Peltier Cooling fundamentals.

Picture of peltier element

Lateraalne integreeritud Peltier element. By Indrek.synter

From an article on Digikey.com

As an alternative to commonly used passive cooling techniques, thermoelectric cooling can offer numerous advantages. These include accurate temperature control and faster response, the opportunity for fanless operation (subject to heat sink performance), reduced noise, space savings, reduced power consumption and the ability to cool components to sub-ambient temperatures.

To read details, see https://www.digikey.com/en/articles/techzone/2018/feb/choosing-using-advanced-peltier-modules-thermoelectric-cooling


Bravo, Mr. President

From the liberal leaning news snippet group, Politico, today:

President Donald Trump warned Wednesday that he intends to launch missiles against the Syrian regime of Bashar Assad, warning Russia that the strike will come even though it has threatened to shoot down any American missiles launched at Syria.

“Russia vows to shoot down any and all missiles fired at Syria. Get ready Russia, because they will be coming, nice and new and ‘smart!’ ” Trump wrote on Twitter. “You shouldn’t be partners with a Gas Killing Animal who kills his people and enjoys it!”

Read more https://www.politico.com/story/2018/04/11/trump-syria-missile-attack-514499


Be sure you are registered to vote

Indiana voters web page on IN.GOV

Primary Election is MAY 8, 2018. You must be registered by 29 days prior to the election (April 9, 2018) to be allowed to vote.

Before the last election (Nov 2016) several thousand Hoosiers were denied their right to vote because a 3rd party had illegally altered Republican (only Republican) voter registration information to change their name, address, or other information in an effort to prevent Republicans from voting. CHECK YOUR STATUS.

Use the OFFICIAL INDIANA web site, https://indianavoters.in.gov, not knockoffs that could be run by groups intending to alter your registration information instead of registering you! It is free, fast, easy – USE THE OFFICIAL STATE OF INDIANA SITE: not any other! Official GOVerment web sites always have a domain ending with .GOV! .com, .org, .biz, .me, are NOT official government sites!

Register to vote. Primaries are almost here. https://indianavoters.in.gov/

From the OFFICIAL INDIANA web site:

ELECTION ALERT
IMPORTANT NOTICE: ONLY the version of the state voter registration form (VRG-7) and the county voter registration form (VRG-11) published on this website (or earlier revisions of these state forms approved since September 2013) will be accepted by county voter registration offices. Older versions of the VRG-7 or VRG-11 will NOT be accepted for processing. Federal voter registration forms may continue to be used.


Security Fixes Kill Hospital Patients

2015 ‘security fixes’ on computers resulted in 34 to 45 more deaths per 1,000 heart attack patients

From another article in Dark Reading. The data is old (most recent from year 2015) and updated data should be collected because we learn and change how we deal with security breaches. The underlying reason however seems very timely: clinicians trying to use hospital computer systems after a vulnerability is “fixed” face radical problems getting access to care for patients, and as a result more patients die due to the security “fix” preventing timely care. In medical terms, we would say “The cure is worse than the disease.”

Healthcare IT systems may show that shock in slower and more disruptive change than those in other industries because they start from a relatively weakened position security-wise. “For the most part the healthcare industry, and especially the providers, has been a laggard for information security,” says Larry Ponemon, founder and chairman of the Ponemon Institute.

When hospitals respond to a breach, the response tends to have a major impact on their legitimate users. According to Choi’s research, “new access and authentication procedures, new protocols, new software after any breach incident is likely to disrupt clinicians.”

That disruption is where the patient is affected, through inaccurate or delayed information reaching the people caring for them. And how much, in blunt terms, can that effect be? The study says an additional 34- to 45 deaths per 1,000 heart attack discharges every year.

Read the article at https://www.darkreading.com/endpoint/privacy/fixing-hacks-has-deadly-impact-on-hospitals/d/d-id/1331386. I had a link to the study here also, but the link goes to a “registration” web site. You can follow that link in the Dark Reading article if you so desire.


Dark Reading was good today

Dark Reading was good today. Several interesting tid bits. Suggest that you check it out at http://www.darkreading.com/

Accused LinkedIn, DropBox Hacker Appears in US Court After Diplomatic Battle

In the Czech Republic since October 2016, Yevgeniy Nikulin had requested asylum there after warrants for his arrest were issued by both Russia and the US. The Czech government denied his bid for asylum and turned him over the US, where he appeared in a federal courtroom on Friday morning.

Nikulin, the Russian hacker accused of being responsible for breaching DropBox and the 2012 LinkedIn attack that saw 117 million passwords stolen, has been extradited to the US in a process that has implications for the larger relationship between the US and Russia.  https://www.darkreading.com/attacks-breaches/accused-linkedin-dropbox-hacker-appears-in-us-court-after-diplomatic-battle/d/d-id/1331413

The Cybersecurity Mandates Keep On Coming

With threats more complex than ever, and with more data to protect and more technologies touching that data, more cyber regulation is bound to happen. The questions are How can a company possibly keep up, and Are we safely in compliance? https://www.darkreading.com/risk/compliance/the-cybersecurity-mandates-keep-on-coming/a/d-id/1331366

Microsoft Rushes Out Fix for Major Hole Caused by Previous Meltdown Patch

While fixing an obscure potential vulnerability, they created a real hack vector! Don’t cha jus’ luv high tech?

Chris Goetti, director of product management at Ivanti, says … “When Microsoft issued a fix for Windows 7 and Windows Server 2008, they made a mistake and ended up opening up read and write access in RAM so anybody could access anything in memory and write to it,”

Cautions Jack Danahy, CTO and co-founder of Barkly. “This is an easy-to-exploit zero-day vulnerability and a much more probable attack vector that the original problem that Microsoft was trying to correct. … Microsoft accidentally distributed a new zero-day vulnerability of their own design.”

Microsoft has rushed out an out-of-cycle security patch to address problems created by what were supposed to be fixes for the Meltdown vulnerability that it had previously issued for 64-bit Windows 7 and Windows Server 2008 systems. https://www.darkreading.com/attacks-breaches/microsoft-rushes-out-fix-for-major-hole-caused-by-previous-meltdown-patch/d/d-id/1331415#