Blog

  • Chrysler Nassau: La Lancia Delta US montre son nez…

    On l’attendait pour le salon de Detroit, dans 15 jours, malgré le dementi de Chrysler sur la présence de nouveautés pour la marque. Mais la voici déjà qui se montre, la Lancia Delta rebadgée du Pentastar, et qui devrait s’appeler Nassau.

    –> Nouveau! Le Fil News Chrysler/Lancia en continu: les dernières infos, avec mise à jour à chaque news… c’est par ici!

    Si vous n’avez pas suivi les épisodes précédents, je vous renvoie vers les billets qui lui sont consacrés. Après les illustrations, voici donc à quoi ressemble la Delta nouvelle version:

    Chrysler Nassau 001

     

    Notez que la photo aurait été prise en Europe, ce qui n’est pas illogique, la Delta y étant produite. On est donc très proche des illustrations. Là non plus, rien d’étonnant; pour faire si vite, il fallait ne changer que la calandre, et ce n’est pas difficile, celles des 2 marques étant assez facilement interchangeables niveau dimensions.

    Ceci dit, la Lancia est une très belle auto, originale, cossue et bien présentée, ses standards de qualité sont supérieurs à ceux de Chrysler (mettez la à côté d’une Caliber et comparez!…), et il n’y a donc pas forcément grand chose à faire. Pour cette fois en tous cas,les occasions de « rebadging » faciles étant rares.

    Les premières réactions des américains, en ligne, sont plutôt bienveillantes envers la voiture. Ce qui est bon signe. Quelques interrogations tout de même. La Delta est une voiture plutôt chère, la proposer à un tarif compétitif aux US, c’est à dire très bas, ne va pas être simple. De plus, c’est une deux volumes à hayon, « hatchback », et ce n’est pas une formule qui a eu beaucoup de succès là-bas jusqu’ici. Enfin, les américains sont très échaudés par le refus de Chrysler de rembourser plusieurs milliards de dollars de prêt financés par les contribuables.

    So, wait & see…

    –> Dernière minute! Merci aux lecteurs d’Unica Strada pour leur prespicacité: je me suis fait berner comme bien d’autres; il s’agit en effet d’un Photoshop sur base de l’original ci-dessous:

    MEA CULPA!

    600px-Lancia_Delta_III_20090620_front 

    En attendant, envie de voir ce que pourrait donner une 200C badgée Lancia? Voici ce qu’imaginent déjà les illustrateurs:

    Lancia 200C rendu 001

    Lancia 200C rendu 002 

    Nouveau: pour profiter facilement et rapidement des notifications de nouveautés sur le site, pensez à vous abonner via Twitter. Chaque modification, nouvel article ou nouvelle vidéo sur notre chaîne Youtube, fait l’objet d’un Tweet immédiat!

  • Privacy Theater: Why Social Networks Only Pretend To Protect You

    Editor’s note: The following guest post was written by Rohit Khare, the co-founder of Angstro. Building his latest project, social address book Knx.to, gives him a deep familiarity with the privacy policies of all the major social networks.

    I’d be wishing everyone a happier New Year if it were easier to mail out greeting cards to friends on Facebook and colleagues on LinkedIn. I’d like to use knx.to, our free, real-time social address book, but their ‘privacy’ policies prevent us from downloading contact information, even for my own friends.

    At least those Terms of Service (ToS) that force us to copy addresses and phone numbers one-by-one also prevent scoundrels from stealing our identity; reselling our friends to marketers; and linking our life online to the real world. Right?

    Wrong. When RockYou can stash 32 million passwords in the clear; when RapLeaf can index 600 million email accounts; and when Intelius can go public by buying 100 million profile pages; then our social networks have traded away our privacy for mere “privacy theater.”

    With apologies to Bruce Schneier’s brilliant coinage, “security theater” (e.g. the magical thinking behind forcing passengers to sit down and shut up for the last hour of international flights), social networks have been dogged by one disaster after another in 2009 because they pursue policies that provide the “feeling of improved privacy while doing little or nothing to actually improve privacy.”

    As long as the same information that social networks piously prohibit their own customers from using is being bought and sold on the open market by giant marketing companies, social networks are only pretending protect your privacy.

    Industrial-Scale Identity Theft

    Last week’s headlines brought news that RockYou had accumulated 32,603,388 identities over the past few years — and negligently stored them in plaintext in an incompetently protected database.

    RockYou’s official bluster about “illegal intrusion” should fool no one: blaming Imperva, the firm who exposed the flaw, or accusing the hacker(s) of being the identity thieves is misdirection: it was actually RockYou who stole those credentials, and RockYou should be held to account.

    I realize that I’m using the incendiary terms “identity theft” and “stole,” even though I would agree that users voluntarily consented to type their passwords into RockYou’s forms. I assume that both users and RockYou’s developers actually only intended to share some particular bits of information: a contact list, a user photo, a friend’s gender; but the bottom line is that instead of sharing that specific data, RockYou retained enough secrets to impersonate those users at will.

    • Don’t blame the victims. Bemoaning the absence of open standards for users to share their own data; or complaining about the weaknesses of users’ password choices is merely changing the subject.
    • Don’t blame “security” technology. More encryption, better encryption, or stronger firewalls would not help, since the default RockYou username in this case was a user’s primary email address. For anyone who chose to use a popular Webmail service, that granted access to every other online service they’ve ever used — because of those ubiquitous “Forgot your password?” buttons to email it back to you (just ask Twitter how much fun that is).
    • Don’t blame RockYou’s partners, who hosted their widgets. They just wanted to give their users some fancy new slideshows and scoreboards and other features to put on their pages; that shouldn’t have required an all-out war for viral growth that demanded users to log in and advertise their new widgets to all of their friends.

    The fault, dear Reader, is not in our stars; it lies with sites that pretend to waive all care and duty by idly warning their users not to share their account passwords with anyone else.

    In the absence of vigorous enforcement of those ToS agreements, any RockYou developer who passed up the opportunity to, say, phish MySpace passwords was putting their own employer at a disadvantage to any other startup that was willing to race them to the bottom.

    APIs: Automating Privacy Intrusions?

    RockYou minimized the scope of this breach by maintaining that it only affected their “legacy platform” for widgets rather than its larger “partner applications platforms” that use “industry standard security protocols.” After all, the advent of social networks’ partner APIs was supposed to make impersonation and scraping obsolete.

    Those APIs came with their own new ToS agreements that added new, overlapping, and sometimes-contradictory restrictions as they worked through all of the implications of letting third parties in on the fun. The ACLU released a fun quiz that makes quite clear how much information is at stake, from your hometown to your friends’ sexual orientation.

    For example, if you upload a photo of me that I find embarrassing, I could prevent you from tagging me in it, but I can’t forbid you from keeping your own photo online (or keeping it private, bugs aside). I can’t even forbid another friend of ours from caching a copy in his or her browser.

    However, the Facebook API ToS can (and does) prevent a third-party application from caching a link to the photo for more than a day (a week on Orkut). Unfortunately, direct links to the photo server didn’t double-check the privacy policy, so a third-party app would be at risk of leaking images users thought were private, unless the developer remembered to make a separate API call every time to re-verify every photo on a page.

    He (or She) Who Must Not Be Named

    In an ideal world, a third party developer shouldn’t have to store any personally-identifiable information (PII). In many jurisdictions, PII is akin to toxic waste, because of the regulatory burdens and civil, even criminal, liability for acquiring and disposing of it.

    Here again, Facebook is the pacesetter: it’s possible to display “She liked 7 photos uploaded by Mr. Smith two weeks ago” using little more than a numeric user id. The developer writes a sentence in Facebook Markup Language (FBML), and Facebook’s servers will dynamically substitute the name, gender, item count, and ensure grammatical agreement of pronouns, singular/plural choices, and time intervals.

    OpenSocial gadgets have to copy PII into the browser to format a sentence like that. LinkedIn’s partners even have to copy PII to their own servers, since their Open API is currently incompatible with AJAX authentication.

    Even though copying PII is the root of all privacy risks, there are three reasons it can be necessary: latency, history, and agility. Without caches, slow API calls can make an app’s performance suffer. Without archives, analyzing only the most recent events can mislead an app’s trend detection or recommendation services. Without “offline” access, waiting for a user to log in again delays an app’s reaction to events in real-time.

    There aren’t many technical countermeasures once data has been copied. LinkedIn spent more than a year tinkering with their public API, but the only substantial difference is that it now encrypts every member id with the identity of the developer and application to trace the source of a breach. I applaud them as an industry pioneer — though they’re so dependent on search-engine optimization that they still include the public numeric ids in the profile page URLs anyway.

    Exporting PII with legal strings attached is the best policy we can hope for. While Amazon’s ToS requires its associates to display accurate, up-to-date prices, Twitter has only recently realized the implications of searching deleted tweets and doesn’t yet oblige its API partners to update their copies when tweets are deleted or protected.

    Buying Back Your Own Data? Priceless.

    If PII is so hard to protect, then the only way for social networks to protect their users’ privacy must be to prohibit partners from accessing contact information in the first place. I might not be able to export my holiday card mailing list from my favorite social network— a roach motel for our data — but giant marketing corporations can buy and sell our private information with impunity.

    I could go to Rapleaf right now to buy an analysis of any list of email addresses to learn its makeup by gender, income, residence, and all manner of other demographic data. Who’s to say how short that list could be—it’s a slippery slope from aggregate info to personal info. Or I could shop at one of Intelius’ many fronts and affiliates who are selling PII explicitly (TRUSTe-certified!). Or I could barter some of the stray business cards on my desk on Jigsaw to fill in the rest of the puzzle. All of these businesses depend on PII data harvested from social networks.

    How is that possible? None of the social networks that we’ve integrated with has an API for reading email addresses — but all of them have no problem asking you to “Invite your friends!”  After all, most social networks remain hypocritical enough to phish passwords to other social networks themselves as soon as they ask you to “Invite your friends” for their own viral growth!

    Putting aside the hypocrisy of phishing passwords to scrape those friends’ email addresses in the first place, the subtler flaw is that social networks are more than happy to search their member database for those addresses to share a list of suggested friends. That’s how a Rapleaf could take a mailing list, pretend that those are all friends of theirs, and slowly accumulate a “reverse phonebook” that maps emails to social network profiles.

    Or you could just crawl their websites. Social networks depend on search engines for traffic, so they almost universally have public pages for every member with well-known URLs and directory listings by name for crawlers to index. A mini-boomlet in funding “people search“ startups underwrote this massive exercise, but they sold their archives to lessthansavory marketers.

    Now, merely indexing public web pages can’t be evil—but reconciling online identities and 3rd-party advertising cookies with real-world credit reports, government records, and other databases can be. Adding in all that information doesn’t increase Mr. Smith’s anonymity; Jeff Jonas has made a small fortune proving that semantic reconciliation dramatically collapses uncertainty. Just think about combining Spock’s 100M profiles with Intelius’ 20B other data points; or Wink’s 200M profiles with Reunion MyLife’s 34M members and 700M records…

    Whose Data Is It, Anyway?

    The philosophical question at hand is what rights do I have in my friends’ information. When I accept a business card from someone I’ve just met, I don’t believe I have the right to re-sell it on Jigsaw in good conscience (they’d disagree 18M times). If it’s a colleague’s card, on the other hand, I might take the initiative to forward a new lead, or even buy a gift subscription to a magazine. Does that constitute a violation of their privacy, or spam?

    Social networks haven’t let their users make their own decisions on this issue. Through selective enforcement of their policies, some startups get locked out while big partners get exemptions. Power.com ended up in (and out of) court. Plaxo found out the hard way that they couldn’t assist their paying customers to OCR Facebook email addresses; or to synchronize with LinkedIn. It says a lot about LinkedIn’s draconian ToS that even with paying customers demanding it, Comcast hasn’t signed up for their API. Even if users manually download their own LinkedIn address books, it won’t even include links back to folks’ public profile pages.

    Don’t Accept Incompetence

    I also claim that social networks are engaging in Privacy Theater because there’s no shortage of examples of organizations on the Web that process vast quantities of PII while providing real privacy protection. Do you think that the “bad guys” haven’t gone after Webmail services to phish passwords and harvest contact information? Aren’t e-commerce sites sharing product information and reviews out to legions of affiliates without leaking your purchase history? How long do you think RockYou would have gotten away with it if they were asking for your online banking username instead of your email address?

    Social network sites have not (yet) demonstrated the high degree of proactive surveillance and enforcement characteristic of other organizations that deal with PII on the Internet. Users see worms on MySpace and viruses on Facebook, but not on Hotmail — because they defend against cross-site-scripting attacks. Users find malware distributed on Slide, but not on Wikipedia — because they filter content aggressively. Users are blocked by DDoS attacks and DNS attacks on Twitter — but Amazon stays up because they can react in real-time (mostly). How much more quickly do Cease & Desist letters for putting up a fake PayPal logo go out than for impersonating a Facebook Page?

    From personal conversations, I’m beginning to wonder if the recent rise of Hadoop is part of the problem, surprisingly. Trying to detect patterns of abusive crawling and suspicious bursts of activity from partner apps by analyzing yesterday’s log files alerts you too late to react. The culture of many social networking websites seems to emphasize page load times (especially after the great Friendster meltdown), which isn’t quite the same as the enterprise IT, networking, and transactional database backgrounds of other leading Web architects. And unlike the formal (and informal) networks of security officials at online financial institutions to track distributed threats, I fear we have little evidence of coordinated responses to privacy threats that correlate identities across social networks.

    I have first-hand experience that it takes more time (and more money) to ship applications that comply with social networks’ privacy policies. If we weren’t living with Privacy Theater, that might not have been a wasted investment. Inevitably, Gresham’s Law kicked in, and the good guys are being driven out by the bad guys (spammy apps, scammy apps, sneaky apps, conniving apps).

    Privacy Theater: The Show Must Go On…

    Naturally, I prefer to think of myself as one of the ‘good guys.’ I prefer to believe that privacy protection is a competitive advantage that users (citizens!) really value. Until this outrageous RockYou breach, I didn’t fully realize how irrelevant that is.

    I’d argue that the hapless state of ToS enforcement by the major social network platforms only provides the feeling of improved privacy while doing little or nothing to actually improve privacy: that’s privacy theater.

    Unfortunately, that analogy is still unfair: TSA may screen children at the airport, but at least their security theater doesn’t obscure the fact we haven’t had a catastrophic security failure in the US air transportation system (yet). Our major social networks’ privacy theater is distracting us from ongoing, large-scale identity theft and misuse of private and personally-identifiable information.

    If the industry expects self-regulation to forestall government regulation, well, here’s what I think it would take: An immediate ban on all of RockYou’s applications by all of their partners, pending a public audit of all of their apps. That’s taking a page from the audit provisions of LinkedIn’s ToS and adding sunlight by publishing the results.

    Sounds harsh? I thought the market was supposed to provide swifter, surer justice than some pesky regulator with its clunky old notions of due process and presumptions of innocence. API agreements are a private matter between ruthless corporations. Heck, if they really wanted to put the rest of the ecosystem on notice, they ought to audit every application funded by Sequoia, Partech, DCM, and Softbank, all lead investors in RockYou.

    It’s not like lawsuits are being filed, as Marissa Mayer announced by going after work-from-home scam artists in an interview with Mike Arrington at LeWeb. It’s not like this is Scamville 2.0, since this isn’t stealing users’ cash, only their dignity. It’s not like there’s a legal spotlight on the issue, since there’s only $9M set aside for a hazy new privacy foundation in the latest Facebook class-action settlement. It’s not like it’s a political issue in the headlines, since a Facebook Chief Privacy Officer is running for Attorney General, the top law-enforcement office in California. It’s not like it’s as complicated as “don’t be evil,” since I can give you one simple tip to eliminate privacy theater: enforce your ToS and obey others’ ToS — or else stop setting unrealistic expectations and just let users have their data back!

    (Photo credit: Flickr/FaceMePLS).

    Crunch Network: MobileCrunch Mobile Gadgets and Applications, Delivered Daily.


    Buy This Item: [Click here to buy this item]

    Read Original Article

  • Lenovo’s wireless Multimedia Remote with Keyboard sneaks out for retail

    In an age of advertising hyperbole so gratuitous that every spec tweak or color change is accompanied by a press release, it’s honestly refreshing to watch Lenovo tip-toe interesting new products into retail with nary a peep. Like this palm-sized Multimedia Remote with Keyboard spotted by an Engadget reader inside a Singapore mobile phone shop. Seems this wireless pup (model 57Y6336) has been on sale for about a week across the globe with a $60 MSRP or about $30 after a quick Google for discount coupons. That meager tithe takes home a 2.4GHz keyboard with trackball and USB “nano dongle” for your Windows home theater PC good for about 10-meters of wireless sofa surfing. See it in the wild after the break.

    [Thanks, Bryan C.]

    Continue reading Lenovo’s wireless Multimedia Remote with Keyboard sneaks out for retail

    Lenovo’s wireless Multimedia Remote with Keyboard sneaks out for retail originally appeared on Engadget on Mon, 28 Dec 2009 01:35:00 EST. Please see our terms for use of feeds.

    Permalink   |  sourceLenovo  | Email this | Comments

    Buy This Item: [Click here to buy this item]

    Article

  • GoPro HERO Wide action cam goes high-def

    GoPro HERO Wide action cam goes high-def

    In the past few years, several companies have started selling tiny, rugged, inexpensive “action” video cameras designed to be mounted on wild-n-crazy vantage points such as mountain bike helmets, hang-gliders or even model rockets (yes, it’s been done). Up until recently, however, a common complaint about these cameras was that their lenses weren’t wide enough to capture all the action. That problem was squarely addressed with the autumn 2008 release of a new camera, the GoPro HERO Wide. Now, GoPro has gone one better by introducing a High-Definition version of that same model…

    Tags: ,
    ,
    ,
    ,

    Related Articles:


  • Eco Architecture: Coca-Cola opens new sustainable headquarters in Spain

    coca cola green headquarters_1

    Eco Factor: Sustainable office building harvests solar energy for heat and power.

    Coca-Cola has unveiled new headquarters building in Madrid that follows new sustainability criteria to improve energy-efficiency and reduce the center’s dependence on grid electricity for heat and power. Located in Calle Ribera del Loira, the new center has been designed by Puerta+Asensio Architects and is constructed by Ferrovial.

    (more…)

  • Diggnation’s Alex Albrecht launches an iPhone app: Duel

    Alex Albrecht is on Wikipedia. Therefore, he is important. Not only that, but he also made a cool iPhone app that hit the store for just $1. Cheap. Like all the other iPhone apps. Unlike most other $1 iPhone apps, this one is pretty fun.

    The concept is simple: Duel enables you to host a duel on your iPhones. (Don’t fret, parental-types; though this iPhone duel will pay homage to the duels of the Wild Wild West, it will differ in one major way: nobody’s gonna get shot.) Instead, should you lose, you will simply find your fellow dueler’s ugly mug laughing hysterically in your face. Here’s how you duel: All you need is two people with two iPhones. Both need to have the app (so you could argue this app really costs $2, which is still cheap). You connect your iPhones via Bluetooth, and then you raise your phones vertically. The timer on the phones counts down from 3. Once it hits zero, you turn your phones horizontally to shoot. First one to shoot wins.

    Read the rest of this entry at MobileCrunch >>

    Crunch Network: CrunchBoard because it’s time for you to find a new Job2.0


    Buy This Item: [Click here to buy this item]

    Read Original Article

  • America, please grow a spine

    Another mentally ill al Qaeda cannon fodder has tried to blow up an airplane. It’s encouraging that they’re still scraping the barrel to recruit suicide bombers.

    Meanwhile, in America, there are rumors that we’ll have to forsake electronics and all motion or access to personal goods for the last hour of flight. At one point it was rumored that we’d have to go without a book for the “last hour”. We might as well scratch all children and many adults with medical, cognitive or psychiatric disorders from flying.
    Oh, and I love they way they say “last hour” as though planes never spend 1-2 hours circling the airport or waiting for a gate.
    Meanwhile anyone who’s seen a movie or read a book about smuggling or prisons is waiting for the first bomb smuggled in by body cavity – or surgically embedded into the abdomen. The next generation of scanners will have to incorporate a rectal probe.
    The TSA administrators can’t be as stupid as they look. They must know there’s really no practical way to secure an airplane (train, bus, public space) against a truly competent and determined attacker. The best we can do is balanced risk mitigation. As Schneier has told us so many times, the big changes post 9/11 were to secure the cockpit door and look to the courage of passengers.
    So if the TSA administrators aren’t stupid, where do these regs come from? They come from legislative pressure. Now, many of our legislators are stupid, but not all of them. So why do they do this?
    Because they know if a plane blows up and they didn’t max out on security theater they’ll be out of office – because we American voters are who we are.
    We gotta stop this. Voters and legislators alike need to grow an American spine — before our fear and stupidity drives us off the deep end of history.
    Update 12/29/09: Signs of vertebral development. The absurd early responses have been dropped. Also, rectal bombs have already been used in Saudi Arabia.
  • Minimed Infusion Set options/top choices

    When I went back on the pump, I was automatically shipped the Quick-Set infusion sets to use. I don’t think that any of my very minor irritations with the sets I use are specific to this type, but I am curious as to what others preferences/experiences are with the various types offered.
    Thanks 🙂
  • Getting Trained on the One Touch Ping

    I go in for my class on how to use the One Touch Ping on Wednesday. I’ve never used a pump before and have only been a Type 1 for a little over a year as a result of another medical complication.

    I’ve read up on the Ping, and searched this forum endlessly over the past 3 months.

    But I still feel like I’m going in blind.

    I know the Diabeties Learning Center where my Endo is at will teach me a lot about it, but are there any questions I need to ask? The manual has already put me to sleep once.

  • Cost-effective All-in-One Touch POS Solutions

    As the days of 2009 dwindling, Sinocan launches 12 inch touch POS terminal, which is likely to drive customer-facing retail technologies in the coming year.

    Eco-Friendly Point-of-Sale Systems

    Global warming and other environmental concerns are changing the way people live and do business. Sinocan and Intel are working together to offer cost-effective green retail solutions designed to help retailers to achieve their environmental goals and build customer loyalty for its brand image improvement in a fiercely competitive industry.

    Featured with low power consumption technology, Sinocan F06-12 is designed as a valuable, steady and efficient POS solution.

    Sinocan F06-12 is the best solution for the space efficiency ever you can get. With ultra compact footprint and VESA mounting compatibility, Sinocan F06-12 is the one and only choice for space-limited applications

    Cost-saving Point-of-Sale Systems

    Just plug and play. Selecting packaged POS technology which your new employees can quickly learn how to use.

    Cost-saving. With Sinocan, you get a wide selection of rugged and user friendly hardware platforms which are pre-certified to deliver the full capabilities of your specific POS application.

    Time is money. More time you spend on employee training and trial running means that more cost and expense you have to bear. Sinocan F06-12 is an intuitional pug-and-play device which conforming all industry standards and is compatible with all X86-based hardware and supporting all Windows OS (Windows 95, 98, 2000, XP, Vista, 7), Linux, WebOS etc.

    With Sinocan F06-12, no more costly employee training and system maintenance.

    Reliable, Flexible, Scalable, Upgradeable

    You need a reliable, flexible, scalable and upgradeable POS system to handle your business which grows day by day. Sinocan F06-12 is featured with smart design and modular POS stand for future changes in load demands, and could satisfy your entire POS requirement through the entire lifecycle.

    Fanless Solution with Rich Functionalities

    Highest performance with eco-friendly is the ideas Sinocan holding on POS design and development. Powered by Intel ATOM 1.6GHz CPU and cooled by fanless solution. With extensive functionalities and rich connectors, F06-12 offers you powerful performance and cost-saving efficiency. For more information, please visit http://www.lcdpc.com.cn/Pro_Fanless_POS_12.php .

  • NEW! Silvent F1 Air Nozzles special

    SILVENT F 1 is a cooling nozzle with FRIGUS technology that is especially designed for spot cooling where unwanted heat occurs due to material milling, drilling, grinding, turning etc. Maintaining a reduced temperature during machining operations facilitates the process and extends tool life. F 1 generates a low noise level.

    Its revolutionary design is compact and the unit is simple to install. It is easy to replace your standard nozzle with a FRIGUS cooling nozzle. F 1 cools the target while blowing away chips and enhancing quality.

    FRIGUS technology provides the possibility to quickly and easily adjust both the air consumption and cold fraction you need.

    This simple, unique control design allows you to set air consumption in relation to your refrigeration requirements. F 1 also complies with the noise limitations of the EU Machine Directive and OSHA safety standards. Patent pending.

  • Bestact – Power Reed Switch for Railway industry

    Since Bestact, a hermetically sealed glass contact power reed switch, was placed in service over 15 million have been used worldwide in rolling stocks, electric power equipment, elevators and control devices in the steel industry. Their adption in 1982 by Japanese National Railways for Shinkansen Bullet trains, it has grown along with the success of the trains themselves, and is exclusively used in all Shinkansen Bullet tains at the moment.

    As the recent demand for maintenance free components, high contact reliability and safety continues to grow, so will the appication of Bestact. Bestact has seen extensive use in ATS wayside coil controlling relays and door interlock switches throughout the 80’s and 90’s and in ATC, ATO devices from the year 2000 and on.

    Bestact has been shown to be the optimum solution for train and railroad signal applications that require extremely high reliability.

  • BEUMER successful with high-capacity belt bucket elevators in India

    India’s booming activity in the building industry increases the demand in cement. In order to meet it, more and larger cement plants have been erected. Bucket elevators are used to transport raw meal to the heat exchanger. Both the application of advanced technologies and the experience of the BEUMER group are convincing: The BEUMER group has been supplying high-capacity belt bucket elevators to Indian cement manufacturers as ACC Ltd. which is part of the Holcim Group for years.

    The main growth drivers in India are the development of the infrastructure and the private housing construction. Approx. 500 billion USD are supposed to flow into the modernization and expansion of traffic routes, airports and seaports as well as into the energy and water supply up to 2012. According to information of the Cement Manufacturers Association (CMA), the expenses for cement constitute, depending on the project, between 8 and 30 per cent of the total cost. In order to meet the increased demand for this treasured material, the Holcim Group – the second biggest cement manufacturer in the world – has erected together with its subsidiary Ambuja Cement a large plant with a daily output of 8,500 tons in Bhatapara, India. Thanks to the highly advanced level of technology and comprising experience, a high-capacity belt bucket elevator of the BEUMER intralogistics specialist will be used.

    The BEUMER high-capacity belt bucket elevators are used for transporting in optimal way fine-grain to powdery products in mass flows. The grain size determines the type of bucket mounting to be used: Segment fastenings are used up to a grain size of 25 millimetres and BEUMER rubber-metal fastenings for grain sizes between 25 and 60 millimetres. A belt clamping connection for steel wire belts as traction element developed specifically by BEUMER offers a long lasting service life of the belt. In case of large centre distances, the high-capacity belt bucket elevators are provided with monitoring switches. This way, the fit of the belt clamping connection is continuously monitored. Owing to the safety system developed by BEUMER, this monitoring is contactless, wear-free and reliable.

    The BEUMER belt bucket elevator used in the cement plant in Bhatapara (India) is characterized especially by its huge height of 158 metres and by its considerable width of 1.25 metres. The conveying capacity amounts to approx. 650 tons per hour. The high-capacity belt bucket elevator used in Karnataka (South-India) is even higher. Within the context of the increased kiln performance, the company ACC Ltd., which belongs to the Holcim Group, is actually building up a large cement plant with a daily output of 13,000 tons in the Wadi plant. Here, a high-capacity belt bucket elevator with a centre distance of 175.3 metres and a conveying capacity of 600 tons per hour will come into operation.

  • BX4 motors with integrated compact electronics

    Electronic commutated 4 Pole Motor Series extended by 32mm types

    The brushless 4 Pole DC servomotors of the renowned BX4 Series from FAULHABER are supple-mented by motors with a diameter of 32mm. A long operational lifetime, a high, cogging-free output torque and the lack of adhesive-bonded joints characterize these powerful motors, requirements for many applications like robotics, automation, medical, machinery, aerospace and aviation. The new drives are available in two lengths of 42 or 68 mm in voltage types of 12 or 24 V. They captivate with an extremely flat slope of the n/M curve and an excellent torque-to-volume ratio and provide a con-tinuous output torque of 56 or 97 mNm.

    Besides the combination with external control electronics from FAULHABER, the motors are also available with integrated Speed Controller (SC), as two-wire version (SCDC) and with integrated Motion Controller (CS). All products with integrated electronics are equipped with an automatic limit-ing of peak and continuous current to protect motor and electronics. Separate power supply for mo-tor and electronics is optionally available.

    The SCDC type is easy to handle due to the two-wire connection. It can be used in applications with higher lifetime requirements to substitute a brush-type DC motor. Therefore the motor provides a inverse-polarity protection, the direction of rotation is selected with the terminal assignment.

    The CS version is based on the approved FAULHABER Motion Control Systems, whose compact dimensions are a great benefit for many applications. It has a serial interface RS232 and can be configurated with the FAULHABER Motion Manager 4.3 software. The increased temperature range of -20…+100 °C and the thermal limited continuous current up to 2,6 A extend the area of applica-tion of the new drives. The system is available with customer firmware on request.

    The motor versions with integrated encoder in the robust housing offer four factory programmable resolutions from 32, 64, 128 to 256 pulses and a separate index channel.
    A line driver version with differential signal output is optionally available.

  • Rösler offers waste water treatment systems

    Annually about 100 systems with automatic sludge removal and about 250 semiautomatic systems are sold. However, this elaborate technology can be utilized for applications like dewatering of the sludge from paint booths, the treatment of waste water generated during the glue operation in wood processing industries, the processing of waste water created in glass grinding operations as well as the cleaning of effluent containing silicon carbide (SiC) that is generated in the production of semi-conductors and wafers. One reason for the successful use of Rösler centrifuges in these applications is the high throughput of up to 6,000 liters/hour with the automatic centrifugal filter systems. Of great importance are not only the cleanliness requirements for the different applications but also the physical limits regarding particle size and weight.
    The design of the Rösler centrifuges places great emphasis on ease of maintenance, especially accessibility to the rotary drum with indirect drive. The drum itself comes standard in aluminum; for special applications like for the separation of glass particles or silicon carbide it is made from stainless steel. This prevents a chemical reaction and, thus, corrosion of the drum. The drum has a capacity of up to 30 kg of sludge with the advantage of long time intervals between sludge „peeling“ cycles. With regard to sludge peeling the Rösler design offers another advantage: In competitive systems the peeling knife is constantly rotating with the drum, and it must be moved to the drum wall for the peeling cycle with a gear motor. In the Rösler systems the peeling knife is completely independent from the rotary drum. Mounted on a linear guide rail the peeling knife is pneumatically moved to the inner drum wall for the peeling cycle.
    The peeling cycle is followed by a rinse step for removal of residual sludge. This prevents an imbalance in the rotary drum during the subsequent cleaning cycle.
    The clean liquid phase – separated from the solid phase in the high-speed drum – is picked up by a pickup tube and transported to either a clear water buffer tank or directly to drain. Frequently, the mechanical cleaning effect of the Rösler centrifuges is supported by the addition of special chemical flocculants which allow the removal of very fine particles from the effluent.
    In Germany Rösler is certified as a waste recycling company and, thus, is authorized to take back the sludge from centrifuge applications.

  • MINIFLASH – The new age in Flashpoint Testing

    Using a unique patented flashpoint method, the MINIFLASH flashpoint tester from GRABNER INSTRUMENTS (Austria) offers best repeatability and unmatched versatility for flashpoint testing. By using only 1-2 ml sample volume and by testing the flashpoint in a completely sealed metal cup, the MINIFLASH guarantees highest safety and eliminates the risk of open fires commonly experienced when testing flashpoint.

    Operating a classical Pensky Martens flashpoint tester can be tedious and frustrating. Complicated preparation and method selection require the work of a skilled technician to
    generate repeatable, unbiased results.

    Contrary to the old Pensky Martens method the MINIFLASH offers best in class handling: Simply select the method, put in 1 ml sample and press run. Clean the small sample cup with a tissue afterwards and start the next measurement. Thus an average 10 samples per hour can be tested with the MINIFLASH, results exceeding precision of the common EN ISO 2719 and D93 flashpoint standards. The MINIFLASH 8-position sampler model allows 45 minutes unattended flashpoint testing, ensures highest productivity and thus pays off instrument costs in a few months.

    When asked for their opinion on the MINIFLASH, ease of use, portability and best performance even under the most adverse conditions are voiced by our customers: “All units have been very good for us. Very user friendly, efficient and strong enough to last in an offshore environment. I remember the old days for testing flash points and these units are light years ahead in design and ease of use,” says Wayne Russell, MI-Swaco, offshore oil platform.

  • Smart Grid Will Generate $200B of Global Investment

    Back in October during our smart grid webinar, we referenced a report on the smart grid from Pike Research that had some pretty massive global figures. Well, this morning Pike has officially launched that report which says the smart grid market will bring in $200 billion in worldwide investment between 2008 and 2015. Out of […]


  • Vital Signs: An Uninvited Guest

    The young woman carried a baby that wasn’t her own—and wasn’t even a human.

  • 5 Questions: The Rock’n’Rolling, Sky-Diving Master of Memory

    Daniela Schiller served in the Israeli army, but it was not until she went parachuting during college that she truly understood the power of fear. Now she is building on that epiphany as a postdoc at New York University, studying memory and fear with leading neuroscientists Elizabeth Phelps and Joseph LeDoux.

  • Eco Tech: Ashghal to develop solar-powered robots for regulating traffic

    robot

    Eco Factor: Traffic regulating robots powered by solar energy.

    Qatar’s Public Works Authority (Ashghal) with support from the Qatar Science Club will soon be developing new robots that will replace the manual methods used in guiding traffic at varies road project sites. The green robots will be powered by solar energy harvested by onboard solar panels.

    (more…)