Each of us complained about the forecasters, when finds to be in the rain without an umbrella. In this article, we will tell you how to make a forecast based on the model WRF (Weather Research & Forecasting Model) for the several days in advance.
A few words about WRF
WRF is a numerical weather prediction model, which is suitable to predict the condition of the atmosphere, as well for research. It has been developed by the community of scientific organizations the United States, including the National Center for Atmospheric and Ocean, the National Center for Atmospheric Research.
It is a system of modules: the preparation module of initial and interfacial data (WRF Preprocessing System), it is the actual determinant core (Advanced Research WRF), the post-processing module (WRF Postprocessing System).
Most part of the model is implemented in the language fortran, which is using the library MPI. Modules are written on C for working with data. The model is available in the source codes.
Naturally, the model consumes an enormous amount of CPU time, and it is designed to run on supercomputers, since the weather forecast is one of the toughest tasks.
Every day new standards of CSS3 and HTML5 enter more deeply into the life of web designers and web developers, and the browsers are becoming more compatible with these standards.
In connection with this event we would like to present you a selection of 10 buttons of CSS3 that will make your life easier during the layout and creation of the web applications.
PREDICTION: Apple to release iPhone 5 on October 4 and start shipping by the end of October.
Apple reportedly plans to release the golden master of iOS 5, its forthcoming operating system update for the iPhone, iPad and iPod touch, to its overseas assemblers at some point between September 23 and September 30, on time for a mid-October launch of a fifth-generation iPhone.
Analyst Ming-Chi Kuo revealed to AppleInsider on Monday that the new iPhone and iPod touch went into mass production in late August, and assemblers are currently scheduled to receive the golden master of iOS 5 the week of September 30. Typically, a golden master version of software is identical to the code that eventually becomes the final release to the public.
If you remember, Marty McFly worn Nike Mags in Back to the Future II. What could be better than auto lacing shoes? Nike thought so as well and patented these precious ideas. Now comes year 2011 and Nike finally releases Nike Mag.
But sadly commercial says that we'll see a real tech only in 2015, but for now you can buy a pair of Nike Mags with blinking lights which last for 4 hours on one charge. Availability of 1500 pairs auctioned on eBay and donated to the Michael J. Fox. One pair can go as high as $3000-$35000.
Clickjacking is the mechanism that misleads users when they follow a link to any site; it redirects the user to a malicious webpage. Clickjacking has become very effective. It is often used to spread through the Facebook links to the malicious websites. Recently, these techniques proved their effectiveness to breach the anonymity of website’s visitors. Also, following a sly link may lead to an attacker that will gain an access to the OAuth data. Let us see how it happens.
Classic application of clickjacking - spreading links through the Facebook
The attacker hides the “Like” or “Share” buttons in a transparent iframe in the classic scenario of clickjacking. This iframe is located above the element of page, which should be clicked by the user; also iframe can follow the mouse cursor. When we click on the element it is redirected to the invisible “Like” or “Share” buttons. Such operations are not limited to the Facebook, the attacker only needs to hide the elements of another website in the iframe.
Below is shown a typical message that can be seen in the net of Facebook, if one of our connections were intercepted by clickjacking:
2147483647 (231-1), Mersenne prime is the maximum possible value for 32-bit integer that is the largest integer that can be written in 32 bits.
What does this have to do with the phone numbers? Ironically, it has the most direct relation. It turns out that a significant number of American programmers are developing the systems in order to optimize it, where numbers are stored on the server in the form of 32-bit integers. Thus, the maximum possible number is equal to (214) 748-3647 in the United States, where 214 is a code of Dallas. When we enter into the database greater value then it is stored the maximum possible number of 2147483647.
If we conduct a search on the Internet, we can find hundreds of the phone books from all over America, which refer to the same number in Dallas. We can only sympathize to the owner of this phone number.
How could not the project’s clients to notice the mistake on the part of developers? Probably many of them did the business in the region, where the code is less than 214, so that the other phone numbers just did not get into the database. Maybe the developers convinced someone that this is the best way to optimize: in such form the numbers take up less space than when are stored in the form of individual characters. In fact many are obsessed with the optimization. The lessons of Y2K did not go well for all; moreover, a new generation of programmers grew up who do not remember Y2K at all.
Microsoft made an unusually sharp statement that graphics technology WebGL, which has been promoted by the Khronos Group, is too dangerous in order to be supported in Windows.
Currently both browsers Google Chrome and Mozilla Firefox are provided with support of WebGL. Google calls this “the most powerful way to add 3D graphics on the web pages”and appeals to the developers “explore the field of graphic development “. Mozilla positions WebGL as the ideal technology for “interactive 3D games and applications with the rich graphics and realization of a new approach to the visual design without using other software components”.
In turn, Microsoft has published a statement entitled as “WebGL considered harmful” in the official blog of Microsoft Safety Center. It was published by a group that is responsible for the organization of security of Windows and other products Microsoft.
The statement was made after a pair of reports that describe the “serious design flaws” and “security problems” in WebGL. Last report includes a demonstration of how user data can be stolen through browser.
Today I would like to represent our small project named "UMumble" to You, and I suppose I will start from the beginning.
How did this idea start up?
One evening, surfing the Internet I came across an interesting project that combined a news portal with interestingly organized IT community. But why was it interesting to me?
At first sight, it was a common IT community voting for certain news items, thereby digging them up to the top (in seems to me that I have already seen it, for sure at digg.com). But getting deeper into it I noticed that its articles were quite professional although there was no editor at the resource. The articles were written by the community itself, and the community voted for them using special rating system. One could vote for anything including the users (thereby raising their positions at the rating table or banning them to write at the resource), topics, questions, comments etc. And such collective actions of the community prohibited (allowed for) certain activities .It was a sort of a role game. Considering that the resource was not English but quite, I discussed it and consulted with my colleagues and a decision to create a similar project was made. That's how "UMumble" appeared.