Archive for February, 2010

Satellite GOCE

February 28, 2010

The GOCE (Gravity field and steady-state Ocean Circulation Explorer) is an ESA mission dedicated to measuring the Earth’s gravity field and modelling the geoid with extremely high accuracy and spatial resolution. It is the first Earth Explorer Core mission to be developed as part of ESA’s Living Planet Programme and is scheduled for launch in May 2008. The satellite consists of a single rigid octagonal spacecraft, approximately 5 m long and 1 m in diameter with fixed solar wings andno moving parts.

The main objectives of the mission are:

  • To determine the gravity-field anomalies with an accuracy of 1 mGal (where 1 mGal = 10-5 m/s2)
  • To determine the geoid with an accuracy of 1-2 cm
  • To achieve the above at a spatial resolution better than 100 km
  • source: GOCE by NASA

    MiFi = personal WiFi

    February 26, 2010

    Are you looking for share you internet link cordless way ?
    Enable your wi-fi router … but what happen when you don’t have a *DSL?

    If you have only a 3G internet access ?
    Here is very very special toy, Huawei E5830
    enable sharing your mobile connection with multiple devices simultaneously, via your personal WiFi … MiFi πŸ˜‰

    watch MobileDeveloper.TV‘s review, hereΒ  Episode 30: Hands-on with the 3UK MiFi wireless hotspot
    italian here: Huawei E5830, la prima chiavetta HDSPA e Wi-Fi

    Happy 20th Birthday Photoshop

    February 20, 2010

    I didn’t know what age πŸ™‚ Adobe Photoshop come from … until now, thanks to Adobe TV. πŸ™‚
    Did any other software (*) last so long ?
    Happy 20th Birthday Photoshop πŸ˜‰

    read more here: Photoshop 20th Anniversary

    (*) Well, you know … I’m not comparing to software like Solaris, Β AIX, Oracle RDBMS πŸ™‚

    Security, two-factor authentication, man-in-the-browser attacks, etc

    February 19, 2010

    Home banking, webmail via https, e-commerce website … and so on!
    Authentication is really important, and your browser tells you when you’re surfing over a secure connecti0n and when not.

    Fraudsters are beating strong two-factor authentication and are proving that any authentication method that relies on browser communications can be defeated. A layered fraud prevention approach can thwart these attacks.
    […]
    Criminals are successfully launching man-in-the-browser attacks that circumvent strong two-factor and other authentication that communicate through the user’s browser. The fraudsters are also successfully having telecommunication carriers forward phone calls used to authenticate users and/or transactions to the fraudster’s phone instead of the legitimate user’s phone. These attacks were successfully and repeatedly executed against many banks and their customers across the globe in 2009. While bank accounts are the main immediate targets, these attack methods will migrate to other sectors and applications that contain sensitive valuable information and data within the next three years.
    A layered fraud prevention approach that includes server-based fraud detection and out-of-band transaction verification that precludes call forwarding to illegitimate user phone numbers can and has mitigated these threats.

    read full article here: Where Strong Authentication Fails and What You Can Do About It

    source: Attenzione con l’Internet Banking

    Maximize Dell Performance&Battery:Tips&Tricks

    February 14, 2010

    Just for my memory πŸ˜‰
    In case of new laptop, or not_so old one, here are few tips&tricks about performance and saving battery.

    read here:Maximizing Your Dell Laptop Performance & Battery: Tips and Tricks

  • February 2010
    M T W T F S S
    « Jan   Mar »
    1234567
    891011121314
    15161718192021
    22232425262728
  • .

    .Net Agile Antivirus Book C# Programming EntityFramework GTD Hyper-V LinQ MVVM Office Resharper SCRUM Security Sharepoint Silverlight SQLServer TFS ToDoList Unit Test VirtualBox Virtual PC Visual Studio VMware Windows7 WPF XeDotNet XML XPath