This entry was all set to go then a terrific article on
travel came across my screen. Let me start there …
broadcasted a comprehensive article containing
travel tips that many would be advised to take heed of.
1. Plan for the unexpected. Medical emergencies,
Cutting short your travel. Natural phenomena.
2. Know what to do in an emergency. Contact list.
Have it available wherever you are.
3. Get your home, auto, finances in order and secured.
Now to the entry. WSJ editorial page had a
. It is an eye-opener
and worth reading, especially if the reader is early in
There are “tells” [poker analogy):
-Pres. Clinton telling people he liked their tie.
-Person takes a call in the middle of a meeting.
-Person asks to have the material sent to office and follow
up. No follow-up occurs.
-Person takes your business card and picks his teeth with it.
detected by a series of astronomical devices
confirming a source as a “blazar” the first known source of
extraterrestrial gamma rays. this is the beginning of high
energy neutrino astronomy. This nerdy finding is like
gravitational particles and other recent discoveries that
may introduce new concepts in science and applications.
(think: x-rays, isotopes, DNA)
Using Electrochemistry to perform organic synthesis.
A half dozen authors reviewed advances in organic synthesis
that is energy and environmentally efficient in
. They provide experimental essentials and dozens
of documented examples. This could be a resource for
your research notebook.
.One of the areas that you should keep updated on iswhat is happening in cyber-security when we get spam.
Another is cyber attacks especially if you are in a governmental
lab or project or other technically sophisticated project.
Industrial spies are not commonly mentioned, but are
sharing some of his insights. There is an arms race in the
cyber world and it uses special techniques like turbosquatters
More and more, IT departments need to take a defensive
strategy against these kinds of pernicious attacks.
Historically, photographing or copying pages of reports
and data was the mode of spying. With systems going
digital and so much being Internet enabled, it is something
you need to understand how to protect.