Ask yourself this one simple question: What is an ideal diamond? Most industry professionals will say that an ideal diamond is one that closely matches the model created by Marcel Tolkowsky. GIA breaks diamond cut grades down to several ...
Tags: Ideal Diamonds, Math, Myth
If ‘Horse-gate’ has anything to tell us, it’s that tight margins make for cut corners. Lessons, no doubt, will be learned. However, as any fool knows: pay peanuts and you’ll get monkeys (maybe even to eat). An ...
Tags: labelling, packaging, packaging industry
Infinera Corp of Sunnyvale, CA, USA, a vertically integrated manufacturer of digital optical network systems incorporating its own indium phosphide-based photonic integrated circuits (PICs), has announced the first successful demonstration ...
Tags: Infinera, Telstra, network systems
The recent spat between Samsung and Qualcomm with Samsung announcing an eight core IC for mobile phones and Qualcomm's CEO dismissing it as a publicity stunt, is put in context by ST-Ericsson Fellow Marco Cornero and Andreas Anyuru. ...
Tags: Samsung, Qualcomm, mobile phones
Intercept is an on-product lock designed to protect high-value products by making them useless until unlocked wirelessly at the point of sale. It features a wireless-enabled lock placed on the product, such as in the micro USB port on a ...
Tags: Packaging security, Packaging, Intercept
Though U.S. officials have consistently blamed Iran for the ongoing stream of distributed denial of service attacks (DDoS) against major U.S. banks, a number of security experts now say that there is not enough evidence to assign the blame ...
Tags: Iran, bank attacks, financial services networks, cyber security
Computerworld - Though U.S. officials blamed Iran for an ongoing stream of distributed denial of service attacks (DDoS) against major U.S. banks, security experts say there's not enough evidence yet to assign blame. The security experts ...
Tags: Iran, Bank DDOS Attacks, Washington Post
For all the apocalyptic prognostications, 2012 turned out to be a relatively uneventful year from an information security standpoint. A cyber Pearl Harbor did not happen. Stuxnet and its kin did not take out any power grids or shut down ...
Tags: apocalyptic prognostications, 2012, information security, cyber
Pound for pound, spider silk is one of the strongest materials known: Research by MIT’s Markus Buehler has helped explain that this strength arises from silk’s unusual hierarchical arrangement of protein building blocks. Now ...
Tags: Spider Silk, Textile, Mit Researchers, protein-based fibers
Luminous efficacy is a measure of how well a light source produces visible light. It is the ratio of luminous flux to power. Depending on context, the power can be either the radiant flux of the source's output, or it can be the total power ...
Tags: LED
In general, all the LED products can be divided into two major parts, the public lighting and indoor lighting. LED uses fall into four major categories: Visual signals where light goes more or less directly from the source to the human ...
Tags: LED
A year ago,we saw the first Samsung Chromebook and we were left feeling pretty underwhelmed with it.Not only was the hardware clunky and slow,but Google's much-anticipated Chrome OS was far more basic and limited in what it could do that we ...
Tags: Samsung
IDG News Service - The U.S. is facing a dramatically increasing threat from cyber attacks and a future attack on the country's critical infrastructure could have an effect similar to the Sept. 11 terrorist attacks of 2001, the U.S. ...
Tags: cyber attacks, critical infrastructure, Internet, cyber security, US
Infoworld-Network and endpoint security may not strike you as the first place to scratch an experimental itch.After all,protecting the company's systems and data should call into question any action that may introduce risk.But IT security ...
Tags: crazy IT security tricks
Malware attacks seem to be evolving. The traditional viruses, Trojan horses, botnets and phishing attacks are still a threat, but the next generation malware takes insidious to a whole new level. Thankfully, theres a silver lining as well. ...
Tags: Malware, attacks, traditional viruses, Trojan horses, botnets