Tuesday, October 31, 2006

Tell about Some Recent Computer News

On October 27th, 2006, IBM declared that they succeeded to invent a new technology to cool down computer chip. Scientists in one of IBM’s Research Laboratories in Zurich got the hint to the new technology from a biological process of tree leaves and roots. The name of the new technique is "high thermal conductivity interface technology" and expected to be twice as efficient as former chips based on fan cooling systems.In addition; consequently, this new chip innovation is anticipated to be good for saving energy, designing new more powerful and smaller chips.
However, IBM also said that the researchers in the Zurich Research Laboratory had already started to work on even advanced technology to cool down chips with water-jet. This technique is called “direct jet impingement, and the day when this new technology appears in this world would come soon in the future…

Tuesday, October 24, 2006

Computer Terms: What Is "Net Neutrality"?

The computer term “Net Neutrality” (is a short term of “Network Neutrality”) is a state that any document, application, or site on the Internet has an equality to be found in the search engines in spite of how much the site owner pays the Internet providers’ companies. This is a necessary for the open and free Internet to be prevented from controlled by the Internet providers’ companies.

The reason why this term “Net Neutrality” is getting one of the Internet issues is that in the United States, some largest national telephone and cable companies, such as AT&T, Verizon, Comcast and Time Warner, are trying to persuade Congress into making a new law which allow them to get the control of their own search engines based on how much they are paid.

Tuesday, October 17, 2006

Introduce 3 Good Web Sites (in English)

Although there are countless Internet sites, I like these three particularly; Vogue, National Geographic Online, Wikipedia.
The reason why I like vogue is that I can see the fashion of each country very easily. In the lower right, there are menu to change language and country, so I can see each country’s Vogue news. Especially, I like the catwalk movies! If you are interested in fashion, you must go this site!!

National Geographic is one of my best sites because it has a great quantity of knowledge. I often use photo and history pages. They show me a lot of beautiful photos of the world! Now it runs a feature on Paris as “The City of Lights.”

I think this is needless to say, but Wikipedia is a very useful site. People can get general information and images of anything very quickly. Though there are some similar sites on the Internet, I think Wikipedia is superior at the points of the quantity of information and well organized design.

Tuesday, October 10, 2006

Computer Gifts I Would Buy for Friends & Family


If I had a lot of money, I would like to give my sister and my friend.
For my sister, I will buy a new iPod nano in green.
The reason is that her portable MD player is now getting out of order these days.
In addition, I heard there is much free software for learning English on the Internet and that she wants to improve her English. Accordingly, I would like to present her a latest iPod in her favorite colour.
For my friend, who has a nice MacBook and an iPod already, I will get a cute arm pillow. Because she is an Art University student, she often use computer. She says to me that she has wrist ache because of too much typing. Thus, to soften the pain, I will find an arm pillow like this picture.

Tuesday, October 03, 2006

What Is "Social Engineering"?

The term “social engineering” is a generic name of acts whose objects are to access others’ computers illegally and one of the ways hackers and crackers use. In a broad sense, this term means every action to get important information for security, such as passwords, from managers and users of networks by “social” ways. In a narrow sense, that does not include modus operands which use electronic methods.

There are some common ways to do social engineering.
Ex.1) Trashing
…To get information from trash.
Ex.2) Intruding
…To intrude into buildings by using unjust ID cards. This is not for computer networks.
Ex.3) Peeping
…To peep others input their passwords.
Ex.4) Web Spoofing
…To have others accessing fake Web sites and inputting their personal     
    information.

In addition, there are some methods to get information by imposing on others’ psychology.