Honda recalls fire risk cars

Saturday, January 30, 2010

Honda have issued a recall for 646,000 cars around the world due to a potential fault that could cause a fire. The recall involves the ‘Jazz’ range of cars, which is known by its alternative name, Fit, in some countries.

water intrusion into the power window switch housing may in some instances cause a short circuit

Three incidents involving the problem, caused by a defective master switch, have been reported worldwide, two in the US and one in South Africa. In September 2009, Vanilla Nurse, a two-year old girl, was sleeping in one of the models, when the hatchback in Cape Town caught fire. Following the accident, Honda “launched an extensive investigation to determine the cause of the incident,” according to a statement issued today. Although they could not isolate the cause of the fire, “the investigation has shown that water intrusion into the power window switch housing may in some instances cause a short circuit, which in exceptional circumstances may lead to potential damages”.

Just 10% of cars are expected to need new switches. The remainder will need a waterproof skirt in order to keep water out.

Rival Toyota was forced to recall vehicles on Thursday, citing floor mats that may stick accelerator pedals to the floor. There are fears that Toyota may have to widen their recall to cover up to eight million cars.

[edit]

Inflation in Zimbabwe becomes world’s highest at 11,000% and rising

Saturday, June 23, 2007

Inflation in Zimbabwe is now the world’s highest at 11,000 percent and rising. Reports first came in that the value of the Zimbabwean dollar had reached an all-time low two days ago, at which point the official inflation rate was 4,500 percent. Even though this was already high enough to be the world’s highest, to make matters worse, independent financial sources estimated the figure to be closer to 9,000 percent. Yesterday, reports came in that inflation had risen to 11,000 percent.

US Ambassador to Zimbabwe Christopher Dell is reported to have told The Guardian newspaper over the telephone that he believes inflation “will hit 1.5 million percent by the end of 2007, if not before,” adding that he “know(s) that sounds stratospheric but, looking at the way things are going, I believe it is a modest forecast.” Dell went on to predict that president Robert Mugabe would be forced out of power by the hyperinflation, a prediction also made by opposition leader Morgan Tsvangirai.

Dell added that he felt Mugabe would be out in “a matter of months, if not weeks” and justified his comments with the rationale that “It destabilises everything. People have completely lost faith in the currency and that means they have completely lost faith in the government that issues it.” Tsvangirai comments to the Associated Press were that: “He’s got an economy that’s down on its knees, he knows he cannot sustain it.” Despite this, Mugabe has expressed intentions to stand for the next election.

Exchange rates for the U.S. dollar have reached an official 15,000-1, but on the black market, according to one anonymous illicit money trader, deals have reached 140,000-1 in cash, with a shortage of bank notes creating a 200,000-1 premium on bank transfers and large overseas deals reaching as much as 300,000-1. Meanwhile, in the course of a week the black market exchange for the UK£ has risen from 160,000-1 to 400,000-1. Despite these increases, Mugabe remains adamant that his currency should not be devalued, and is keeping official exchange rates fixed, with the rate for the US$ fixed at 250-1.

The dealer said that added uncertainty had arisen from talks held between the current government and the opposition party, the Movement for Democratic Change. The official press services published propaganda describing the talks as the opposition negotiating “in bad faith” for its own political gain.

Shops are running out of goods due to the huge cost of imported goods and the lack of local ones due to the closure of inflation-crippled factories. “If it goes on like this, we’ll have nothing to sell, we’ll have no staff and we’ll have to close down completely,” said one store manager, who was unnamed because he feared retaliation by the state for being a “prophet of doom”. Other shops have been closing down temporarily to change their prices.

Hyperinflation is also worsening already crippling poverty in Zimbabwe, with people unable to afford the necessary goods for survival. State regulations limit bank money withdrawals to Z$1.5 million per day, hopelessly inadequate given current currency values. One person’s pension company informed him he would no longer receive statements because the value of his pension fund had decreased to less than that of a postage stamp.

The state daily Chronicle in the second city of Bulawayo reported that Western countries were planning to become involved with the situation upon Mugabe’s departure with a rescue package valued at US$3 billion. Western officials have confirmed that budget proposals exist relating to, according to the Associated Press, “food support, public services reform and the rebuilding of agriculture and general infrastructure over five years in a new political landscape led by reformist Zimbabwean politicians.” However, state media again ran propaganda-based stories, saying that Western powers and their close political friends, who state media call the “Fishmongers Group”, were “working overtime to destroy the economy, mutilate the Zimbabwe dollar, foment civil unrest and then dangle a rescue package to win the support of gullible politicians.”

Wikinews holds a follow-up interview with Max Riekse, Constitution Party candidate for the 2008 U.S. presidential election

Friday, April 25, 2008

In March, Wikinews held an exclusive interview with Max Riekse, one of the candidates for the Constitution Party nomination for the 2008 United States presidential election. With the Constitution Party’s national convention underway this weekend, we spoke with him one last time before he either becomes his party’s candidate or loses.

Riekse is a retired decorated Lieutenant Colonel in the U.S. Army who served in both the Vietnam War and the Iraq War. He is also a former public school teacher and Assistant Professor of Military Science at Western Michigan University. He has a B.A. in Political Science and International Relations from the University of South Florida as well as two M.A.s, one in Political Science and International Relations, the other in Education and History. Both are from Western Michigan University.

We asked him if he thinks he has a good shot at winning the Constitution Party nomination and ultimately the presidency. He replied, “I will know Saturday the 26th if I win the nomination of the Constitution Party. As to wining the general election, I’m very sure that I will do far better then we have done in the previous 20 years as a ‘third’ party. I’m not only more qualified to be commander in chief then either the Democrat or Republican, but will be far better for the country.”

When asked about America’s illegal immigration problem he replied, “I will send all 20 to 30 million home. End birth right babies; no social security for them, etc. They are here illegally; now what part of that does anyone not understand?”

Riekse is running for president because “the Republicans and Democrats would not be having candidates that would solve the problems we have in this country and I know that I could do a lot better with my 32 years of military experience and over 20 years in Education, both in the K-12 public school venue and teaching at the University level.”

Contents

  • 1 Interview
  • 2 Related news
  • 3 Sources
  • 4 External links

‘Kama Sutra’ worm set to strike

Friday, February 3, 2006

Computer security experts warn that a malicious computer worm, dubbed “Kama Sutra,” is set to wreak havoc this Friday, February 3rd on Microsoft Windows computers worldwide. Kama Sutra is designed to destroy files that end in .doc, .zip and .pdf.

The Kama Sutra worm has been spreading through cyberspace since January 16, packaged in emails with subject headings such as: “give me a kiss” and “crazy illegal sex.”

When users click an email attachment, their PCs become infected with destructive, self-replicating software. The worm affects Microsoft Windows operating systems and is programmed to go to work on the third of every month, overwriting or corrupting Microsoft files and others such as Portable Document Format (PDF) files.

“This one can damage your office files, your Microsoft Excel spreadsheets and your PowerPoint presentations,” Tino Klironomos, a computer retailer, said. “(The files will be) all gone, history.”

Computer security company LURHQ reports that there may be hundreds of thousands of machines already infected with the worm, which also goes by the monikers “BlackWorm,” “CME-24,” “Blackmal,” “Mywife.E” and “Nyxem.”

To prevent the worm, Windows users should arm themselves with anti-virus software. People can also protect their PC with up-to-date anti-virus gear and firewall protection. Free anti-virus tools are available from many anti-virus organisations. These tools can detect and remove the Kama Sutra worm from an infected machine.

Experts say: “Make sure your virus definitions are up to date. Besides being careful about opening email messages and attachments, users should back up their most valuable computer files on an external device such as a CD, zip drive or DVD.”

Steve Bass at PC World says: “Stop worrying. If you update your virus program signatures regularly, and do a weekly AV scan, I don’t think you have much to worry about…”

Other advice is not to open any messages with the subject headers “crazy, illegal sex”, “give me a kiss” and “hot movie.”

The worm will not affect machines running on non-Windows operating systems such as Mac OS X or GNU/Linux.

Many security systems reported a very small amount of vandalism, even though the threats were very high.

Will Wikimedia “run on Sun”?

Wednesday, January 9, 2008

This article mentions the Wikimedia Foundation, one of its projects, or people related to it. Wikinews is a project of the Wikimedia Foundation.

An internal Wikimedia communiqué was leaked over the weekend. Like many e-mails, the document is a chain of forwards, replies, and attachments. The attached Portable Document Format (PDF) file was from a PowerPoint presentation, entitled “Wikimedia Foundation: Past, Present, and Future”. The presentation is watermarked confidential, do not distribute, and details the Foundation’s recent financial, technical, and traffic history, outlines near-term forecasts for all three, and makes suggestions for slightly longer horizons as well. By itself the document led to several inter-connected news stories.

Contents

  • 1 Wikimedia Foundation approaches donors
  • 2 Mediawiki technology
    • 2.1 Kaltura collaborative video
    • 2.2 Flagged revisions
  • 3 Forecasts and financials
  • 4 Sources

Evolution Of Role Of Bios}

Evolution of Role of BIOS

by

Roberto Bell

Older PC operating systems, which were developed for 16-bit CPUs, such as MS-DOS, relied on the BIOS to carry out most input/output tasks within the PC. A variety of technical reasons eventually made it inefficient for more recent operating systems written for 32-bit CPUs such as Linux and Microsoft Windows to invoke the BIOS directly. Larger, more powerful, servers and workstations using PowerPC or SPARC CPUs by several manufacturers developed a platform-independent Open Firmware (IEEE-1275), based on the Forth programming language. It is included with Sun’s SPARC computers, IBM’s RS/6000 line, and other PowerPC CHRP motherboards. Later x86-based personal computer operating systems, like Windows NT, use their own, better-performing, native drivers and also made it much easier to extend support to new hardware, while BIOS still relies on a legacy 16-bit runtime interface. As such, the BIOS was relegated to bootstrapping, at which point the operating system’s own drivers could take control of the hardware.

There are same transitions for the Apple Macintosh, where the system software depends on the Tool Box”that includes a set of drivers and other valuable routines collected in ROM depending on Motorolas 680×0 CPUs. These Apple ROMs were superseded by Open Firmware in the powerPC Macintosh, then EFI in the Intel Macintosh computers. There were a similar transitions for the Apple Macintosh, where the system software originally relied heavily on the ToolBox”a set of drivers and other useful routines stored in ROM based on Motorola’s 680×0 CPUs. These Apple ROMs were replaced by Open Firmware in the PowerPC Macintosh, then EFI in Intel Macintosh computers.

[youtube]http://www.youtube.com/watch?v=EvIZWKh0KbY[/youtube]

BIOS is loaded with intricate functionalities such as ACPI. These functions cover power management, hot swapping with the inclusion of thermal management. However, BIOS limitations that cover 16bit processor mode with the availabilty of 1MB addressable space and PC AT hardware dependencies and so on are considered to be inaccessible for the previous computer platforms. Extensible Firmware Interface is a part which make the replacement of the runtime connectivity of the legacy BIOS

Brian Anderson writes on topics such as

Dell BIOS Password

,

BIOS Password

,

BIOS Password

Visit

Evolution of Role of BIOS

.

Article Source:

eArticlesOnline.com }

IEEE approves 802.11n standard after six years

Saturday, September 12, 2009

On Friday, the Institute of Electrical and Electronics Engineers (IEEE) ratified the next generation of Wi-Fi Alliance certification known as 802.11n. The path to ratification began on September 11, 2003 with 11 major drafts of the specification over the course of six years. Even though just approved, wireless devices have been available on the the market for over two years, running on what is known as “draft n” or “pre-N”.

The 802.11n standard operates on both the 2.4Ghz and 5.0Ghz frequencies. This will allow it to be backwards compatible with 802.11a, 802.11b and 802.11g, provided that the base station has dual radios. The speeds of 802.11n are substantially faster than that of its predecessors with a maximum theoretical throughput of 600Mbit/s.

Very few additions were made to the 802.11n draft standard over the last two years, so most if not all “draft n” hardware available on the market today is expected to be compatible with n-standard devices available in the future. In a similar process of the upgrade from “pre-G” to 802.11g, it is expected that most manufacturers of wireless hardware will release new firmware to bring all draft devices up to full standard compliance.

50 Italian parliamentarians call for global summit for “a new financial architecture”

Thursday, March 17, 2005

A letter and motion to be debated by Italian Parliament this week calls for action to address speculative bubbles and potential future financial crashes in the global economy. The motion asks for a global summit similar to the 1944 Bretton Woods United Nations Monetary and Financial Conference, which gave us the IMF and World Bank.

The letter raises questions about the sustainability of current financial trends, based on the highly speculative nature of today’s markets. For example, according to the letter, “It is estimated that the entire financial bubble, counting all financial derivatives and all other forms of existing debt, is equal to about $400 trillion, compared to a worldwide GDP of slightly more than $40 trillion”.

Last years collapse of Italian dairy company Parmalat, with “14.3 billion euros that must still be accounted for”, is given as evidence for “a lack of effective tools and controls regarding financial operations”. Enron, which famously collapsed in November 2001 revealing faudulent accounting practices from previously respected accounting firm Arthur Andersen, is given as another example.

Oddly, the largest collapse on record, that of WorldCom, is not mentioned, though the set of examples is not purported to be exhaustive. A number of other crashes are mentioned: the LTCM fund, Argentine bonds, Cirio, and Finmatica.

The motion, linked to supporters of the Lyndon LaRouche movement, is signed by Parliamentarians Lettieri, Soro, Delbono, Tolotti, Widmann, Villani Miglietta, Rosato, Albertini, Morgando, Diana, Luigi Pepe, Damiani, Ostillio, De Brasi, Maccanico, Carbonella, Paola Mariani, Grandi, Pistone, Giovanni Bianchi, Giacco, Benvenuto, Piscitello, Camo, Realacci, Squeglia, Rocchi, Iannuzzi, Intini, Meduri, Santino Adamo Loddo, Boccia, Villari, Chianale, Siniscalchi, Sandi, Cusumano, Cennamo, Annunziata, Rotundo, Bonito, Buemi, Pennacchi, Fanfani, Tarantino, Rodeghiero, Angioni, Detomas, and Nesi.

Debate was scheduled for March 14-18.

‘Kama Sutra’ worm set to strike

Friday, February 3, 2006

Computer security experts warn that a malicious computer worm, dubbed “Kama Sutra,” is set to wreak havoc this Friday, February 3rd on Microsoft Windows computers worldwide. Kama Sutra is designed to destroy files that end in .doc, .zip and .pdf.

The Kama Sutra worm has been spreading through cyberspace since January 16, packaged in emails with subject headings such as: “give me a kiss” and “crazy illegal sex.”

When users click an email attachment, their PCs become infected with destructive, self-replicating software. The worm affects Microsoft Windows operating systems and is programmed to go to work on the third of every month, overwriting or corrupting Microsoft files and others such as Portable Document Format (PDF) files.

“This one can damage your office files, your Microsoft Excel spreadsheets and your PowerPoint presentations,” Tino Klironomos, a computer retailer, said. “(The files will be) all gone, history.”

Computer security company LURHQ reports that there may be hundreds of thousands of machines already infected with the worm, which also goes by the monikers “BlackWorm,” “CME-24,” “Blackmal,” “Mywife.E” and “Nyxem.”

To prevent the worm, Windows users should arm themselves with anti-virus software. People can also protect their PC with up-to-date anti-virus gear and firewall protection. Free anti-virus tools are available from many anti-virus organisations. These tools can detect and remove the Kama Sutra worm from an infected machine.

Experts say: “Make sure your virus definitions are up to date. Besides being careful about opening email messages and attachments, users should back up their most valuable computer files on an external device such as a CD, zip drive or DVD.”

Steve Bass at PC World says: “Stop worrying. If you update your virus program signatures regularly, and do a weekly AV scan, I don’t think you have much to worry about…”

Other advice is not to open any messages with the subject headers “crazy, illegal sex”, “give me a kiss” and “hot movie.”

The worm will not affect machines running on non-Windows operating systems such as Mac OS X or GNU/Linux.

Many security systems reported a very small amount of vandalism, even though the threats were very high.

Hot Stone Massage}

Hot Stone Massage

by

Jane Wyvern

Do you know what hot stone massage is? Ever tried taking advantage of this therapeutic marvel? If you haven’t, then read on about what this kind of massage is and what benefits it can provide for you.

Since a few years ago, the idea of using hot stone massage has become widely accepted as a great addition to the world of massages. It’s present in the healthcare industry for a good reason. In the previous four years, this type of massage has become the in-thing of spas, clinics, salons, and therapeutic centers across the globe. In today’s world, it’s considered a very effective way to conduct massage, and complements the more traditional practices.

The Beginnings of Hot Stone Therapy

Despite what many people believe, the concept behind hot stone massage didn’t originate in the Arizonan desert, or as part of a saint’s vision, as some massage therapists claim. In fact, the origins of this massage go back 5000 years. It was seen in ancient India with the therapeutic traditions of Ayurveda. Research indicated that this kind of therapy saw its origin in the rocks that healers collected from river beds. They would warm them using hot water or coals and then treat bodily discomfort with them. Through these ancient methods, today’s hot stone massage entered the practice of healing.

The Basics

[youtube]http://www.youtube.com/watch?v=n_XDZ4E9Ixs[/youtube]

This massage method is also referred to as la stone massage or heated stone. It is claimed that it creates a unique connection between people and nature. This idea was perhaps conceived because the process includes using basalt stones of different shapes and forms that have been heated in water. They can aid in healing different kinds of imperfections in the body.

Normally, the stones are put at key areas of the body, such as the hands or spine, while the massage therapist administers a deep massage. By the reckoning of some experts, the stones’ heat produces powerful and dramatic results when they are placed in these areas. They can alleviate the discomfort of fatigued and aching muscles. Besides this, proponents of hot stone massage contend that using warm stones can tremendously improve blood circulation and the exchange of lymph in the body.

There are many more wonders of this massage technique. It is also claimed that it can relieve sore muscles, relax the nervous system, loosen tight joints, and release energy in the body that has been blocked. Doing these things will help the body function better.

In summary, there are many advantages to improving your well-being with hot stone massage. Here they are, just to recap:

* Helps circulation

* Relieves sore muscles

* Loosens tight joints

* Relaxes the nervous system

* Lets out blocked energies

* Helps deep relaxation

Given all these advantages, it’s not surprising that this massage therapy is seen as perfect for people very sensitive to heavy pressure. It’s also considered a good technique for people afflicted by fibromyalgia. And with the relief the stones can offer for sore, tired muscles, it’s great for hiking and skiing enthusiasts.

Jane Wyvern is an established freelance writer. You can find more of her writing at

massage-wire.com

,

lasik-central.com

and

lecithinguide.com

.

Article Source:

eArticlesOnline.com

}