Showing posts with label advance. Show all posts
Showing posts with label advance. Show all posts

4/13/2008

Evolution in the way of thinking

Taking from a global look, the curricular space of Biologic Structure of the Fellow, we can understand that the behavior is influenced by hereditary or genetic factors that are observed in the march of the evolution of the embryonal stage. To your you see, the perception and the sensation will act in feature of the environment. On the other hand S. N. C. you act and you process that information, given by these senses, through your receivers, the neurons, and you offer an Answer.

Among these, we find or we can meet with possibilities of neurotic answers or psicóticas.

In this system is also an intrinsic narrow relationship with the endocrine system, but specifically with the gland hypophysis, and through which you arrives to the Development, Increment and the fellow's Maturation.

Through these factors that are important in the fellow's life, we see an aspect in the one that like Bleger would say, in words of Lagache: ".el man is a man in status". for what Filloux contributes, as much as same Bleger that the man is historical, I sum up, only and social, and that this is called by Filloux, personality, the one that are variable standalone, irrepetible; and that to the fellow it is necessary to analyze it from two dimensions, a longitudinal (your historicity) one and another crosswise (the fellow's current moment) one that it take us to be able to observe a behavior and the why of this.

Understanding to the behavior like a "functional complex" system, where you are motivations, emotions, given by the psychic energy and that you help us to be able to display it. On the other hand he/she is the structuring aspect for that the fellow structures the reality to be able to act on her, as they are it the perception, the memory, the pansy and the language and that you conform an everything in the personality and you are it you make you to be this a being in status.

These psychic phenomena, they can be seen throughout the history, like forms of to think and to act characteristic of the context where they had your origin, without which we could not end up understanding them. This form of thinking, like in old Greece that put your interest in being about understanding to the world in higher beings' hands through the myth, with the step of the time the old ones began to understand the usote the reason in your answers, taking away from the mythical thing. As philosophers we can name to Such of Mileto that allocated to the water (essence of the water) the origin of all the things. Heráclito, Anaximandro, Anaxímenes, etc., they spoke of Phycis like the origin of the things (naturalistic philosophers).

But you take Socrates, Plato and Aristotle, among other, they had a different look, giving importance to a higher being, being this recaptured by Christian philosophers in S V for San Agustín, and in XIII S for Sacred Tomás with the scholastic one; during the Half Age the pansy of old philosophers is recaptured, since they believed these authors, as the old ones that ended up recognizing a higher being, with the difference that the church of the Half Age, named them pagans (Plato and Aristotle) although these last were recaptured respectively by San Agustín and Sacred Tomás.

In this time you can elucidate a pansy teocéntrico that showed and I characterize to a Half inquiring Age.

Going into in XV S, you leave profiling a new man vision, these are the anthropocentric vision, you reigned the idea of a man that could be happy and free here in the earth. You give beginning to new pansies, new sciences, the man is the center of everything, what allow you to achieve technological and scientific big advances.

We pass this way XIX S, where in Argentina there are radical changes, which can be glimpsed with the space Educational curricular System, where you give beginning the history of the education that at the beginning was full with obstacles until the organization, where in 1853 the National Constitution is sanctioned, and that through some articles, you show the education, and that you are possible to sum up properly you are during the period of the Historical" "Presidencies. You occur bigger importance to the creation of schools where, through the Oligarchical Liberal Controls, the Law of Common Education is sanctioned, the 1420la same that try of giving equality to all the counties.

This education necessity is given with more force when you arise in our country the bourgeois society that will demand more education, to conform the institutions.

A political social system also exists that through which will give us the educational rules that it are not neuter for the existing politics in the moment. An educational system in which leave configuring the papers of the education and the institution, to give you the educational boarding with educational, students and the contents. In the space Educational curricular Institutions, we see that an institution this normada through rules, values and laws that fix your borders:
1) articles of the National Constitution.
2) the curriculum.
3) Federal (or new Law) law of education.
4) the standards that govern the promotion of students.

Each school is specific, complex, multidimencional, pluri and interdisciplinary, intercultural, intermediate and integrative.

The educational one in charge of this space, made stress in that, the educational transformation is necessary, to confront the challenges that show up a change in all the dimensions, and a transformation in the form of coming closer to the knowledge. The social conflicts usually have a high crisis density in the knowledge, this makes that the educational transformation is necessary for the education and for the individuals. Today the difficulties of being educated find in the social problems that hinder the educational process somehow. In the world context, you are a globalization process, in this process, the school undeletes your importance of social transformation, and that you go her losing toward final of the XX century, but you take protagonism with the new conditions of the peripheral countries.

Before the information circulated alone for the schools, but today we see that you are not this way for that the technological means have entered in our homes and they make us feel illiterate. The scientific and technological knowledge advances in accelerated form, and who don't have access to this knowledge, they are reduced your capacity to intervene in the society.
The space curricular Problem of the Knowledge, approaches this reality. As this knowledge he/she leaves adapting to scientific new rules, to the paradigms, to the hypotheses; and comparing it with the XIX century, the positivism in which the laws were invariable where the idea command era and progress, and that you were glimpsed well in the class of Problematic Anthropological where you settled down that, the primitive ones could arrive to be civilized, as you were it the pansy of Europe and that of other currents. This anthropological science will have bigger peak with Malinowski who contributed to be able to study to the primitive civilizations from your breast and this way to be able to understand them, but you could not leave your ethnocentrism, and you add that you are well that these primitive societies can have an approach with the civilization.

Then authors like Francis Boas that it postulated the cultural relativism, for which you cannot compare to the primitive societies for that he/she would get lost the fundamental of each one.

The social conventional anthropology, was in charge of of publishing extensive monographs where all the aspects of the culture were revealed of having determined groups, starting from an exhaustive fieldwork. In those works the conventional descriptive categories of the free ones of the education don't appear: to know, knowledge, learning, teaching, education, socialization, etc.

This is without a doubt, product of the fact that, in these studied societies structures and formal status of an institutionalized education could not be recognized, and exactly hence, separated from other social practices.

The anthropologist R. Firth, when studying the tribal society, was in charge of of the problem of the networks and structures of transfer of the knowledge. You defined to the education from an anthropological perspective, pointing out that you are an exchange process with effect socializador, although you have not formalized institutionally and you have limited it to the family.

In the curricular spaces of Problematic Anthropological and Sociocultural, they have offered us a culture definition that are shared with the same authors, and that one of them is Durhan, ". the general aspects of the culture concept, they can be learned as a group of budgets that you/they are derived in the way that he/she conceived the anthropology your object and you defined the alcoholatura problems of the fieldwork". from this perspective, the culture is a context, you are an environment, a space, inside which can be described in (to be interpreted) intelligible way, social events, behavior modes, institutions, use of devices, customs or social processes. All these phenomena configure symbolic playable systems, that is to say significances that take get, underlying senses that the interpretation makes exit to the light.

On the other hand, the culture is a mechanism computer of the life of the social fellows.

Explanation of the Nanotechnology

The word "nanotechnology" is used extensively to define the sciences and technical that are applied to the a nanoescala level, this is some measures extremely petty "nanos" that allow to work and to manipulate the molecular structures and your atoms. In synthesis it would take us to the possibility of manufacturing materials and machines starting from the reordenamiento of atoms and molecules. The development of this discipline takes place starting from Richard's proposals Feynman (Brief chronology - history of the nanotechnology).

The best definition of Nanotechnology that we have found is this: The nanotechnology is the studio, design, creation, synthesis, manipulation and application of materials, apparatuses and functional systems through the control of the matter to nano climb, and the exploitation of phenomena and estates of the matter to nano climb.

When the matter is manipulated to the so minuscule scale of atoms and molecules, you demonstrate phenomena and completely new estates. Therefore, scientists use the nanotechnology to create materials, apparatuses and novel and not very expensive systems with unique estates


You interest us, more than your concept, what represent potentially inside the group of investigations and current applications whose purpose is to create new structures and products that would have a great impact in the industry, the medicine (nanomedicina), etc.

This new structures accurately atomic, such as nanotubos of charcoal, or petty instruments for the interior of the human body can insert us in a new era, just as Charles it points out Vest (ex-president of MIT). The advances nanotecnológicos would play this way the society of the knowledge with multitude of developments with a great repercussion in your entrepreneurial and social instrumentation.

The nanociencia is bound in great measure from the decade of the 80 with Drexler and your contributions to the molecular" "nanotechnology, this is, the nanomáquinas construction made of atoms and that they are able to build themselves other molecular components. From then on Eric Drexler (personal webpage), is considered one of the biggest visionaries on this topic. Already in 1986, in your book "Engines of creation" inserted the promises and hazards of the molecular manipulation. Currently Foresight presides Institute.

The father of the "nanociencia", Richard is considered Feynman, prize Nóbel of Physics, who in 1959 you intended to manufacture products based on a reordenamiento of atoms and molecules. In 1959, the great physique wrote an article that analyzed how the computers working with individual atoms could consume very little energy and to procure astonishing speeds.

A great consent exists in that the nanotechnology will take us to a second industrial revolution in the XXI century just as you announced some years ago, Charles Vest (ex-president of MIT).

You will suppose numerous advances for many industries and new materials with estates extraordinary (to develop stronger materials that the steel but with only ten percent the weight), new computer applications with incredibly quicker components or molecular sensors able to detect and to destroy cancer-causing cells in the parts more dedlicadas of the human body as the brain, among other many applications.

We can say that many progress of the nanociencia will be among the technological big advances that you/they will change the world.

Brilliant inventions that they changed our lives

Chewing gum: The rubber of masticating, true name of the chewing gum, is the American photographer's invemción Thomas Adams that, in 1870, you manufactured some bars starting from the sap of a plant called chewing gum. Dedicating to proporcinar a replacement product to the chewers of tobacco plant, you inspired by the Indian tradition of masticating this plant. Adams added you flavor to licorice, you put you the name of Black Jack and you marketed it.

Instant coffee: The restlessness of the investigators of the Brazilian Institute of the Coffee, made possible that, in 1938, the Swiss house Nestlé invented the dehydrated powdered coffee, Nestcafé. The investigations, started during the first years of the decade of the thirty, went to how the form to find of manufacturing coffee that, dissolved in water boiling, produces it in an instant way. Also, you were necessary to produce a soluble coffee so that you didn't end up in the bottom of the cup, and of course, of good flavor, keeping in mind that this should be packaged to the hole.

Aspirin: This medicine is due to Italian R. Piria that in 1838 you isolated the pure salicylic acid, obtained of the metil salicylate. The history, however inventor of the up-to-date aspirin considers, to French Charles Frédéric Gerhardt who obtained in 1853 the first acetylsalicilic acid. Your American colleagues R. Crabtee and J. Christian discovered in 1958 that the therapeutical goods of the product, have place when transforming the acetylsalicilic acid in gentisic.

Handkerchiefs descartables: Baptized Kleenex for the first trademark that you put them for sale, the cellulose handkerchiefs, marketed by the American signature Kimberley-Clark, intended like a form of avoiding the propagation of the germs and of alleviating the work of the housewives, in 1924. Your use extended all over the world.

Fan: To air the coal mines, French Théophile Guibal invented in 1858 the dynamic fan, stocked of wrapped up palettes that you captured the air through a chimney and you ejected it to the exterior. later on, you were inserted in the domestic environment.

Vacuum cleaner: The start of this atrilugio, you were sketched in 1871, by Ives W. Mc Gaffey. You were in turn about a bomb that started an inverted worked helix, for a petty motor of vapor. Your perfeccinamiento owes to the English engineer Hubert Cecil Booth who after attending a bankrupt demonstration of a manual vacuum cleaner, you arranged a handkerchief on the mouth and you vacuumed the powder of the carpet. Your first commercial apparatuses, spirits in the market in 1901, vacuumed powder through tubes until some petty overseas parked antagonists of the building.

Stapler: In 1868 the British business tax was granted from the stapler to Charles Henry Gould. The first automatic system of grapado, destined to the bookbinding shops, you appeared in the decade of 1890, passing to substitute to the alfilarias and paper clips enlas offices. So far, the first staples were good to hold the sole and the instep of the shoes.

3/23/2008

The Technology and your Revealed Myths

Myth 1: "If you download files from a network point to point, the competent authorities will be able to determine who are you."
Indicator of falsehood: 2.5 of 5

This sentence sounds as extracted of the book 1984 of George Orwell: "If you are downloading movies, television programas, music or video games using a network point to point (P2P), the files that it have downloaded can be scanned until your address IP" according to Elizbeth Kaltman, spokeswoman of MPAA.
But BayTSP stops who monitor networks of sharing files like Bittorrent and eDonkey, this is not so safe. When the company monitorea these services for several of your clients they can capture the address IP, the date and hour of the download and information on the Internet service provider, (ISP) but only when you are about downloads of great size.
"If the file is the sufficiently big thing--like a movie or a software (contrary to a single song) application quite probable .es that BayTSP can identify an individual before you finish downloading a complete" file Jim you pointed out Graham, spokesperson of BayTSP. "Not it happens very close in 100% of the cases, but this. We have never declared to have a vision on all the users that carry out downloads"
To relate an address IP with an actual name or a physical address is not a totally responsible procedure. Typically the attorneys of the industries of movies and music come closer to the Internet providers or the universities with the evidence of the supposed cases of violation in the registered rights. But you correspond to these organizations to identify to the responsible one being based on the address IP, and not all they make it.
Other challenges also exist. Peter Eckersley, member of the department of technology of Frontier Foundation, points out that the use of anonymous IP networks, the servers proxies that hide the addresses (places web that hide your address while you navigate in the network), or the connections WiFi that are without protection hinder the identification of your identity. Using dynamic addresses via DHCP doesn't avoid the identification since the providers of internet they take a register of who use an address IP in certain moment and if they share this information they can discover it easily.

Myth 2: To "use ink of third in your printer cancels the guarantee"
Indicator of falsehood: 5 of 5

This myth has the word falsehood written on the, in all type of ink!. According to Canon, Epson and Lexmark to use ink cartridges or cartridges repotenciados doesn't involve immediate annulment of the guarantee. (However in tests of PC World it has been demonstrated to use inks of third you don't always offer the best results)
The exception to the rule happens if you are the ink the one that cause the problem with the printer. Chery Taylor, spokeswoman of Epson, compares it with the guarantee of 50.000 miles of the radial tires. "Your car tire has a guarantee throughout the dear" life you pointed out. "If the gripper lines fade before what are supposed, the replacement you are covered for the guarantee. If you come out and you damage your tire when making something undue somehow, this damage is not covered for the guarantee"

Myth 3: "If you write an address directly in your browser, you will be safe of the attacks of Phishing."
Indicator of falsehood: 3 of 5

The safest form of achieving that they steal you your identity you are to select a link inside a phishing email and to give all your data innocently. But to write www.subanco.com in the browser is not guarantee that you avoided the swindlers.
They are still at least two hidden hazards according to Dave Jevans, director of the working Group Anti-Phishing.
The first are the pharming or poisonous attack of domain names that it intercept attempts of consenting to correct addresses before reaching the destination and you direct them to dummy places. Up to now some few attacks have hit to the domain name servers in the web, including one in February that I affect at least to 50 financial institutions. Jevans says that the only defense been worth against these attacks you are to write the address of safe (you should begin with https: / /) entry of the place directly, or to save it among the favorite ones, since the pharming attacks usually go to you page them iníciales of the place. However you should be pending if you receive warnings of your browser that the security certificate of the place is past due, you be not that the pharming attack has arrived at deeper levels.
The second hazard is the malware, the which it can cause the same goods that in the pishing when rewriting the file of hosts of your PC or modifying your browser so that you open specific pages. But you are ways to be protected of this threat, Fred Felman said, Director of Marketing of Mark Monitor that provide trademark protection and frauds to companies that are part of the list Fortune 500. In accordance with Felman if you maintain your up-to-date system, your fire walls working and your software antivirus and up-to-date antispyware, they decrease the risks vastly of being another victim.
Programs as Spybot Search & Destroy or WinPatrol can help him to protect your hosts file.

Myth 4: "Google is able to find everything in the Web and once you have your information this it cannot be removed."
Indicator of falsehood: 4 of 5

Although you seem sometimes that the invisible fingers of Google are able to play everything, you are not really this way. Google can only find things in the web if another place points to that page, Danny Sullivan says, editor in boss of Search Engine Land. "If you want that your information is not found you don't put it in the web or make sure that can only be seen with a password" the executive you said. "Google doesn't solve passwords."
You can also avoid the robots of Google to revise your place, or to force him to remove pages that you have already revised, following the instructions in Google Central Webmaster. If the place has already been revised by Google, he/she can take something of time so that these results disappear of the memory of Google.
The captious question is how to remove your personal information of Google, if this contained one in a place web that don't control personally. One can request in an educated way so that the administrator removes the page or you lock Google of revising it. If the administrator refuses to make it, and the place contains sensitive information how your safe-deposit Social number or material with intellectual protection, you can request to Google that delete it of your index directly. In any other way you will need to contract the services of some place how Reputation to Defend that make the possible thing to delete incorrect, compromising or grievous materials for a rate of US $ 30, but you don't offer guarantees of achieving it.

Myth 5: "You are totally protected when buying something in eBay."
Indicator of falsehood: 3.5 of 5

The biggest place in auction sales of the world and your division of on-line payments offer an arsenal of tools to protect it of the swindlers, defaulters and criminal idiots. But protection are you are far from being 100 actual%.
When the buyers use PayPal to buy a physical object in eBay.com they are protected in a self-operating way with an insurance of US $ 200 in your transaction" Catherine pointed out England, spokeswoman of the company. "If the buyer uses PayPAl to pay a purchase of a salesperson that are certified for PayPal, the transaction is assured until for US $ 2.000"
Unfortunately if you pay for another method. you check personnel staff, payment order or transfer electrónica.todas the bets they are in your against. These protections neither apply to objects that are not physical, like it can be software or electronic documents. And if you are double-crossed by a bitchy or confused object description, you won't have the luck of your side.
For example the professional of RP Greg P. You thought that you had done a good business when your offer of US $ 300 won the auction sale of a Xbox of Microsoft. If a broken Xbox had simply received, you would have been covered for the protection. But what really bought a document of Word that listed places was where a Xbox could buy with allowance. Because to) the bought object was electronic and non physique, and b) The bought object was correctly described, although the picture shown that of a Xbox outside, the protection of payment of PayPal could not be applied.

Myth 6: "The permanent images can abrade your television of plasma, reason why he/she cannot leave them on screen" too much time.
Indicator of falsehood: 2 of 5

The wear of plasma is not a myth, but if you are something that should not worry most of people. According to the place CrutchfieldAdvisor.com, the monitors of plasma and some CRT can suffer of wear when "static images like those of a video game, screens of news or prices of stocks or logoses of stations of TV remain in the screen for extended periods. With the time these images are printed in the match covering, leaving very clear appearances of the image on screen."
The advisor Dallas Simón of Crutchfield says that this is really strange, since the images usually refresh in the commercial cuts or when changing channel. But if it can be a problem for the fanatics of the game who can play the same game of shots during hours without resting, like I denote André Sam, an expert in sales of the store BestBuy in the city of New York. For example many games enter a fixed bar with statistic of the game, as punctuation, medals, energy and radars.
However, thanks to the advances in the technology of the plasma the new models are less prone to suffer wear. "As with any thing, if you are abused of her it can break" Paul you told Meyhofer, Vicepresident of Marketing and Planning of Products of Pioneer Electronics. "As I have said, TVs of plasma of new generation has significant enhancements in parts as the match, the structure of the cells and filters, everything to alleviate this problem."

Myth 7: "The disks of great size should be partitioned and/or defragmented to obtain the best performance."
Index of falsehood: 2 of 5

This is one of those myths that a fight can begin in a bar of geniuses. According to Mario Apicella--technology analyst and storage guru for the place web Infoworld.com, brother of PC World.desfragmentar a hard disk of great size will improve the performance of a Windows machine. The grade of enhancement will depend how many files you change or you delete every day.
"The operating system has the silly custom of trying to use any cluster that this free one, although this in the mean of an area densely busy and you have free a lot of space in another area of the disk" Apicella you pointed out. "For that reason the new files end distributed throughout the whole disk, what involve to have to make different search operations to be able to obtain them all."
But in tests carried out in PC World we don't find significant increases of performance after using a group of defraggers. The corporation Diskeeper that manufacture a defragmentation utility, proclaims that this practice can improve the performance, but only if the hard disk has 20% of free space at least. In few words, your gain can vary.
To divide the disk in two or more partitions not necessarily offered performance benefits, although if you have different several benefits. For example it allows you to have a take-off system double or you allow you to separate files that vary little (as the operating system) of those that if they make (your data or the cache memory of your browser) it. This will reduce your problems of coring and you facilitated the task of to backup your information or to replace your operating system without putting in hazard your data. (our chequee step-by-step instructions to partition your disk).

Myth 8: To "use high-speed flash memory cards allows you to take more pictures quickly."
Index of falsehood: 3.5 of 5

The cards by heart high-speed they allow to the digital chambers to save the more pictures quickly, but this not necessarily means that you can take more pictures quickly. "When you take a picture the chamber you should capture and to process the image and later to save it in the card" points out Mike Wong, Manager of RP of the manufacturer of cards SanDisk. "A quick card will only improve the last part of the process of taking a picture, the one of saving the picture."
If you use a quick chamber by heart with a card dilatory, you will be able to note a retardation on the part of the memory. But if you use a card by heart quick in a dilatory chamber it is as putting career tires to a compact" car. " [The difference] it can be significant if you are about professional chambers or SLR, but you are not very remarkable in the plain chambers of to point and to shoot."
However, Wong points out that the quick cards can reduce the time that take to download the images to your computer, whenever one has a high-speed reader. This will be more and more important since they are raising the resolution of the chambers and the capacity of the cards.

Myth 9: You are "cheaper to use rechargeable batteries that the disposable" ones.
Indicator of falsehood: 2 of 5

You are not about a myth, at least not in most of the cases, but the actual cost depends on the type of the batteries and that so often it uses the apparatuses where you arrange them.
The rechargeable batteries of Nickel Cadmiun and those of Nickel Meteal Hydride loses your imposition quickly when they are stored, as Chris tells Calwell, VP of Planning and Investigation of Echoes Consulting that publish reports about lla energy efficiency of consumers' products. These batteries are a bad option for apparatuses that are used with little frequency. as emergency lanterns. The rechargeable batteries of Lithium Ion maintain your imposition for much more time, but you can that you don't find them in the size that he/she need. If these batteries are not available for your apparatus and you don't also use frequently it, you saved more money using disposable batteries.
Balyne Murphy, spokesperson of Duracell, confirms that the use type is the determinant factor: "For users of devices with high usage, as digital chambers, the rechargeable ones are the solution with the best relationship cost / benefit. But if you are an occasional user that only take some few pictures, the rechargeable batteries they are not since a good option they are probably downloaded whenever to use them."
The rechargeable batteries not only cost more than the disposable ones, but rather you are also to keep in mind the longshoreman's price, the electricity that you/they consume and how many recharge they can support before having to be replaced. "Our general town council is to buy rechargeable of Lithium Ion or Nickel Metal Hydride with the biggest capacity and the pettiest time of possible" recharge.

Myth 10: "The limitless broadband service of 3G is really limitless."
Indicator of falsehood: 3.5 of 5.

When the phone ones offer your high-speed plans for data, they don't generally give you total freedom on what to make with the bandwidth. And some companies are worse than others.
Until recently Verizon Wireless publicitaba a plan of "limitless" broadband that were not really such. Although the subscribers of EVDO could navigate in the Web and to send and to receive electronic mails, the terms of the service in the contract prohibited you to use this plan to download or to give of high files, to display webcams or to use services of Voice IP has more than enough. The company also established a secret border of 5GB in each account; if they discovered that you sent or you received but data that that in one month, they rescinded you the contract. After whole months of receiving complaints the company, quietly, you arranged information about the borders of your package and aftertaste of promoting it how limitless.
In the terms of service of the contracts of Cingular (now AT&T) you found that the limitless plans 3G cannot be used to give of high, to download or to contemplate live video files (p.e. movies, TV), music or games." On the contrary that Verizon, doesn't impose a fixed border of use. But they can still be supervising it to verify that your bandwidth use is not too high.
The limitless plans of Sprint don't fix specific borders it can move you, neither prohíben the download to how many data neither obtaining live files. However Sprint is reserved the right to waive or to limit any continuing movement of data that impact in a negative way the performance of our network or that you hinder the access to the same" one.
According to Michael Ginsberg, chairman of portal EVDOinfo, Sprint has not still sent any user a notification of completion of service due to an excessive use of the bandwidth. And we have not found many complaints on this and we don't find any report of users affected by this measure. "But that doesn't mean that they won't change your politics in any moment. Your own bandwidth is limited" Ginsberg you added.

Myth 11: "The apparatuses of rays X of the airports can damage or to delete the memory of your digital" chamber.
[i] Indicator of Falsehood: 5 of 5

The safe-deposit Management of Transportation (TSA) says it clearly: "Our register team doesn't affect digital chamber neither your storage" cards.
In fact the CompactFlash cards, SecureDigital or Memory Stick of Sony can be more resistant of it than you you think. In tests carried out by the Digital magazine Camera Shopper, the cards demonstrated to be resistant surviving bathrooms of soda, to trips to the washing machine of clothes, to be run over by a patineta and to the evil manipulations of a six year-old boy. (However it was not you so well when they were hit by an auction room and nailed in a tree)
If you damage your card by heart, you can use a programa how Card Recovery of manufacturing WinRecovery (US $ 30) or Easy Recovery Lite of Ontrack (US$89) to undelete your lost pictures.

Myth 12: "The excessive use of your cellular one can cause you cancer or other problems of health."
Indicator of Falsehood: 2.5 of 5.

According to the World Organization of the Health and to the Management of Drugs and foods of USA, to use a cellular telephone doesn't cause any problem of health to less than that use it while you manage, in which case it can cause an accident. But if it can interfere with your pacemakers, you help auditory or sanguine defibrillator.
End of the history? Not exactly. Many studios about the goods of the waves of radio of the cellular ones are unconcluded or they are contradictory, indicating to both organizations that will be future necessary studios. A Finnish published studio last month of August in the magazine Proteomics found that some people have a genetic predisposition to react to the radiation emitted by the cellular ones. This could explain because the studios have thrown so different conclusions.
You also are not evidence to speak for cellular while you restore your fuel it can cause explosions. However the Federal Commission of communications (FCC) notices: "Although the potential of suffering damage to use wireless apparatuses is very remote you are other potential fonts as the automobiles and the static" electricity. Anyway for what reason to take a risk? Better you leave your chat for when you have finished loading fuel.

Myth 13: "Macs is safe of the malware"
Indicator of falsehood: 5 of 5

The true believers of the invincibility of Mac saw your on faith on approval recently when the safe-deposit investigator Dino Dai Zovi you takes to house a prize of US$10.000 for forced book credit a MacBook For with the OS 10.4 in a remote way. To Dai Zovi took you less than 10 hours to discover a vulnerability in the software Quicktime of Apple and to configure a page to take advantage of it. (The versions of Quicktime for Windows are also vulnerable). Then in nuna he/she interviews with the magazine Computerworld, Dai zovi declares that Mac is You less for sure Windows Seen. (that sound of teeth creaking that you hear is Steve's teeth Jobs.)
This is not the only vulnerability of well-known Mac. In January the safe-deposit investigator Kevin Finisterre and a well-known hacker only for the initials LMH, completed your project of the Month of the failure of Mac, in the which they revealed a new vulnerability of Mac every day. And in February he/she was discovered the first worm for Mac OS 10. Considered relatively harmless, OSX/Leap-A.worm is watered using the application of chat of Apple iChat and you are forwarded automatically to the list of friends.
The Mac users still have less probabilities of finding a virus or a debility that those of Windows, although you are only because you exist a lot but malware for Windows.

Myth 14: "The printers of injection of ink that they use merged cartridges they cost more to maintain that those that use separate" cartridges.
Indicator of Falsehood: 1 of 5

In this case it seemed that what indicate the common sense is certain. "With a printer of merged cartridges, when ending the yellow ink you are indebted to replace the other colors to be able to print things with yellow" Cheryl Taylor of Epson he/she says. She adds that the individual ink cartridges maximize the efficiency and they download the costs throughout the time.
Basically this is certain, Charlie confirms Brewer who write an electronic monthly bulletin about supplies of called printout Hard Copy Supplies. You "cost more to print with most of the cartridges of three inks that he/she added the one with singular." "Now they can book credit cases in that the individual cartridges cost more than the merged cartridges, but I cannot think now" of none of them.
If your printer uses individual cartridges, you are convenient to make them last the more than one can. Chequee "Six saving forms to be able to print more for less money" for town councils on as extending the life of your cartridges. You can also take a look to the town councils to save ink of the on-line store PrintCountry.com

Myth 15: "Yes somebody has forced your computer or you have transformed it into a zombie, you will realize.
Indicator of Falsehood: 4 of 5

Not necessarily, Lawrence Baldwin of MyNetWatchman says who follow the rake of the networks of spam robots. If the hackers has transformed your computer into a robot of sending spam, for example, your system will notice you that your computer is only sending hundred of mails if you have safe-deposit software revising your salient mails. Malware often shutdowns your software antivirus, fire walls or the services of upgrade of Windows, to be able to work without being detected.
In fact, Baldwin says, many users don't have conscience of being affected until your Internet service provider warns you or until your email begins to be rejected to be in a clever anti-spam, or the FBI hits to your gate asking for that it are launched attacks DOS. According to Baldwin it is stupid to trust safe-deposit software entirely to protect your computer.
Then like he/she can know if your computer is infected? If your machine becomes dilatory suddenly or taking too much time to start up or to fade, it can be infected. "But these they can be symptoms of different many problems that cannot be related with the malware" the expert you pointed out. In many cases they are the responsible ones to allow that suspicious files, as those downloaded from networks point to point, are run in your systems. As Baldwin "you say you need to be more intelligent or to be disconnected of the network."
They Give Tynan

"Thwarting the popular belief the editor Gives Tynan you are not a mythical infant that take charge of revising lists without end for PC World. He is, however, a legend for him same"