Best Solution for Aging

Friday, June 25, 2010

Antioxidants are intimately involved in the prevention of cellular damage -- the common pathway for cancer, aging, and a variety of diseases. The scientific community has begun to unveil some of the mysteries surrounding this topic, and the media has begun whetting our thirst for knowledge. Athletes have a keen interest because of health concerns and the prospect of enhanced performance and/or recovery from exercise. The purpose of this article is to serve as a beginners guide to what antioxidants are and to briefly review their role in exercise and general health. What follows is only the tip of the iceberg in this dynamic and interesting subject.

Endurance exercise can increase oxygen utilization from 10 to 20 times over the resting state. This greatly increases the generation of free radicals, prompting concern about enhanced damage to muscles and other tissues. The question that arises is, how effectively can athletes defend against the increased free radicals resulting from exercise? Do athletes need to take extra antioxidants?

Because it is not possible to directly measure free radicals in the body, scientists have approached this question by measuring the by-products that result from free radical reactions. If the generation of free radicals exceeds the antioxidant defenses then one would expect to see more of these by-products. These measurements have been performed in athletes under a variety of conditions.

Glutathione (gamma-glutamyl-cysteinyl-glycine; GSH) is the most abundant low-molecular-weight thiol, and GSH/glutathione disulfide is the major redox couple in animal cells. The synthesis of GSH from glutamate, cysteine, and glycine is catalyzed sequentially by two cytosolic enzymes, gamma-glutamylcysteine synthetase and GSH synthetase. Compelling evidence shows that GSH synthesis is regulated primarily by gamma-glutamylcysteine synthetase activity, cysteine availability, and GSH feedback inhibition. Animal and human studies demonstrate that adequate protein nutrition is crucial for the maintenance of GSH homeostasis. In addition, enteral or parenteral cystine, methionine, N-acetyl-cysteine, and L-2-oxothiazolidine-4-carboxylate are effective precursors of cysteine for tissue GSH synthesis.

These initial products position OXIS for a feasible entry into the wellness market with a lot of room for expansion. This paves the way for solid partnerships with leaders in the industry with an established customer base or those with the capacity to build one. The ultimate goal is to be regarded as a health partner. For now, it may be penny stocks for OXIS, but with more nutraceutical products lined up (including functional foods like nutrition bars and energy beverages sold over the Internet and through multi-level marketing, infomercials, direct mail, and retail outlets), the future of OXIS is secure and will benefit people all over, allowing them to be healthy and young.

http://www.oxis.com

Oxis on Twitter


Oxis on facebook



FIFA 10 or Fifa Manager 2010

Thursday, June 17, 2010

FIFA 10 features core gameplay refinements based on responsiveness and intelligence, plus a completely overhauled Manager Mode that includes more than 50 major improvements. These enhancements and more deliver a new standard for authenticity, as FIFA 10 continues to set the benchmark in both innovations and gameplay as the most complete simulation of football.

On the pitch, critical gameplay fundamentals have been enhanced to ensure that FIFA 10 mirrors real-world football, providing more sophisticated ball control, and physical interaction. On attack, players now analyze space more effectively, curve their runs in an attempt to stay onside, create passing lanes naturally, and drive for more variety in attacking options. On defense, new concepts like position priority enable defenders to multitask so dangerous spaces left open by teammates out of position are covered. Plus, slide tackle targeting, press marking, and better urgency clearance logic provide new options that make defending a tactical skill in FIFA 10.

FIFA on 3D

Monday, June 14, 2010

UK viewers may not be able to get World Cup games in 3D broadcasted live, but it's been revealed today that you'll be able to look forward to all the best coverage from the tournament on 3D Blu-ray later this year.Speaking at the launch of their new 3D Bravia TV range, Sony's Jordan Peters confirmed that the World Cup 3D Blu-ray would be among a whole host of new 3D content masterminded by Sony.

The first 3D Blu-ray to hit stores will be kids flick Cloudy With a Chance of Meatballs, available to buy from Monday. It will also come with a sneak peak at both Open Season and Monster House, which will follow shorty on 3D Blu-ray.
Perhaps most interesting of all though are the plans from Sony Music. They're planning a series of simulated 3D classic concerts, converting the most memorable shows from the likes of Jimi Hendrix into 3D for Blu-ray.It's all being boosted by a massive wave of new 3D films set to hit cinemas in the next year. Resident Evil Afterlife will hit in September, followed superhero flicks The Green Hornet and the Spiderman re-boot in 2012, as well as Men in Black III and Aardman's festive Arthur Christmas.Sony expect 100 new 3D films to be released by 2012, with16,000 3D ready cinemas by the end of the year.

New Features in Google Wave Robots API

Tuesday, May 18, 2010

The Google Wave Robots API v2 is not backward compatible with version 1 and has been enhanced with new features like: Active API, Context, Filtering, Error Reporting, Proxying-For. Beside a Java and a Python client library useful to create robots, developers can build their own libraries based on the Robot Wire Protocol.


A robot is an automated wave participant. A robot runs as a server side application, being able to create waves and interact with them, for example by adding/removing participants, creating/modifying blips (the smallest unit of conversation exchanged in a wave), interacting with the outside world on behalf of waves. Google has upgraded the robots API to Robots API v2 which is not backward compatible with v1. All developers are invited to migrate their code to use the new API by June 30, 2010 when the old version will be retired.

Some of the new features introduced in Robots API v2 are:

* Active API: In v2, robots can now push information into waves (without having to wait to respond to a user action). This replaces the need for our deprecated cron API, as now you can update a wave when the weather changes or the stock price falls below some threshold. You can learn more in the Active API docs.
* Context: Robots can now more precisely specify how much information they want to get back from a particular event. If only the contents of the affected blip needs updating and you want to reduce your robot's bandwidth, then you can specify the new 'SELF' context. On the flip side, if you do need all the information in the wavelet, you can specify the new 'ALL' context. You can learn more in the Context docs.
* Filtering: In a similar way, with this new API, the robot can specify what events it needs to respond to, conserving valuable bandwidth -- and ignore all those that don't apply. You can learn more in the Filtering Events docs.
* Error reporting: Robots are now able to register to receive errors about failed operations, such as insertion on non-existent ranges. You can learn more in the Error Reporting docs.
* Proxying-For: Robots can now convey to Google Wave that their actions are actually on behalf of a different user, via the proxying-For field. For robots like the Buggy sample, which connects with the Google Code issue tracker, this means that the wave can be updated with attribution to users on non-wave systems. You can learn more in the Proxying-For docs.

Relational Investments

Friday, May 14, 2010

Now a days techies noticed a sharp change of focus in venture funding for data orientated companies over the last six months. Many VCs have lost some interest in funding data start ups that are doing anything around relational data management. Instead the interest is in NoSQL technologies, from key/value stores through to Hapdoop based data management layers.

I am highly supportive in the development, and therefore the funding, of a more diverse set of big data technologies than those based on the relational model alone. However I also advise caution to not throw the baby out with the bathwater. Relational data management technologies continue to be a focus of innovation. There are companies working on game changing step forwards which have relational under-pinnings.The relational model is going to continue to be the underlying model of most of the worlds structured data for the foreseeable future. Many opportunities for innovation exist and will continue to exist around this fundamental model into the future.

A mindset that relational is yesterdays technology and non-relational is tomorrows defies conventional wisdom and will lead to great opportunities being missed.

Intela and Samsung joins hand on Wimax technology

Tuesday, April 13, 2010

Intel Corp. said it was collaborating with companies including Samsung and Motorola to develop the next generation of WiMax mobile broadband technology, which will provide a speed boost in 4G wireless data transfers.The companies have joined a new group, the WiMax 2 Collaboration Initiative, which aims to accelerate the development of standards and devices surrounding WiMax 2 technology, the companies said in a joint press release. The group will collaborate with the WiMax Forum, an industry organization that certifies and promotes WiMax products.

WiMax (Worldwide Interoperability for Microwave Access) is a wireless technology that provides fast data-transfer rates over a wider area than Wi-Fi. The technology is finding adoption in Western European and developing countries, and is available in the U.S. through companies like Sprint and Clearwire. The new standard will provide transfer rates of more than 300Mbit.sec. at peak rates.Typical transfer rates on current WiMax networks could be between 4Mbit/sec. to 6Mbit/sec. for downloads and 1Mbit/sec. to 2Mbit/sec. s for uploads, but could scale higher depending on the distance from a tower, Intel has said.

The new WiMax 2 specification is built on the IEEE (Institute of Electrical and Electronics Engineers) 802.16m standard, which includes advanced on-air capabilities compared to the current WiMax deployments based on the 802.16e standard, the companies said. The 802.16m standard will be backward-compatible with previous standards and is expected to be completed by the second half of this year, the companies said.

India attacked by Spy network:Reports

Wednesday, April 7, 2010

Researchers have uncovered a spy network that stole classified and other sensitive documents from the Indian government, the Dalai Lama's office, the United Nations, and compromised computers elsewhere, according to a report released on Tuesday.The operation, dubbed "Shadow Network," is detailed in a report that also cites evidence it says links the Shadow network to two people living in Chengdu, China, and the underground hacking community in that country.

The report is based on research from volunteers at the U.S.-based Shadow Server Foundation and Information Warfare Monitor, which includes researchers from the Citizen Lab at the University of Toronto's Munk School of Global Affairs and the SecDev Group, an Ottawa-based consultancy.The researchers had uncovered another spy network, dubbed Ghost Net, last year that targeted the Dalia Lama as well as government agencies and nongovernmental organizations in other countries. That investigation led to the Shadow Network report. Cyber-espionage has been going on for years, but interest has increased with the news that Google and more than 30 other U.S. companies were targeted in computer attacks last year and Gmail users who were human rights activists were also targeted by spies.

For the Shadow Network report, the researchers spent eight months spying on the spies, grabbing copies of data that was stolen from compromised computers from the spy network's command and control servers, and analyzing the malware.The data stolen from the compromised agencies includes about 1,500 letters sent from the Dalai Lama's office between January and November 2009, reports on missile systems in India, and documents related to NATO force movements in Afghanistan.

Design of Open Media | To Blogger by Blog and Web