Identifying STROKE

Your Ad Here

Remember The 1st Three Letters. . .



During a Barbecue, a friend stumbled and took a little fall. She assured everyone that she was fine and had just tripped over a brick because of her new shoes. (they had offered to call paramedics). They got her cleaned up and got her a new plate of food and while she appeared a bit shaken up, Ingrid went about enjoying herself the rest of the evening.

Ingrid 's husband called later telling everyone that his wife had been taken to the hospital. (at 6:00 PM, Ingrid passed away). She had suffered a stroke at the Barbecue. Had they known how to identify the signs of a stroke, perhaps Ingrid would be with us today. Some don't die. They end up in a helpless, hopeless condition instead.

A neurologist stated that if he can get to a stroke victim within 3 hours he can
totally reverse the effects of a stroke. He said the trick was getting a stroke recognized, diagnosed, and then getting the patient medically cared for within 3 hours, which is
Remember the '3' steps S. T. R.

Read and Learn!
Sometimes symptoms of a stroke are difficult to identify. Unfortunately, the lack of awareness spells disaster. The stroke victim may suffer severe brain damage when people nearby fail to recognize the symptoms of a stroke.

Doctors say a bystander can recognize a stroke by asking three simple questions:
S* Ask the individual to 'Smile.'

T* Ask the person to 'talk,' to 'speak a simple sentence coherently meaning in a fluent manner. ( i.e., It is a sunny day today).

R* Ask them to 'Raise Both Arms'.

NOTE: Another sign of a stroke is this:
Ask the person to 'stick out' their tongue. If the tongue is 'crooked' that is if it goes to one side of the mouth or the other,
it is an indication of a stroke. If they have trouble with 'any one' of these it is an indication of a stroke.


Digital ants to protect computers against viruses

Your Ad Here

In the never-ending battle to protect computer networks from intruders, security experts are deploying a new defence, modelled on one of nature's hardiest creatures -- the ant.

Unlike traditional security devices, which are static, these "digital ants" wander through computer networks looking for threats, such as "computer worms" -- self-replicating programmes designed to steal information or facilitate unauthorised use of machines.

When a digital ant detects a threat, it doesn't take long for an army of ants to converge at that location, drawing the attention of human operators who step in to investigate.

The concept, called "swarm intelligence", promises to transform cyber security because it adapts readily to changing threats.

"In nature, we know that ants defend against threats very successfully," explains Errin Fulp, computer science professor and expert in security and computer networks, at the Wake Forest University (WFU).

"They can ramp up their defence rapidly, and then resume routine behaviour quickly after an intruder has been stopped. We were trying to achieve that same framework in a computer system," he says.

Current security devices are designed to defend against all known threats at all times, but the bad guys who write malware -- software created for malicious purposes -- keep introducing slight variations to evade computer defences.

As new variations are discovered and updates issued, security programmes gobble more resources, antivirus scans take longer and machines run slower -- a familiar problem for most computer users.

Glenn Fink, research scientist at Pacific Northwest National Laboratory (PNNL) in Richland, Washington, came up with the idea of copying ant behaviour. PNNL, one of 10 Department of Energy (DoE) labs, conducts cutting-edge research in cyber security.

Fink was familiar with Fulp's expertise developing faster scans using parallel processing -- dividing computer data into batches like lines of shoppers going through grocery store checkouts, where each lane is focussed on certain threats.

He invited Fulp and Wake Forest graduate students Wes Featherstun and Brian Williams to join a project there this summer that tested digital ants on a network of 64 computers.

Swarm intelligence, the approach developed by PNNL and Wake Forest, divides up the process of searching for specific threats, says a WFU release.

"Our idea is to deploy 3,000 different types of digital ants, each looking for evidence of a threat," Fulp says.

Fulp introduced a worm into the network, and the digital ants successfully found it. PNNL has extended the project this semester, and Featherstun and Williams plan to incorporate the research into their master's theses.


5 Things you never knew your Cell Phone could do

Your Ad Here

There are a few things that can be done in times of grave emergencies. Your mobile phone can actually be a life saver or an emergency tool for survival. Check out the things you can do with it:


The Emergency Number worldwide for Mobile is 112. If you find yourself out of the coverage area of your mobile network and there is an emergency, dial 112 and the mobile will search any existing network to establish the emergency number for you, and interestingly, this number 112 can be dialed even if the keypad is locked. Try it out.

Have you locked your keys in the car?

Does your car have remote keyless entry? This may come in handy someday. Good reason to own a cell phone: If you lock your keys in the car and the spare keys are at home, call someone at home on their cell phone from your cell phone. Hold your cell phone about a foot from your car door and have the person at your home press the unlock button, holding it near the mobile phone on their end. Your car will unlock....Saves someone from having to drive your keys to you. Distance is no object. You could be hundreds of miles away, and if you can reach someone who has the other "remote" for your car, you can unlock the doors (or the trunk).

Hidden Battery Power

Imagine your cell battery is very low. To activate, press the keys *3370# Your cell will restart with this reserve and the instrument will show a 50% increase in battery. This reserve will get charged when you charge your cell next time.

How to disable a STOLEN mobile phone?

To check your Mobile phone's serial number, key in the following digits on your phone: * # 0 6 #
A 15 digit code will appear on the screen. This number is unique to your handset. Write it down and keep it somewhere safe. When your phone gets stolen, you can phone your service provider and give them this code. They will then be able to block your handset so even if the thief changes the SIM card, your phone will be totally useless. You probably won't get your phone back, but at least you know that whoever stole it can't use/sell it either. If everybody does this, there would be no point in people stealing mobile phones.

And Finally.....

Free Directory Service for Cells

Cell phone companies are charging us $1.00 to $1.75 or more for 411 information calls when they do not have to. Most of us do not carry a telephone directory in our vehicle, which makes this situation even more of a problem. When you need to use 411 information option, simply dial: (800) FREE 411, or (800) 373-3411 without incurring any charge at all. Program this into your cell phone now. For more such information