circle) that formed triangles.  Later, he expanded the concept and formed the curved pieces into even more complex structures such as tetrahedrons or octahedrons, which were then joined to create a spherical structure.  Still, the simple triangulation of struts remained, as did the initial name of the invention.

Although Fuller's study of mathematics played a significant role in his invention of the geodesic dome, that process was also greatly influenced by his earlier extensive examination of and work within the field of construction.  During his construction experience, he came to realize that the dome pattern had been employed, to some extent, ever since humans began building structures.  Early sailors landing upon foreign shores and requiring immediate shelter would simply upend their ships, creating an arched shelter similar to a dome.

Land-dwelling societies copied that structure by locating a small clearing surrounded by young saplings and bending those uncut trees inward to form a dome that they covered with animal skins, thatch, or other materials.  Over time, that structure developed into the classic yurt that still provides viable homes for many people in and around Afghanistan and the plains of the Soviet Union.

TO BE CONTINUED...

Articolo (p)Link Commenti Commenti (0)  Storico Storico  Stampa Stampa
 
By Admin (from 30/01/2012 @ 14:01:27, in en - Global Observatory, read 1062 times)

Scientists are reporting development of a fast, reliable new test that could help people avoid a terrible type of food poisoning that comes from eating fish tainted with a difficult-to-detect toxin from marine algae growing in warm waters. The report appears in ACS' journal Analytical Chemistry.

Takeshi Yasumoto and colleagues explain that 20,000-60,000 people every year come down with ciguatera poisoning from eating fish tainted with a ciguatoxin -- the most common source of food poisoning from a natural toxin. Fish, such as red snapper and sea bass, get the toxin by eating smaller fish that feast on marine algae that produce the toxin in tropical and subtropical areas, such as the Gulf Coast of the U.S. There's no warning that a fish has the toxin -- it smells, looks and tastes fine. But within hours of ingesting the toxin, people with ciguatera have symptoms that often include vomiting, diarrhea, numbness or tingling in the arms and legs and muscle and joint aches. Debilitating symptoms may last for months. The current test for the toxin involved giving it to laboratory mice and watching them for symptoms. It is time-consuming, may miss the small amounts present in fish, and can't tell the difference between certain forms of the disease. That's why Yasumoto's group developed a faster, more sensitive test.

They describe development of a new test, using standard laboratory instruments, that avoids those draw backs. Yasumoto's team proved its effectiveness by identifying 16 different forms of the toxin in fish from the Pacific Ocean. Clear regional differences emerged -- for example, snappers and groupers off Okinawa shores had one type, whereas spotted knifejaw captured several miles north of Okinawa had another type. They also identified 12 types of toxin in a marine alga in French Polynesia, which could be the primary toxin source. The researchers say that the method outperforms current detection methods and in addition to helping diagnose patients, it will also help scientists study how the toxins move through the food chain from one animal to another.

Source: American Chemical Society

Articolo (p)Link Commenti Commenti (0)  Storico Storico  Stampa Stampa
 

Ziarul Der Spiegel a dezvaluit ca 27 din cei 72 de deputati ai partidului Die Linke (Stânga), care reprezinta peste o treime din întregul grup parlamentar, inclusiv vicepresedinta parlamentului, Petra Pau, fac obiectul unei supravegheri. Ministrul justitiei si omologul sau de la dezvoltare au considerat masura 'intolerabila', în timp ce ministrul de interne o considera justificata, noteaza miercuri ziarul La Vanguardia.

Desi este un lucru stiut si tolerat de mult timp de parlamentari, de data aceasta reactia a fost virulenta. Gregor Gysi, seful grupului parlamentar al partidului Die Linke si unul dintre supravegheati spune ca 'Bundestagul ar trebui sa controleze serviciile secrete, nu invers' si a trimis o scrisoare cancelarului, presedintelui federal si presedintelui parlamentului. Acesta si-a exprimat întelegerea fata de cei afectati, ca si unii reprezentanti ai Verzilor si ai SPD, ceea ce este o noutate. Potrivit Bundesamt für Verfassungsschutz (BfV), supravegherea se limiteaza la urmarirea activitatilor si declaratiilor lor publice, dar Gysi spune ca sunt minciuni, având în vedere ca supraveghearea include 'metode specifice serviciilor secrete'.

Vicepreşedinta parlamentului german şi deputat al partidului Die Linke (Stânga), Petra Pau. (Boris Streubel / Bongarts / Getty Images)

Vicepresedinta parlamentului german si deputat al partidului Die Linke (Stânga), Petra Pau. (Boris Streubel / Bongarts / Getty Images)

Multi deputati cred ca telefoanele si computerele lor sunt urmarite, desi nu se recunoaste. Supravegherea pleaca de la supozitia ca cei urmariti reprezinta un 'pericol' la ordinea stabilita si merita sa fie supravegheati asemeni neonazistilor. Chiar daca incompetenta ambigua a BfV fata de cei din urma a fost amplu dovedita în noiembrie. Atunci s-a aflat ca principalul grup de nazisti din tara au ucis în ultimii 20 de ani zece persoane, au comis numeroase jafuri si atentate cu bomba, fara sa fie descoperiti, desi în anturajul lor erau infiltrati informatori si agenti ai BfV, sau poate tocmai de aceea.

Umbra acelui caz, alaturi de supravegherea deputatilor, este cea care irita acum spiritele. BfV recunoaste cheltuirea a 360.000 de euro pe an pentru supravegherea partidului Die Linke, un amestec de social-democrati si post-comunisti. Cu o suta de mii mai putin decât cei folositi la supravegherea nazistilor din NPD. Potrivit lui BfV este vorba de 'extremisti' de stânga, iar faptul ca Petra Pau a fost aleasa cu votul a peste jumatate din Bundestag, pentru a ocupa functia, este irelevant fata de imperativul de 'protectie constitutionala' care intra în sarcina serviciilor secrete. Este vorba si de reminiscenta unei traditii, care dateaza de pe vremea autocratiei prusace, potrivit careia statul este o institutie superioara, anterior, drepturilor.

Are însa legatura si cu metodele de intimidare folosite de presa si institutii fata de singurul partid politic care pune în chestiune aspecte centrale ale establishment-ului german, precum austeritatea neoliberala, folosirea armatei în razboaiele de dupa 1999, sau solidaritatea cu Palestina, chestiuni care atrag acuzatii kafkiene de antisemitism din partea mass-mediei. Marti s-a aflat si ca din 2008 politia berlineza a strâns peste 4 milioane de date, prin conectarea la telefoanele mobile, pentru a întocmi o lista de persoane si adrese aflate în apropierea locurilor în care au fost incendiate masini. În pofida acestui abuz, nu a reusit sa identifice niciun singur suspect legat de incendierea a peste 500 de masini care ard anual în Berlin.

Sursa: epochtimes-romania.com - dupa o stire Agerpres

Articolo (p)Link Commenti Commenti (0)  Storico Storico  Stampa Stampa
 
Ci sono 5363 persone collegate

< dicembre 2019 >
L
M
M
G
V
S
D
      
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
         

Titolo
en - Global Observatory (605)
en - Science and Society (594)
en - Video Alert (346)
it - Osservatorio Globale (503)
it - Scienze e Societa (555)
it - Video Alerta (132)
ro - Observator Global (399)
ro - Stiinta si Societate (467)
ro - TV Network (149)
z - Games Giochi Jocuri (68)

Catalogati per mese - Filed by month - Arhivate pe luni:

Gli interventi piů cliccati

Ultimi commenti - Last comments - Ultimele comentarii:
Hi, it's Nathan!Pretty much everyone is using voice search with their Siri/Google/Alexa to ask for services and products now, and next year, it'll be EVERYONE of your customers. Imagine what you are ...
15/01/2019 @ 17:58:25
By Nathan
Now Colorado is one love, I'm already packing suitcases;)
14/01/2018 @ 16:07:36
By Napasechnik
Nice read, I just passed this onto a friend who was doing some research on that. And he just bought me lunch since I found it for him smile So let me rephrase that Thank you for lunch! Whenever you ha...
21/11/2016 @ 09:41:39
By Anonimo


Titolo

Latest NEWS @
www.TurismoAssociati.it

Non-Hodgkin lymphoma cured by CANNABIS. The video of Stan and Barb Rutner.

Dr. Joycelyn Elders, U.S. surgeon general: Myths About Medical Marijuana in The Providence Journal, 2004.

Marihuana vindeca CANCERUL: marturii despre uleiul de cocos si canabis.

Yahoo Incorporated Mail. My account recovery information is incorrect. The Password Helper says my password can't be reset online. "First time signing in here?" message.

All information in a video about Donatio Mortis Causa and The Venus Project

What is TOR browser?

Thousands of protesters throng streets of Hong Kong as government urges calm

Myanmar leader Suu Kyi departs for genocide hearings amid fanfare at home

'Nervous' PM Johnson promises Brexit and less immigration ahead of election

UK Labour's McDonnell: I worry anti-Semitism has affected our election campaign

Naughtiest sin? PM Johnson admits cycling on the pavement

UK security minister says no Russian money behind Conservative election bid

Ultimele articole - Antena3.roCum a fost identificat Cornel Gale? dupa accidentul tragic în care ?i-a pierdut via?a. Fosta lui iubita s-a îngrozit când i-a vazut trupul

Daria avea 15 ani, când a fost împinsa la sinucidere de proprii ei colegi. Tragedia care a cutremurat un întreg oras

Se încinge lupta pentru Primaria Capitalei. Tomac, declara?ie surprinzatoare: „Cheia e la PMP!”

Ludovic Orban anun?a concedieri ?i înghe?area salariilor demnitarilor

Centenarul Filmului Românesc a ajuns la Cernau?i. Actri?a Ileana Popovici: „Sunt copii excep?ionali aici, care au nevoie de sprijinul nostru”

HOROSCOP. Mesaje de la Arhanghelul Mihail pentru zodii 8 decembrie 2019. Berbecii au parte de sus?inere, Gemenii se transforma





08/12/2019 @ 12:17:09
script eseguito in 954 ms