Popular Posts
-
Children nowadays are tyrants. They contradict their parents, gobble their food, and tyrannise their teachers. Socrates Children really br...
-
Pentagon Exploring Robot Killers That Can Fire on Their Own by Robert S. Boyd WASHINGTON - The unmanned bombers that frequently cause uninte...
-
Two astronauts from U.S. shuttle Atlantis crew have completed the first spacewalk of their current mission to the International Space Statio...
-
Web Forgery (also known as “Phishing”) is a form of identity theft that occurs when a malicious Web site impersonates a legitimate one in or...
-
The Scientists observed a Stellar Collapse at the Galactic Center, we might find marvelous Quran signals in the verse ...
Friday, November 12, 2010
A collapsing star at the Galactic Center
| | The Scientists observed a Stellar Collapse at the Galactic Center, we might find marvelous Quran signals in the verse " By the Star when it goes down… |
Scientists of Astronomy and galaxies started examining new information coming from the center of the galaxy which contains our planet, these information are primary data which can further enlighten the core of this massive galaxy. Scientists also start analyzing these interesting data which was obtained form continues and studied observation by one of the largest telescope on earth, Gemini North at Gemini Observatory in Hawaii on the Pacific ocean.
These interesting pictures show a stellar collapse with very huge cosmic cloud at the core of the Milky Way galaxy. The scientists believe that these pictures will bring about new discoveries that will change the current understanding of the galactic center.
This weird star, which has the taxonomic name ARS 8, according to the scientists, was a mass of aggregated gases until North Gemini approached it. The optical techniques used in it showed that this picture is for stellar collapse in cosmic gas and dust cloud near to the galactic center.
The revelation about this star is considered a victory in the efforts of understanding the nature of the galactic core through the scientists knowledge for how the stars and the cosmic gases are moving relatively, also the intensive study of the component of gas clouds, the circumstances and the climatic conditions surrounding the star means that new scientific method in searching for the details of milky way center will be developed later.
The galactic center, according to the scientists, is an interesting and weird place, as it is possible to observe self rotating rings of cosmic gases and stars that are rapidly rotating around black hole enormously massive by cosmic measurements.
A picture of highly brilliant star moving in the vast universe, scientists said that all stars moving rapidly and that there is no quiet star as was thought in the past
A Picture of the brilliant galaxy M101, scientists said that Universe has billions of galaxies which in turn have billions of stars, all these stars rotate and move, some of them collapse into the galactic center, some hit other stars
These mentioned many features that all the stars do have such as: stellar collapse, rapid rotation, all stars run out of fuel then collapse and implode. Therefore, the word "goes down" in the first verse can exactly express these phenomena.
Saturday, November 6, 2010
Pentagon Exploring Robot Killers That Can Fire on Their Own
by Robert S. Boyd
WASHINGTON - The unmanned bombers that frequently cause unintended civilian casualties in Pakistan are a step toward an even more lethal generation of robotic hunters-killers that operate with limited, if any, human control.
The Defense Department is financing studies of autonomous, or self-governing, armed robots that could find and destroy targets on their own. On-board computer programs, not flesh-and-blood people, would decide whether to fire their weapons.
"The trend is clear: Warfare will continue and autonomous robots will ultimately be deployed in its conduct," Ronald Arkin, a robotics expert at the Georgia Institute of Technology in Atlanta, wrote in a study (.pdf) commissioned by the Army.
"The pressure of an increasing battlefield tempo is forcing autonomy further and further toward the point of robots making that final, lethal decision," he predicted. "The time available to make the decision to shoot or not to shoot is becoming too short for remote humans to make intelligent informed decisions."
Autonomous armed robotic systems probably will be operating by 2020, according to John Pike, an expert on defense and intelligence matters and the director of the security Web site GlobalSecurity.org in Washington.
This prospect alarms experts, who fear that machines will be unable to distinguish between legitimate targets and civilians in a war zone.
"We are sleepwalking into a brave new world where robots decide who, where and when to kill," said Noel Sharkey, an expert on robotics and artificial intelligence at the University of Sheffield, England.
Human operators thousands of miles away in Nevada, using satellite communications, control the current generation of missile-firing robotic aircraft, known as Predators and Reapers. Armed ground robots, such as the Army's Modular Advanced Armed Robotic System, also require a human decision-maker before they shoot.
As of now, about 5,000 lethal and nonlethal robots are deployed in Iraq and Afghanistan. Besides targeting Taliban and al Qaida leaders, they perform surveillance, disarm roadside bombs, ferry supplies and carry out other military tasks. So far, none of these machines is autonomous; all are under human control.
The Pentagon's plans for its Future Combat System envision increasing levels of independence for its robots.
"Fully autonomous engagement without human intervention should also be considered, under user-defined conditions," said a 2007 Army request for proposals to design future robots.
For example, the Pentagon says that air-to-air combat may happen too fast to allow a remote controller to fire an unmanned aircraft's weapons.
"There is really no way that a system that is remotely controlled can effectively operate in an offensive or defensive air-combat environment," Dyke Weatherington, the deputy director of the Pentagon's unmanned aerial systems task force, told a news conference on Dec. 18, 2007. "The requirement for that is a fully autonomous system," he said. "That will take many years to get to."
Many Navy warships carry the autonomous, rapid-fire Phalanx system, which is designed to shoot down enemy missiles or aircraft that have penetrated outer defenses without waiting for a human decision-maker.
At Georgia Tech, Arkin is finishing a three-year Army contract to find ways to ensure that robots are used in appropriate ways. His idea is an "ethical governor" computer system that would require robots to obey the internationally recognized laws of war and the U.S. military's rules of engagement.
"Robots must be constrained to adhere to the same laws as humans or they should not be permitted on the battlefield," Arkin wrote.
For example, a robot's computer "brain" would block it from aiming a missile at a hospital, church, cemetery or cultural landmark, even if enemy forces were clustered nearby. The presence of women or children also would spark a robotic no-no.
Arkin contends that a properly designed robot could behave with greater restraint than human soldiers in the heat of battle and cause fewer casualties.
"Robots can be built that do not exhibit fear, anger, frustration or revenge, and that ultimately behave in a more humane manner than even human beings in these harsh circumstances," he wrote.
Sharkey, the British critic of autonomous armed robots, said that Arkin's ethical governor was "a good idea in principle. Unfortunately, it's doomed to failure at present because no robots or AI (artificial intelligence) systems could discriminate between a combatant and an innocent. That sensing ability just does not exist."
Selmer Bringsjord, an artificial intelligence expert at Rensselaer Polytechnic Institute in Troy, N.Y., is worried, too.
"I'm concerned. The stakes are very high," Bringsjord said. "If we give robots the power to do nasty things, we have to use logic to teach them not to do unethical things. If we can't figure this out, we shouldn't build any of these robots."
web forgery
Web Forgery (also known as “Phishing”) is a form of identity theft that occurs when a malicious Web site impersonates a legitimate one in order to trick you into giving up sensitive information such as passwords, account details, or credit card numbers. Phishing attacks usually come from email messages that attempt to lure the recipient into updating their personal information on fake, but very real looking, Web sites. More information on phishing can be found at the Anti-Phishing Working Group, and there are a number of examples and resources available at the Wikipedia Phishing page.
Attack Sites are Web sites that try to infect your computer with malware when you visit. These attacks can be very difficult to detect; even a site that looks safe may be secretly trying to attack you. Sometimes the Web site’s owner won’t even know that the site has been turned into an Attack Site.
You can learn more about malware and Attack Sites from StopBadware, a non-profit organization that works with partners like Mozilla to protect users from malware and other dangerous software.
Phishing and Malware Protection works by checking the sites that you visit against lists of reported phishing and malware sites. These lists are automatically downloaded and updated every 30 minutes or so when the Phishing and Malware Protection features are enabled. The technical details of the safe-browsing protocol are also publicly available.
There are two times when Firefox will communicate with Mozilla’s partners while using Phishing and Malware Protection. The first is during the regular updates to the lists of reporting phishing and malware sites. No information about you or the sites you visit is communicated during list updates. The second is in the event that you encounter a reported phishing or malware site. Before blocking the site, Firefox will request a double-check to ensure that the reported site has not been removed from the list since your last update. In both cases, existing cookies you have from google.com, our list provider, may also be sent.The Mozilla Privacy Policy expressly forbids the collection of this data by Mozilla or its partners for any purpose other than improvement of the Phishing and Malware Protection feature. The Google Privacy Policy explains how Google handles user cookies.
The Mozilla Privacy Policy expressly forbids the collection of this data by Mozilla or its partners for any purpose other than improvement of the Phishing and Malware Protection feature. The Google Privacy Policy explains how Google handles user cookies.
How do I use the Phishing and Malware Protection features?
These features are turned on by default so unless your security preferences have been changed, you are likely already using them. Phishing and Malware Protection options can be found on the Security Preferences pane. Go to Tools > Options… > Security.On Mac OS X, go to Firefox > Preferences… > Security. On Linux, go to Tools > Options > Security.
You can test to see if Phishing Protection is active by trying to visit our phishing test site. Likewise, you can try to visit our malware test site to confirm that Firefox is blocking Attack Sites as well. With Phishing and Malware Protection turned on, both sites should be blocked from loading.
If you own a site that was attacked and you have since repaired it, or if you feel that your site was reported in error, you can request that it be removed from the lists. We encourage site owners to investigate any such report thoroughly, though; a site can often be turned into an attack site without any visible change.
- To request removal from the list of reported phishing sites, use this form provided by Google.
- To request removal from the list of reported malware sites, use this one, provided by stopbadware.org.
Subscribe to:
Comments (Atom)





































