Monday, March 29, 2010

Optimization of the server reaches 2 million milestone

Optimization technology is essential for engineers, scientists, businesses and students. But the solution of optimization problems can be tedious and time consuming. The key to the success of NEOS is removing barriers that prevent the rapid solution of complex optimization problems.

By using flexible combinations of tools on the World Wide Web, remote procedure calls and e-mail, researchers can access the NEOS server and have solved their problems of optimization automatically, without installing software, downloading and code association or the director of writing subroutines. NEOS users can obtain a solution in hours rather than days.

"Because of the ease and universality, NEOS is immensely popular," says Jorge More, an Argonne Distinguished Fellow, who has led the development of NEOS since its inception ten years ago. In 1999 there were fewer 18,000 entries on NEOs. NEOS is now the main source of optimization technology on the Web for users of optimization software with entries of over 235.00 in 2009.

Using the NEOS Server is simple. The user selects a program, or "solver" a type of optimization problem. To help choose a tree with a "value" offers suggestions and sample each solver of problems and substance. Once the user has selected the solver, NEOS compiles all subroutines, links with libraries needed, and performs the necessary calculations. The user is then transmitted to the solution, and various performance statistics.

File-Sharing Software threat to privacy of health

Lifestyle and financial information stored in thousands of home computers in North America may be vulnerable to theft by file-sharing software, according to research studies published in the online journal of the American Association of Medical Informatics.

Health professionals who bring home the patient information for personal computers with peer-to-peer sharing software, endangering the confidentiality of the patient, note the authors of the study.

"Computer users in May unaware that sensitive information in their personal folders on your computer may be exposed to other users, since some manufacturers of software that contains the dangerous possibilities have been used," said Prof. Khaled El Emam, Canada Research Chair in Electronic Medical Information and the author of the study.

File used CHEO Team El Emam-sharing software popular access to the documents downloaded from a representative sample of IP addresses. They were able to identify personal health and financial information of individuals in Canada and access to the United States. Research for the study was approved by the Ethics Committee of CHEO.

The study is the first such empirical estimation of the extent to which personal health information be made public by sharing files.

North Americans file, using sharing software like Limewire, Kazaa, BitTorrent, and especially to share and access music, video and pornography.

During their research on this project, El Emam said he and his colleagues have evidence of actively seeking foreign files private healthcare and financial data found. "There is no obvious reason why innocent people should be looking for this type of information," said El Emam. "Search terms were very simple very effective in the return of sensitive documents."

Most Canadians would be better not to use the tools for sharing files, if they want to protect sensitive data. "Felt the privacy of using conservation programs" needs a major information technology skills, "adds Dr. El Emam.

Only a small fraction of IP addresses, the researchers examined contained information on personal health, but by tens of millions of people using peer-to-peer file sharing in North America, this percentage translates into Tens of thousands of computers.

The security of financial information from more public attention and researchers have found that a higher percentage of downloaded files contained personal financial information. But if the United States and Canada adopt a greater digitization of medical records, ensuring confidentiality of health information is becoming a hot button topic.

A sample of the team of private health information on the CHEO could find by entering keywords in the simple file sharing software:

* A document of authorization for medical treatment to a person of the Ontario Health Insurance card number, date of birth, telephone number and details of other insurance;
* Consent adolescents include a name, family medical, telephone number, date of birth, social security number and medical history, including current medications;
* Several documents prepared by persons who reported all their credit card information, including account numbers and PINs, passwords and credit card.

New Spain to Facebook users are invisible to most virus detection, says expert

Cyber criminals use false e-mails targeting Facebook users and transmit viruses are found only in one third of the 42 most common anti-virus at 12 hours and 18 March, according to cyber-crime investigator with the 'University of Alabama at Birmingham (UAB).

"Malware comes as BredoLab. "Sometimes it is the spread of spam since May 2009," says Warner. "The UAB Spam Data Mine has noted at least eight versions of the malware Facebook BredoLab March 16.

"What use is worrying is that the latest versions of the campaign BredoLab not the last episode of the majority of the anti-virus service - are recognized and that the majority of users accidentally selecting the wrong equipment and false - attached mail to their computers are infected, "said Warner.

This new campaign of cyber-criminals have regular Internet e-mail to a wrong signal to clients of social media site Facebook. The spam e-mails ask the recipient to a new facility to log data received for Facebook, to open. Click plant makes the user's computer, which BredoLab malware.

"As soon as your computer is infected, no other cybercriminals BredoLab infected computer for malicious programs that you want, including password-stealing software, you can add a fake anti-virus software and Warner said sending spam.

Warner warned that any legitimate e-mails via client always ask me or e-mail - embedded link or attachment in his personal update your account information.

He said: "As one of the profile given to issues via a web browser and enter the place as usual." If one individual is the important message can be found on the website. Must "