SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : WDC/Sandisk Corporation -- Ignore unavailable to you. Want to Upgrade?


To: Starlight who wrote (8663)1/12/2000 4:30:00 PM
From: Ausdauer  Read Replies (1) | Respond to of 60323
 
Betty,

The PIC report was actually in yesterday's paper. Seems like the potential is great for this application and one can definitely foresee this as a solution for the general public.
I feel that all Medicare patients should be required to have one. Let's face it, medical records is the messiest, most outdated, least efficient facet of medical practice in the U.S. today except for the insurance billing apparatus.

The Army is leading the effort to bring digital dog tags to the military, but if the tags are approved other military branches would use them as well. "If everything goes well, every service member will wear them," Beck said.

Laptop computers equipped with adapters at battalion aid stations would read the digital tags, said Ed Cuellar, a SanDisk spokesman.
As the data capacity of the digital tags increases, they could hold X-rays, electrocardiograms and magnetic resonance imaging results.


techstocks.com

For the full article, click below...

union-tribune.com

Aus



To: Starlight who wrote (8663)1/12/2000 4:34:00 PM
From: Starlight  Respond to of 60323
 
A warning about computer viruses, plus an item about digital photography:

union-tribune.com

Q&A

Beware of e-mail bearing
attached executable programs

By Andy Rathbone

January 11, 2000

Q: On Dec. 22, I received a virus attached to my e-mail. I
have Netscape Navigator. The virus was called the
"W32/NewApt.worm," and the infected file attached to my
e-mail message was named monica.exe.

I deleted the attached file and did not open it. Can I still find it so that
I can try to discover who sent it? If I had printed out the message,
would it have affected my system?

This e-mail had my e-mail address for both the "From" and the "To."
I have contacted the FBI. What else should I be doing about this?

HELEN McKENNA
San Diego
A: Your first step was the best one. Whenever "anybody" sends you an
unexpected program attached to your e-mail message, delete it, without
exception. (Programs end in the letters "exe" or "com".)

Deleting attached programs that arrive through e-mail is the best way to
protect yourself against viruses. If the program turns out to have been
legitimate, you can always ask the sender for another copy. It's better to be
safe than sorry.

Printing out the message probably wouldn't have affected your system, but I
wouldn't bother.

Today's viruses -- including the newly discovered
W32/NewApt.worm that you received -- can be very sneaky.

If you'd opened that attached program -- the one named monica.exe -- it
would have gone through your e-mail and collected e-mail addresses. Then it
would have automatically sent itself to those addresses hoping to infect those
unsuspecting people, as well.

Apparently, your address was in the mailbox of one of your friends. When
your friend received the virus, the virus sent itself to you.

So, what should you do when receiving a virus or an unexpected file
attachment?

First, warn the sender so they can erase it from their computers using one of
the many available anti-virus programs. But since this virus didn't include the
sender's name in the From field, there's no easy way to warn them.

Even when you delete a message, your e-mail program usually files it in a
folder named "deleted items," or something similar.

By opening that folder, you can usually find your deleted message. Tell your
e-mail program to empty your deleted messages folder to permanently delete
those stored messages.

So, how can you avoid picking up a virus? First, buy an anti-virus program
from McAfee or Symantec. A new virus seems to pop up every few days, so
visit the company's sites on a regular basis to download updates for your
program. And never, never open a program attached to a piece of e-mail.

More information about the W32/NewApt.worm is at this Web site:
symantec.com
worm.newapt.html

Q: I am completely confused on the matter of "resolution" in the
world of digital photography and computers.

Previous experience with old-fashioned photography made me think
that 600x800 pixels, for instance, would be somewhat like a measure
of image quality or graininess, but occasionally I read something in the
literature that makes counts like 600x800 or 1024x768 or whatever,
sound like mere size capabilities.

Why have a 3 mega-pixel camera if it only means you can produce a
billboard-sized picture? Where would I find a definitive text on this
subject?

LYLE DAVIDSON
San Diego
A: Digital photos are made of thousands -- even millions -- of tiny dots
called pixels. A camera with a resolution of 800x600 means the photos will
have 800 columns of pixels lined up in 600 rows. The more pixels an image
holds, the sharper the picture.

Imagine a screen with a wide mesh stamping into wet clay. A wide mesh
screen will leave an image of square blocks. A screen with a thin mesh will
leave a much finer image on the clay. Similarly, a higher resolution image will
show much finer detail.

High-resolution digital photos offer other advantages, as well. It's easy to crop
out portions of a high-resolution photograph and still end up with a high-detail
photograph. The resulting picture will be smaller, but it will still have high
resolution.

You'll find a comprehensive discussion about digital cameras on this Web
page: shortcourses.com
contents.htm.

Andy Rathbone is the best-selling author of the "Windows for Dummies"
series. Send your questions to him at: q-a@home.com. Be sure to include
your name, address and a phone number, and some information about
your computer, such as the make, processor speed and amount of
random access memory.