Thursday, January 27, 2011

Jet Li become Singaporean citizens

Good day People...

Jet Li has now moved to Singapore citizenship, it has been announced by him. Halini because Jet Li wanted to avoid the paparazzi. Jet Li also wanted his son to school facilities drengan bilingual English-Mandarin.

Citizens move, because Jet Li wants his children to school with a bilingual, English and Mandarin in public schools.

Actor blockbuster The Expendables and The Mummy: Tomb of the Dragon Emperor, said the movement, especially the persecution to escape paparazzi.

"My children have a good bilingual education can maintain a stable social life and my children will no longer be pursued by journalists and paparazzi," he said in Mandarin, as reported ChannelnewsAsia, Tuesday (01/25/2011).

Jet Li, who was in Singapore to participate in philanthropy conference, and a variety of public recognition of his move, said in the news.

"It's funny because I have long held the U.S. passport and lived there for 20 years. No one say anything about it. Well, when I came to Singapore, everyone wants to know really why I came here seems," he said.

Beijing born actor of this game says nothing, even if you had to leave China and the United States citizenship. But legally prohibited from Singapore to its citizens have two passports, citizenship.

He said his decision to stay in Singapore because it is the safety and the education system in which the school where he taught two languages, English and Mandarin Chinese to students.

Prevent breast cancer with pepper

Good day People...

Not only as a spice in the kitchen for cooking, but it turns out, there are other benefits we derive from the pepper. These benefits include the ability to maintain a healthy body.

Spices are also known as Piper nigrum L is at least has a number of additional services, as quoted from health.com following:

Prevention of breast cancer
The chemical substance called piperine in pepper seeds can to prevent the formation of tumors and cancers of the breast, according to a study by the University of Michigan, USA.

The antidote against cancer are higher when combined with turmeric. So often, these two use the ingredients in the bowl.

Scrub skin
Pepper can be soft as a peeling of the skin. "The feeling of warmth can promote blood circulation and therefore provide more oxygen and nutrients to the skin surface. A slightly rough texture can also be taken up dead skin cells," said Wendy Allred, by Bliss Spa.

In order to mix a half cup of sugar, two tablespoons of olive oil and a little pepper. Mix well. Wet your face, then wipe the skin with the mixture slowly while giving massages. Then rinse with cold water.

Flu relief
Pepper is a natural decongestant. Natural chemical compounds in it can cause irritation of the mucous membranes, and make it produce more mucus to help clear nasal area.

say Neil Schachter, MD, professor at the Mount Sinai School of Medicine in New York and author of "The Good Doctor's Guide, add more pepper in a bowl of chicken soup, you can breathe more easily when cold

Honeycomb Acer Android is coming soon in India

Good day People...

Acer's Tablet Honeycomb Android seems not long agi will soon be in India. Making the land is the first country to be visited by the latest Acer tablet.

Rumor is itself based Acer India, the States, a 5-series in March next Android justified present tablets. Fifth tablet itself is filled with a variety of sizes from the smallest 4.8-inch, while most 10-inch available.

Started AndroidOS, Thursday (1/27/2011), formerly Acer in Taiwan actually the first time introduced the Acer tablet with the size 7 and 10 inches officially. Both series of this tablet will come with WiFi and 3G networks here.

"tablet has a good prospect in India. In addition, 3G connectivity operates in this country for good and stable," said marketing director of Acer India S Rajendran.

Later in the tablet tablet the level of resolution 1280 × 800 and 1080p reached with the ability to support HDMI. It also resulted in high quality 5MP camera in front of and behind the tablet.

Acer will also equip them with the presence of tablet own application store called Alive. This application is used to store software for sales tablet users, smart phones and laptop computers manufactured by Acer.

Wednesday, January 26, 2011

U.S. and Israel viruses sabotage Iran's nuclear program

Good day People...   

Cooperate United States Intelligence Service (USA) and Israel in the development of destructive computer viruses to the efforts of Iran in the production of atomic bombs, a report by the New York Times,  sabotage.

Edition of the New York Times quoted the network several military and intelligence experts that Israel to assess experiments on how effectively the computer virus "Stuxnet" which seems aimed at destroying Iran's nuclear facilities network in November 2010, and they inhibit in an effort to the production of nuclear weapons carried out only tell.

The experiment was located at the Dimona complex in the Negev desert in the Middle East, made, although its nuclear weapons program was not announced.

The experts and officials told the Times that the effort is to "Stuxnet" of the Israeli-US joint project with the help of an unknown or known by the English and German.

"To learn how viruses work, you must understand the motor until the virus is effective, because Israel has tried it first," one expert told the newspaper.

Speculation grows that Israel is the mastermind of the virus "Stuxnet" which is attacking a group of computers in Iran, and Tehran the Jewish state and the U.S. accused of killing two nuclear scientists in November and January.

Times reported that in the moments before he said that Iran's controversial uranium enrichment program was "rapidly" was released just days before the meeting of six world powers Tehran in connection with the nuclear program.

Both the U.S. and Israel announced recently that they believed that the program suffered a setback over the years. U.S. Secretary of State Hillary Clinton refers to a number of sanctions in June 2009 adopted by the UN Security Council and in other countries.

Israeli Minister of Strategic Affairs Moshe Yaalon, who said a former top military officials last month that a series of obstacles and challenges in Tehran technology for about three years even further back to produce nuclear power.

Israel supports the US-led efforts to acquire nuclear weapons capabilities to Iran to avoid sanctions, but refused, a military strike against the country surveys rivals.

Virus Stuxnet was divided into two main sections, one that the Iranian uranium enrichment facilities which make the work out of control objectives.

While part of the longer record of daily activities at nuclear facilities, and then play back the tape to the operator so that all will be normal to look for sabotage operations carried out, the Times wrote it.

management of "Stuxnet" target computer control of German industrial giant Siemens and the water supply, oil drilling, power plants and other critical infrastructures.

Most infections "Stuxnet" do occur in Iran, so the speculation that the virus was actually intended to Tehran's nuclear facilities menyabotasi.

The FBI arrested muster 127 members of the Mafia in New York, 800 officers

Good day People...  

Law enforcement authorities of the United States has listed more than 100 arrested suspected members of the Cosa Nostra in New York to arrests in the largest such operation on the Italian-American Mafia.

More than 800 officers participated in the early morning arrest in New York, New Jersey and Rhode Iceland, said Attorney General Eric Holder said at a press conference.

The operation, the cooperation between the FBI "that never happened," charged show local police and other authorities, had 127 suspected Mafia members and their peers, he said. One of the arrests occurred in Italy.

"The arrest and charges today marks an important step forward in the activities of La Cosa Nostra is not valid," said Holder, who has taken the unusual trip to Brooklyn to announce the arrests.

He claimed it was "the largest one-day operation" against organized crime family.

The suspects are members of the Junior, "Soldier," "captain" and a high-ranking superiors, wipe many leaders of Colombo and Gambino family - two of the "Five Families" are historical in New York.

His charges, including murder, perlintah country, arson, drugs, extortion, robbery, extortion and labor.

To the "Five Families" who have dominated organized crime in New York City since the 1930s it was the Genovese, Gambino, Lucchese, Colombo and Bonanno.

While the indictments describe the traditional Mafia money laundering, there are also echoes the casual cruelty in the circle of the Cosa Nostra. The spilled murders, including two murders after a dispute over the water on Cham Rock Bar in New York in 1981.

Cosa Nostra families have infiltrated and controlled large parts of the U.S. economy, with its headquarters in a long time in and around New York and the means to fish in the country.

This phenomenon has deep roots organizations and Italian-American crime remains an important factor. But the Five Families of New York, a rapid reduction in the wealth of condemnations of the last decade by many leaders have shown.

Holder said that the Italian Mafia "may not be nationwide in scope, as it never happens, but the reality is that there is a relentless threat, big threat is."

Holder acknowledges that the group "has been shown that tough."

move even with ethnic gangs Russia, Mexico and Asia to the landscape of organized crime in the U.S., more Italian-American family to emerging in the public imagination, thanks to great film classics as "The Godfather" and the award-winning series "Sopranos" on cable TV.

What is less known to the amount that the claimant will testify to the Mafia code of silence by the recruitment of senior members against their colleagues to destroy the rule in exchange for a reduced sentence.

In 1991 agreed the acting head of the Lucchese family, Alphonse D'Arco to testify against colleagues. Sun Salvataro Gravano told Gambino family, on the arrests of John J. Gotti led, formerly called "Teflon Don" because of its ability to escape from the persecution.

However, a marathon effort like Gotti, John "Junior" Gotti to punish, in 2009 in a spectacular jam.

Although one of his closest friends bersaski confidence in him to walk a descendant of the Mafia free after the court was wrong. It was the fourth time in five years, prosecutors failed him free.
Authorities later said they had concluded their case against Gotti.

Tuesday, January 25, 2011

Car Electric Travel 8000 miles without a driver

Good day People... 

Four electric vans without driver successfully travel 8000 miles from Italy to China. The vehicle is equipped with solar energy, to recognize that the laser scanners and video cameras to avoid obstacles and provided support.

Bbc vehicle without a driver reported that a study of the technology road safety.

The sensors are capable of vehicles to make the extreme face obstacles such as road conditions, traffic and weather.

Distance traveled from Italy to Shanghai will also be used to collect data that will be analyzed for further research. The experiment was funded by the European Research Council.

"We do not know the route, which roads are impassable, and as traffic, density, reckless drivers. We faced a lot of things," said Fred Isabella Riga, a scientist on the project engine.

Although Mobin van without a driver and a card, the researchers who have as a passenger in case if you have an emergency situation.

Passengers had to intervene several times, for example, if the vehicle is stuck in traffic in Moscow and handle payments to the highway.

The project is not using the card even though many remote areas of Siberia and China. You never cease to give you a ride a mountain climber.

Artificial system, the so-called GOLD (Generic Obstacle and Lane detector) analyzes information from sensors and automatic speed and direction.

"Control is controlled by a computer. So, the computer commands to the steering wheel. The system is to follow the path, avoid obstacles and the curve," said Alberto Broggi from VisLab at the University of Parma, Italy, the lead researcher is for the project.

"Travelling with a long walk, across two continents, by various state and weather, traffic conditions and various infrastructure, we have different circumstances to test the system," he said.

This technology will be applied in agriculture, mining and construction.

The vehicle was at a maximum speed of 38 mph run and must be recharged for eight hours after two or three hours again.

"There are some terrible moments as when the vehicle pile-up were on the back to the forefront by BUTTING affected. It happened because we stopped and forgot to turn off the system," said Fred Riga.

Captiva Super Sport, a new Challenger Class SUV

Good day People...

Stock Type Sport Utility Vehicle Van arrival of new challengers, called the Chevrolet Captiva Super Sport with a new, more powerful engine.

"Captiva Super Sport by a desire was born the market demand Captiva gasoline with a higher power," said Deborah Amelia Santoso, Marketing and Public Relations Manager of PT General Motors Autoworld Indonesia, when the launch vehicle last weekend.

Captiva SS, so called, uses no external differences to Captiva, with the exception of the 2.4-liter Ecotec engine, which DCVCP (Double Continuous Variable Cam Phaser) ethanol 20, 6-speed Tiptronic automatic transmission with GM.

When compared with the previous engine, 2.4 L DOHC DBW Captiva SS had a higher density of 10.4: 1 (the previous engine 9.6:1). and its maximum power PS/6.400 (144/5.000rpm) 171 rpm and maximum torque of 225 rpm Nm/4.800 (220/2.200rpm).

Machine Captiva SS also about 27 pounds lighter because of aluminum whereas previously made of steel. PT GM Autoworld conscious selection circuit Lippo Village, Tangerang as the birthplace of the Chevrolet Captiva SS to give the impression of sports performance and to confirm the vehicle.

"Faster acceleration, but the amount of fuel-efficient, 1 liter to 14 kilometers with a constant speed of 80 mph before the engine is about 12 to 13 kilometers," said Suwadji Wirjono, After-sales director of GM Autoworld Indonesia. After Suwadji, the new Euro III emission standard engine.

Ecotec engine is an engine engineering engineers General Motors (GM). Originally conceived as a family of GM-Opel Family II engine, assisted by experts from the International Technical Development Center in Rüsselsheim, Germany, developed in 1970, signed and GM's first engine was born worldwide special.

Ecotec well produced low emissions, to 20 percent ethanol and has a high flexibility with smooth character, powerful and very low vibration.

Captiva SS Ecotec engine with LE-9 code has become one of the machines with the highest population in the world. 2.4L GM Ecotec engine is in many cars like the Chevrolet Equinox, Buick LaCrosse, Buick Regal, Chevrolet Captiva and Opel Antara sold in Mexico.

Captiva SS also comes with support for Hydra-Matic 6-speed automatic transmission gears that give further meetings to ensure faster and smoother acceleration.

Hydra-Matic 6-speed gearbox offers Captiva SS in high speed with low engine speed, so that fuel consumption is more efficient drive.

Settling on Captiva SS interior, including oversight meter cluster with the color combination of white, blue, green and red, which add to the atmosphere more comfortable cabin and futuristic. The atmosphere is cozy in the cabin plus the audio system with hi-end Arkamys 3D surround sound.

SS 3D Systems Arkamys ensure quality sound systems are more comfortable in the ear all the passengers through the clarity and the ability of this system is capable of sound layout (sound production), the perfect.

said Harry Yanto, Business Planning, Product and Order Manager gmai "sounds so, so that if the source on the windshield, the speakers. It is a good choice for travelers or drivers arranged.

Captiva SS head unit offers easy connectivity with USB and AUX input, the passengers to enjoy the songs from your iPod, flash drives and external hard drives.

Captiva SS is in the colors Black Sapphire, Royal Gray, Sterling Silver, Sparkling Tan, Alpine White and Tornado Red It costs around USD 313 million or more approximately $ 8 million from the previous version.

Gold prices slide back

Good day People...

Gold prices fell on Tuesday kelevel the lowest in three months as declining demand for gold as an alternative investment hedge.

The most active gold contract traded, for delivery in February fell to EUR 12.2 million (0.9 percent) to close at 1332.3 U.S. $ per troy ounce on the New York commodity exchanges.

But this afternoon in the Asian market price of gold rose to U.S. $ 1.5 (0.11 percent) to U.S. $ 1,333.8 per ounce. Oil prices also rose $ 0.2 (0.23 percent) menjai U.S. $ 86.39 per barrel.

While the U.S. dollar index against six major rival currencies fell 0.098 (0.13 percent) to a level of 77.904.

"We got thinking, this is a normal correction for gold significantly throughout the year yesterday," said Sterling Smith, an analyst with Country Hedging market in Minnesota. "This correction is actually giving us the space to make a profit again," he said.
Good day People...

Gold prices increased this year, a correction of 6.3 percent from the confidence of investors in the economic recovery experienced again, so the demand for gold as a hedge of the financial market turmoil and fears of the European region debt problem.

out concern about the high inflation and the uncertainty of the European crisis of the gold price had reached its highest level up to U.S. $ 1,432.5 per troy ounce in December last.

Market strategists from Lind-Walder reveal Bob Haberkorn gold fall the end - the end is for investors panic selling price of the precious metal to do to make a free fall.

China is again slow implementation of monetary policy on inflation and growth is expected, Britain is experiencing a contraction in the last quarter of 2010, the reasons for investors to abandon gold.

Monday, January 24, 2011

Roger Federer advances to semifinals

ELBOURNE, Australia -- Defending champion Roger Federer advanced to the Australian Open semifinals with a 6-1, 6-3, 6-3 win over Stanislas Wawrinka on Tuesday in a mismatch that had the intensity of a practice session.
Australian Open results

Need the scores from Down Under? Get complete results and coverage from the Australian Open.
The Pulse: Scoreboard

Federer, aiming to become the first man to win five Australian titles, was playing in his record-tying 27th consecutive Grand Slam quarterfinal. He is into his eighth consecutive semifinal at Melbourne Park.

No. 19 Wawrinka was playing at this stage for only the second time at a major and struggled against Federer in the first all-Swiss quarterfinal at a Grand Slam. He had only beaten Federer once in their seven previous matches.

Wawrinka had only one look at a break chance against the 16-time Grand Slam winner, in the sixth game of the third set, and lost three straight points to let Federer off the hook.

Federer cashed in on five of his seven break opportunities.

Wawrinka received a code violation for smashing his racket into the ground, shattering the frame, after falling behind 2-0 in the third. His intensity picked up, but it was too late.

"I obviously played Stan many times in practice and in matches ... maybe a bit of a battle for him to get used to the conditions," Federer said. "I had to fight extremely hard and I thought Stan played an amazing tournament."

Wawrinka was on a nine-match winning streak, including a straight-sets win over former No. 1-ranked Andy Roddick in the fourth round.

Federer next plays the winner of Tuesday's later match between No. 3 Novak Djokovic and Wimbledon finalist Tomas Berdych. Federer's last two Grand Slam losses have come against them -- against Berdych at Wimbledon and Djokovic at the U.S. Open. Djokovic also beat Federer in the semifinals here in 2008 before going on to win the title.

For Federer, the match will be more about making the final than seeking revenge.

"I got them back a couple of times at the end of the year," he said. "I don't feel like I need to get back at them necessarily, but I'm not just going to come out here and give them the match."


Copyright 2011 by The Associated Press

Sunday, January 23, 2011

Privacy Policy

Information we collect and how we use it

We may collect the following types of information:
  • Information you provide – When you sign up for a Google Account, we ask you for personal information. We may combine the information you submit under your account with information from other Google services or third parties in order to provide you with a better experience and to improve the quality of our services. For certain services, we may give you the opportunity to opt out of combining such information. You can use the Google Dashboard to learn more about the information associated with your Account. If you are using Google services in conjunction with your Google Apps Account, Google provides such services in conjunction with or on behalf of your domain administrator. Your administrator will have access to your account information including your email. Consult your domain administrator’s privacy policy for more information.
  • Cookies – When you visit Google, we send one or more cookies to your computer or other device. We use cookies to improve the quality of our service, including for storing user preferences, improving search results and ad selection, and tracking user trends, such as how people search. Google also uses cookies in its advertising services to help advertisers and publishers serve and manage ads across the web and on Google services.
  • Log information – When you access Google services via a browser, application or other client our servers automatically record certain information. These server logs may include information such as your web request, your interaction with a service, Internet Protocol address, browser type, browser language, the date and time of your request and one or more cookies that may uniquely identify your browser or your account.
  • User communications – When you send email or other communications to Google, we may retain those communications in order to process your inquiries, respond to your requests and improve our services. When you send and receive SMS messages to or from one of our services that provides SMS functionality, we may collect and maintain information associated with those messages, such as the phone number, the wireless carrier associated with the phone number, the content of the message, and the date and time of the transaction. We may use your email address to communicate with you about our services.
  • Affiliated Google Services on other sites – We offer some of our services on or through other web sites. Personal information that you provide to those sites may be sent to Google in order to deliver the service. We process such information under this Privacy Policy.
  • Third Party Applications – Google may make available third party applications, such as gadgets or extensions, through its services. The information collected by Google when you enable a third party application is processed under this Privacy Policy. Information collected by the third party application provider is governed by their privacy policies.
  • Location data – Google offers location-enabled services, such as Google Maps and Latitude. If you use those services, Google may receive information about your actual location (such as GPS signals sent by a mobile device) or information that can be used to approximate a location (such as a cell ID).
  • Unique application number – Certain services, such as Google Toolbar, include a unique application number that is not associated with your account or you. This number and information about your installation (e.g., operating system type, version number) may be sent to Google when you install or uninstall that service or when that service periodically contacts our servers (for example, to request automatic updates to the software).
  • Other sites – This Privacy Policy applies to Google services only. We do not exercise control over the sites displayed as search results, sites that include Google applications, products or services, or links from within our various services. These other sites may place their own cookies or other files on your computer, collect data or solicit personal information from you.
In addition to the above, we may use the information we collect to:
  • Provide, maintain, protect, and improve our services (including advertising services) and develop new services; and
  • Protect the rights or property of Google or our users.
If we use this information in a manner different than the purpose for which it was collected, then we will ask for your consent prior to such use.
Google processes personal information on our servers in the United States of America and in other countries. In some cases, we process personal information outside your own country.

Choices

You can use the Google Dashboard to review and control the information stored in your Google Account.
Most browsers are initially set up to accept cookies, but you can reset your browser to refuse all cookies or to indicate when a cookie is being sent. However, some Google features and services may not function properly if your cookies are disabled.
Google uses the DoubleClick advertising cookie on AdSense partner sites and certain Google services to help advertisers and publishers serve and manage ads across the web. You can view and manage your ads preferences associated with this cookie by accessing the Ads Preferences Manager. In addition, you may choose to opt out of the DoubleClick cookie at any time by using DoubleClick’s opt-out cookie.

Information sharing

Google only shares personal information with other companies or individuals outside of Google in the following limited circumstances:
  • We have your consent. We require opt-in consent for the sharing of any sensitive personal information.
  • We provide such information to our subsidiaries, affiliated companies or other trusted businesses or persons for the purpose of processing personal information on our behalf. We require that these parties agree to process such information based on our instructions and in compliance with this Privacy Policy and any other appropriate confidentiality and security measures.
  • We have a good faith belief that access, use, preservation or disclosure of such information is reasonably necessary to (a) satisfy any applicable law, regulation, legal process or enforceable governmental request, (b) enforce applicable Terms of Service, including investigation of potential violations thereof, (c) detect, prevent, or otherwise address fraud, security or technical issues, or (d) protect against harm to the rights, property or safety of Google, its users or the public as required or permitted by law.
If Google becomes involved in a merger, acquisition, or any form of sale of some or all of its assets, we will ensure the confidentiality of any personal information involved in such transactions and provide notice before personal information is transferred and becomes subject to a different privacy policy.

Information security

We take appropriate security measures to protect against unauthorized access to or unauthorized alteration, disclosure or destruction of data. These include internal reviews of our data collection, storage and processing practices and security measures, including appropriate encryption and physical security measures to guard against unauthorized access to systems where we store personal data.
We restrict access to personal information to Google employees, contractors and agents who need to know that information in order to process it on our behalf. These individuals are bound by confidentiality obligations and may be subject to discipline, including termination and criminal prosecution, if they fail to meet these obligations.

Accessing and updating personal information

When you use Google services, we make good faith efforts to provide you with access to your personal information and either to correct this data if it is inaccurate or to delete such data at your request if it is not otherwise required to be retained by law or for legitimate business purposes. We ask individual users to identify themselves and the information requested to be accessed, corrected or removed before processing such requests, and we may decline to process requests that are unreasonably repetitive or systematic, require disproportionate technical effort, jeopardize the privacy of others, or would be extremely impractical (for instance, requests concerning information residing on backup tapes), or for which access is not otherwise required. In any case where we provide information access and correction, we perform this service free of charge, except if doing so would require a disproportionate effort. Because of the way we maintain certain services, after you delete your information, residual copies may take a period of time before they are deleted from our active servers and may remain in our backup systems. Please review the service Help Centers for more information.

Enforcement

Google adheres to the US Safe Harbor Privacy Principles of Notice, Choice, Onward Transfer, Security, Data Integrity, Access and Enforcement, and is registered with the U.S. Department of Commerce’s Safe Harbor Program.
Google regularly reviews its compliance with this Privacy Policy. When we receive formal written complaints, it is Google’s policy to contact the complaining user regarding his or her concerns. We will cooperate with the appropriate regulatory authorities, including local data protection authorities, to resolve any complaints regarding the transfer of personal data that cannot be resolved between Google and an individual.

Changes to this Privacy Policy

Please note that this Privacy Policy may change from time to time. We will not reduce your rights under this Privacy Policy without your explicit consent. We will post any Privacy Policy changes on this page and, if the changes are significant, we will provide a more prominent notice (including, for certain services, email notification of Privacy Policy changes). We will also keep prior versions of this Privacy Policy in an archive for your review.