Show of 8-21-2010

  • Best of Tech Talk taken from previous shows
    • Details of the previously recorded segments are shown below.
  • Email and Forum Questions
    • Forum Question from ccwang01: I have recently purchased a new computer with MS Vista Home Premium OS. However, when I used our office’s Outlook Webmail at home, I was unable to write a message in the mail body area for either composing or replying/forwarding a message.  I believe this may be a problem related to a certificate error. I will appreciate if any one can tell me how to fix the problem. Thanks
    • Tech Talk Answers: The security settings are probably too high for the site and you can’t activate the java program that controls the entry screen. The certificate problem will not cause this as soon as you agree to go to the website against Vista ‘s recommendations. Go to the lower bar in the browser and adjust the security setting for this site. Make it a trusted site.
    • Fourm Questions from Ccwang01: I am running Vista and keep getting a certificate error when I access the company webmail system. I believe it has something to do with the IE setting within the Vista OS . To verify if the IE or Vista may cause the probem. I downloaded and tried the Firefox browser and it worked! Do you think there may be some other IE setting to be fixed in order to make it work. This does not happen on XP or with FoxFire. Ccwang01
    • Tech Talk answers: I think that your office does have a certificate error. It is not detected on earlier version of Internet Explorer or by Foxfire You can click on the Certificate Error notice on the right side of the address bar and it will provide the certificate dates. In all likelihood, the certificate has expired or it is not traceable to a reliable certificate source. Perhaps your company has not purchased a verifying certificate (like from Thawte). We had this same problem at Stratford.
    • Email from Dennis: Hi Dr. Shurtz, I am having a problem with the free zone alarm (ver 7.0.362.000). It is hogging up the cpu. I notice that the computer was slow and the disk drive was running, like something was scanning it. I opened the task manager and found the vsmon process using up to 100% of the cpu. I shut down zonealarm and the vsmon process stopped and everything was running normal. If I restart zone alarm sometimes it works normal but most of the time the cpu is bogged down by the vsmon process. I should also add that I have run an anti-virus scan, ad-adware scan and spybot search and destroy. Do you know what is causing zone alarm to use all the cpu? Thanks Dennis
    • Tech Talk answers: This has been a problem since 2003 and it has gotten worse with the latest releases as indicated by the latest blogs on the zonealarm site. Zone Alarm appears to have compatibility with P2P networks. This issue affects Azureus Java Bittorrent. BitTornado, ABC, Shad0w’s Experimental, Gnutella, Shareaza, and perhaps others. Usual symptoms of this issue include but are not limited to 100% CPU usage, slow transfer speeds, corrupted files, trouble establishing incoming and outgoing transfers, complete network outages, complete system freezes, random reboots, and blue screens of death. Disabling Zone Alarm’s firewall protection will not solve the problem as its filter will still be running in the background. A complete uninstallation is required.
    • Forum Question from ccwang01: The Windows XP OS of my four-year old Laptop recently clashed. I have a recovery CD came for the original purchased package. I’ll appreciate if someone can tell me how to rescue my 40 GB hard drive data before I reinstall the Windows XP home Operation. Thanks very much.
    • Tech Talk Answers: First of all don’t do a clean install because that would overwrite your data. If the problem is file corruption and not an actual hardware failure, you should have no trouble getting the data from the disk. I would recommend downloading a bootable Linux distribution and booting from the CD. Then attach an external hard drive to the computer and copy your critical data. This will also give you a chance to learn a little about Linux. You could also backup data using a big USB thumb drive (1 G or bigger).
    • PLAC is a business card sized bootable cdrom running linux. It has network auditing, disk recovery, and forensic analysis tools. ISO will be avialable and scripts to roll you own cd. (http://sourceforge.net/projects/plac)
    • Another option is to remove the hard drive and connect to your desk top as a secondary disk. You will need to get the correct cable and the desk top will have to support your disk type.
    • Now use the recovery disk. You can take the repair option first to see if it works (assuming you have the XP installation CD and not simply the manufacturer’s recovery CD. I usually just do a clean install and spend less time tinkering. Make certain to get the security updates immediately.
  • Profiles in IT: Robert Norton Noyce and Gordon Earle Moore
    • Noyce and Moore are co-founders on Intel.
    • Moore is creator of Moore‘s Law, first published in Electronics Magazine in 1965.
    • Robert Norton Noyce was born December 12, 1927 in Burlington, Iowa.
      • Noyce received a BA in physics from Grinnell College in 1949 and a PhD in physics form MIT in 1953.
      • While a student at Grinnell College, Noyce stole a pig from a nearby farmer for a college luau and then slaughtered it in Clark Hall, a prank that almost led to his expulsion.
      • He joined William Shockley at the Shockley Semiconductor Laboratory division of Beckman Instruments, but left with the "Traitorous Eight" to create the influential Fairchild Semiconductor Corporation.
      • While at Fairchild, Noyce independently invented the integrated circuit in Silicon, some six month after Jack Kilby invented the IC in Germanium at TI.
      • Noyce died from heart failure in 1990, aged 62.
    • Gordon Earle Moore was born January 3, 1929 in San Francisco, CA.
      • He received a BS degree in Chemistry from UC Berkeley in 1950 and a PhD in Physics and Chemistry from Caltech in 1954.
      • He joined Caltech alumnus William Shockley at the Shockley Semiconductor Laboratory division of Beckman Instruments and was part of "Traitorous Eight" who formed Fairchild.
    • Noyce and Moore founded Intel in 1968 when they left Fairchild Semiconductor.
    • To obtain start-up capital, Noyce and Moore approached Arthur Rock, a venture capitalist, with a one-page business plan simply stating their intention of developing large-scale integrated circuits.
    • Rock, who helped fund Fairchild, provided $3 million.
    • At its founding, Gordon Moore and Robert Noyce wanted to name their new company "Moore Noyce". The name, however, sounded remarkably similar to "more noise."
    • The company was incorporated on July 18, 1968, as N M Electronics (the letters standing for Noyce Moore), but quickly changed its name to Intel, formed from the first syllables of "integrated electronics."
    • Intel gathered another $2 million in capital before going public in 1971.
    • Within a few months of its startup, Intel produced the 3101 Schottky bipolar memory, a high-speed random access memory (RAM) chip.
    • A year later Intel introduced the a 1-kB dynamic RAM, or DRAM, which was the first chip large enough to store a significant amount of information.
    • In 1971 Intel introduced the 4004, the world’s first microprocessor, which had been produced as a calculator chip the Japanese company Busicom.
    • The 4004, which crammed 2,300 transistors onto a one-eighth- by one-sixth-inch chip, had the power of the ENIAC computer, which used 38,000 vacuum tubes.
    • Intel changed focus from memory to processor chips and the rest is history.
  • How to Set Up a Blog
    • This segment is in response from a request from Amy.
    • Define Your Niche
    • Define Your Audience
    • Choose Your Subject
      • Once You’ve Chosen Your Subject, Evaluate the Competition
    • Name Your Blog
      • Choose a name that’s memorable, short and easy to spell
      • Name and URL should match
    • Checking Your Name’s Availability Using Whois Database
      • Secure Domain Name using GoDaddy or Network Solutions
      • Point your newly-purchased domain name to your blog.
    • Choose a Blog Host (Option 1)
      • If you are creating your first blog or don’t have a great deal of technical expertise, than a hosted blog service is the way to go.
      • A hosted blog service essentially "hosts" your blog at their domain. They make creating a blog easy by providing well-designed templates, a web address and rich text editors that allow you to create posts without any special technical knowledge.
      • With a hosted blog service, you can have a blog up and running in less than ten minutes.
      • Some of the most popular hosted blogging platforms include:
        • Blogger.com (www.yourblogname.blogger.com)
          • Designed First-Time Bloggers
        • WordPress.com (www.yourblogname.wordpress.com)
          • Some knowledge of tech- or blog-related jargon is helpful. Designed for Savvy beginners.
        • Vox.com (www.yourblogname.vox.com)
          • Ads embedded at bottom of page. Cannot use registered domain name. Beginners looking for social networking options.
        • Typepad.com (www.yourblogname.typepad.com)
          • Four Pricing Levels from $4.95/mo – $29.95/mo. Designed for Savvy beginners.
      • Stand Alone Blogging Platform (Option 2)
        • This type of blogging platform is hosted by you on your own domain. This type of platform allows you to have full control over the design of your site and will use whatever domain name you’ve purchased.
        • To use this kind of blogging platform, you will need to subscribe to a hosting service and download a blogging platform WordPress.org or MovableType.org.
        • This route is more costly and demands a certain amount of technical literacy. You get a fully customizable site in your own name, which makes it the choice of many (but not all) professional bloggers.
  • Device of the Week: Digital Blue QX5 USB Microscope
    • Website: http://digiblue.com/digital_blue/qx5.html
    • Includes 640×480 pixel CMOS imaging array
    • Magnify and view objects on your PC at 10X, 60X, and 200X
    • LED lighting used for top and bottom illumination
    • Take snapshots, video, and time-lapse movies
    • Make shows with special effects and sound
    • Software includes drawing and painting tools
    • Connected and powered via USB
    • Created by Intel and Mattel
    • Priced around $100
  • Google Voice Local Search
    • Google Voice Local Search is an experimental service that allows people to search for local businesses over the phone.
    • There are no ads on the service, which is available only in the U.S.
    • To use it people can dial 1-800-GOOG-411 (1-800-466-4411)
    • Use voice commands to search for a business by name or category.
    • Information call and connection are free.
    • Users can also get the search results via SMS if they are on a mobile phone.
  • Phone my Phone: Find you misplaced cell phone
    • Website: www.phonemyphone.com
    • Enter you cell phone number into this site.
    • Select how many times you want it called.
    • Keeps calling until you answer
    • Calls are disabled between 10PM – 6AM PST (1AM – 9AM EST) to prevent prank

    Group offers tools to evade China‘s Web censorship

    • Global Internet Freedom Consortium’s tools help Chinese users circumvent their country’s Internet censorship
    • Web Address: http://www.internetfreedom.org/
    • Reporters covering the Beijing Olympics who are frustrated by Chinese Internet censorship can use free software tools developed to help Chinese users circumvent these controls, according to a representative of a group that develops such software.
    • The group claims approximately 1 million people in China use its tools to access the Internet.
    • Internet censorship has dominated recent coverage of the Beijing Olympics, which get underway this weekend. Many reporters were surprised to find that Chinese censors were blocking access to sites deemed undesirable by the government, despite promises of unfettered access for reporters covering the Games.
    • GIFC members have developed a range of tools that can be used to circumvent Chinese censorship efforts. The group’s aim is to allow Chinese Internet users to visit any site they like, without government interference.
    • But their efforts have turned into a technical game of cat and mouse, with Chinese censors working to block tools created by GIFC members.
    • When that happens, the group typically release updates that once again allow its software to evade these controls and the game continues
    • GIFC is an association of nonprofit organizations and companies based in North America. Many of its members are Chinese and include practitioners of Falun Gong, a spiritual sect that was banned in China following a government crackdown that saw some members jailed, while others fled overseas

    Food Science: Why is Fish White?

    • There are two types of protein myosin that be found in muscle
    • Slow fibers
      • Slow fibers burn fats to provide energy.
      • These muscles need oxygen to operate.
      • Slow fibers are suited for working continuously.
    • Fast fibers
      • Fast fibers burn glycogen and do not need oxygen.
      • Fast fibers do not need myoglobin and are always white.
      • Fast fibers can only operate in short bursts.
      • Fibers are short and fall apart when cooked.
    • Land animals need to support their own weight and hence must have slow fibers.
    • Fish swim in busts and are supported by water and can be by with fast fibers.
    • Sharks which must continuously are an exceptio

    Food Science: Caramel

    • Caramel (or Carmel) refers to a range of confections that are beige to dark brown in color, derived from the caramelization of one or several types of sugars, often occurring in the traditional cooking method of a sweet.
    • Caramel is made by heating sugar slowly to around 170 C (338 F). As the sugar melts and approaches this temperature, the molecules break down and re-form into compounds with a characteristic caramel color and flavor.
    • Caramel can provide the flavor in puddings and desserts, a filling in candies, or a topping for custards and ice creams.
    • A variety of candies, confections, and desserts are made with caramel and its products: caramel apples, barley sugar, caramel with nuts (such as praline, nougat, or brittle), and caramel with custard (such as crème caramel or crème brûlée).
    • Seneca first mentioned caramel in 65 BC.
    • The first scientific studies were done in 1838 by French chemist Etienne Peligot
    • During carmelization of sucrose, for example, the sucrose is disassociated into glucose and fructose.
    • These elementary sugars then recombine into more complex sugar compounds (oligosaccharides)
    • Along with the Maillard reaction, carmelization is one of the principal methods for culinary transformation.
    • Maillard reaction is a reaction of sugars with amino acids or proteins
    • Carmelization is a reaction that involves on sugars
    • My favorite carmelization: caramelized pecans for salad topping
    • Heat sugar until melts. Continue heating until slightly brown, but not burnt. At the nuts and cool on tin foil. If you want to make delicious candy caramel, add whipping cream and butter slowly as you stir.

    Food Science: What is Pickling?

    • Pickling is a global culinary art.
    • If you were to go on an international food-tasting tour, you’d find pickled foods just about everywhere.
    • You might sample kosher cucumber pickles in New York City, chutneys in India, kimchi in Korea, miso pickles in Japan, salted duck eggs in China, pickled herring in Scandinavia, corned beef in Ireland, salsas in Mexico, pickled pigs feet in the southern United States, and much, much more.
    • What makes a pickle a pickle? On a most general level, pickles are foods soaked in solutions that help prevent spoilage.
    • There are two basic categories of pickles.
    • The first type includes pickles preserved in vinegar, a strong acid in which few bacteria can survive. Most of the bottled kosher cucumber pickles available in the supermarket are preserved in vinegar.
    • The other category includes pickles soaked in a salt brine to encourages fermentation?the growth of "good" bacteria that make a food less vulnerable to "bad" spoilage-causing bacteria. Common examples of fermented pickles include kimchi and many cucumber dill pickles.
    • For thousands of years, our ancestors have explored ways to pickle foods, following an instinct to secure surplus food supplies for long winters, famine, and other times of need.
    • Historians know, for instance, that over two thousand years ago, workers building the Great Wall of China ate sauerkraut, a kind of fermented cabbage.
    • But pickling foods does much more than simply preserve them. It can also change their taste and texture in a profusion of interesting ways. It’s no surprise that cultures across the globe enjoy such an assortment of pickled foods.
    • The evolution of diverse pickled foods in different cultures has contributed to unique cultural food preferences, such as spicy sour tastes in Southeast Asia and acidic flavors in Eastern Europe.