
Wednesday, July 31, 2013
The Tile Promises to Put an End to the Process of "Lost"

Tuesday, July 30, 2013
New Discovery May Lead to Fastest Processors Yet...

Monday, July 29, 2013
Don't Give Away Your Phone's Location with Your Camera's GPS

Friday, July 26, 2013
Build a Home Media Server
Thursday, July 25, 2013
Google Brings Internet to Your TV with Google Chromecast


Wednesday, July 24, 2013
Dental Hygiene Thought Leader Patti DiGangi, RDH, BS Publishes Useful Pocket Guide for Correct Periodontal Coding

DentalCodeology: More than Pocket Change Debuts in Print and Digital Formats
Addison, IL – July 10, 2013 – Patti DiGangi, RDH, BS, a prominent dental hygiene thought leader, recently published a dental insurance coding guide entitled, DentalCodeology: More than Pocket Change.
“This book is intended to be used by the entire dental team, including hygienists, dentists and office managers,” explained DiGangi. It is intended to answer any questions regarding proper periodontal care CDT coding by the dental hygiene department in a general dental practice, which should result in better patient outcomes and expedited insurance reimbursement.”
“DentalCodeology is not a reference book that will collect dust on a shelf,” DiGangi adds. “It’s designed to be on the front lines of patient care, whether in its hardcopy, pocket-sized booklet, or the downloadable digital version for smartphones.”
As part of her book launch, Ms. DiGangi is significantly reducing her $16.95 retail price. “For every book purchased at the discounted price of $12.00, I will also give the digital version for free,” explains DiGangi. “Buy two print books for $20.00, and you can share one print copy and one digital copy. My hope is that the hygienists who are attending RDH Under One Roof will share a copy with their colleagues who weren’t able to make the event.”
DentalCodeology: More than Pocket Change is the first book of a series designed to guide dental clinicians into the coding and electronic health records world. As dentistry moves from a
treatment-centered model to a diagnostic-centered model, consistent and accurate coding will be vital to ensure interoperability with the rest of healthcare industry.”
The book covers four of the twelve sections of CDT code related to periodontal care, including:
•D0100 - 0999 I. Diagnosis
•D1000 - 0199 II Preventative
•D4000 - 0499 V. Periodontics
•D9000 - 9999 XII Adjunctive Services
DiGangi’s other upcoming books on dental insurance coding will include: DentalCodeology: Diagnostic Coding & Medical Necessity co-written with Christine Taxin fall 2013, followed by DentalCodeology: CAMBRA and DentalCodeology: Oral Cancer in 2014. The books will also have a corresponding web seminar component as well.
For more information and to order, visit www.DentalCodeology.com. Follow DentalCodeologyon Facebook. Inquire about bulk discount pricing for manufacturers, schools and associations by contacting sales@DentalCodeology.com.
About Patti DiGangi, RDH, BS
Patti DiGangi is a futurist finding strength and direction from her inner convictions. Her energetic, thought provoking and successful program development shines a bright light for others to preview the future and find their place in it. As a still practicing clinician, she brings experience and news-you-can-use to her work. Patti is a National Speaker’s Association Certified Speaking Professional (CSP) candidate and a key opinion leader for multiple manufacturers. Patti is a certified Health Information Technology trainer and a member of the American Health Information Management Association and the Dental Software Advisor advisory board taking an active role in our shaping the changes in our electronic world. Patti holds a publishing license with the American Dental Association for Current Dental Terminology and is an ADA Evidence Based Champion. Most recently, Patti is the recipient of the 2013 Sonicare Mentor of Distinction of Award and the author of the “DentalCodeology” series of mini books on correct CDT coding for the general practice dental team.
Tuesday, July 23, 2013
COSMEDENT INTRODUCES A NEW TEMPORARY CROWN & BRIDGE MATERIAL Featuring Faster Working & Setting Times

MirrorImage is part of an exciting new product line that creates beautiful temporary crown & bridge restorations with special features for both dentists and patients. MirrorImage has faster working and setting times, superior handling, strength and durability, a low exothermic reaction, excellent esthetics and a natural fluorescence that your patients will appreciate. This product is available in a 50ml, 10:1 automix cartridge in the following 5 VITA shades: A1, A2, A3, B1 and Bleach (OM2). For more information contact a Knowledgeable Cosmedent Customer Care Representative at 800-621-6729 or visit us online at www.cosmedent.com. Try MirrorImage risk-free with Cosmedent’s 30 day free-trial guarantee.
Monday, July 22, 2013
Mobile Phone SIM Vulnerability Could Allow Easy Hack of Phones

Friday, July 12, 2013
SCIENTISTS PRESENT KEY FINDINGS ON NEW APPLICATIONS FOR THE CANARY SYSTEM

Quantum Dental Technologies (QDT) announced the findings from two key presentations last week at the 60th Congress of the European Organization for Caries Research (ORCA) in Liverpool, United Kingdom.
In the first study, lesion depth of natural caries was correlated with the readings from The Canary System, DIAGNOdent (DD), and the ICDAS II (a visual ranking system). Using polarized light microscopy to examine the tooth samples, investigators found that the Canary Numbers produced a more accurate correlation with lesion depth than either the DD or ICDAS II. This strong correlation may be explained by the ability of The Canary System to measure changes in the crystal structure of the tooth. In contrast, other caries detection devices rely on fluorescence technology. Fluorescence can detect the presence of bacterial porphyrins but is not capable of identifying changes in tooth crystal structure.
“With an overall Pearson’s Correlation coefficient of 0.84, The Canary System can be a great tool to aid dental professionals in the diagnosis of caries and estimation of lesion depth”, said Dr. Bennett Amaechi, Professor and Director of Cariology at the University of Texas San Antonio. “This is a very exciting development in dentistry and in the management of tooth decay”.
In the second study, the energy conversion technology PTR-LUM that powers The Canary System enabled investigators to accurately detect caries around the intact margins of ceramic crown restorations. In contrast, most of the DIAGNOdent readings did not reveal the presence of tooth decay. This study showed that The Canary System may be a valuable addition to conventional methods for detecting tooth decay that develops around ceramic crowns.
“The Canary System now provides dentists with the ability to detect tooth decay beneath the edges of fillings, crowns and bridges; one of the most common conditions that lead to the clinical failure of these restorations”, said Dr. Stephen Abrams, co-founder of Quantum Dental Technologies. “Early detection of tooth decay, before it is seen on an x-ray or detected with visual inspection, means that dentists can treat problems before the decay has destroyed significant amounts of tooth structure”.
The Canary System is a low-powered laser-based device that uses a novel combination of heat and light to directly examine the crystal structure of teeth. The Canary System can detect, map and monitor carious lesions on any tooth surface earlier and more accurately than other existing modalities.
For those who did not attend the ORCA meeting, please visit www.thecanarysystem.com or email info@thecanarysystem.com to request additional information.
Thursday, July 11, 2013
Women's Phone Receiver Bracelet

For the gal's out there who enjoy the blog, this one is for you!
The device shown above is a pretty cool looking (sorry, I'm a guy after all) accessory that also doubles as a way to keep up with what's happening when someone calls your mobile phone.
This Bluetooth enabled device has a black screen which discreetly shows the name or phone number of the caller when your mobile rings. The black screen simply looks like part of the bracelet, but in actuality it is a 128 x 32 pixel OLED display with the size of 14 mm x 35mm's.
While it is handy to know who is calling without having to look at your phone, this nifty little device does more than that. It also functions as a Bluetooth enabled hands-free device. So, instead of having a Bluetooth earbud ladies can now use a stylish bracelet instead. The device has a built-in microphone as well as a speaker. The only drawback in my opinion would be the fact that when others are around they came here both sides of the conversation. However in a situation such as being in your car, this could be a really great solution.
It also has a nice feature that prevents you from walking away and leaving your phone behind. Whenever you and your phone are more than 16 feet apart the device vibrates warning you.
I frequently see ladies digging frantically through their purse desperately trying to find a ringing mobile phone. This device seems like the perfect answer for those types of situations. Not only can you answer your phone without digging through your purse, you can also know who's calling and decide whether to take the call or not.
The device charges in 2 hours and has 72 hours of standby time.
The retail price is $109.99 and is available at the Sky Mall website. If you think this might be for you click here to go to the page order.
Wednesday, July 10, 2013
MicroMax LED Pocket Microscope… It Magnifies 100X and Works with Your iPhone


Tuesday, July 9, 2013
IRS Admits to Accidentally Posting 100K SSNs on Website
Monday, July 8, 2013
More Info on Prism
You have all heard about PRISM, maybe the most significant spying machine in the world’s history. And certainly one of the most significant disclosures about the United States’ intelligence operations. But how does this affect us ordinary netizens?
Let’s look at PRISM from a couple of different angles. The PRISM system is a gigantic intelligence network that gives NSA access to data in Google (Gmail, YouTube etc.), Facebook, Microsoft (Skydrive, Live, Skype etc.), Yahoo!, PalTalk, AOL and Apple. These companies are naturally denying it all, but it means nothing as that is what they would say anyway. The PRISM disclosure is backed up by leaked documents, and whistleblower Edward Snowden’s brave decision to come out under his own name makes it even more credible.
The disclosure of PRISM is hardly surprising for people familiar with IT security and privacy issues. It is not the only known intelligence program, data about Internet traffic is gathered in many other ways too. But it is still significant in many ways. It should first of all act as an eye-opener for ordinary people and politicians. It is no longer possible to dismiss people who talk about spying governments as paranoid tin foil hats.
US is not the worst country on earth when it comes to freedom on the net. But it is however a country that has made a strong promise about democracy, freedom of speech and integrity. It also aggressively fights many other countries that don’t live up to western ideals. The disclosure of a spying network that would make Stasi green of envy is of course much bigger news in a country like this.
And last but not least. US has a central role in the Internet of today. This makes PRISM a global issue and not just a local privacy threat in US. Many popular services, like Facebook, are US-based and your only options are to participate and live with PRISM, or quit. The authorities claim that they aren’t targeting US citizens, just communications involving foreigners. But that is about 95% of the world’s population. And can we believe them about not spying on the remaining 5%? So PRISM is really an issue for all of us, US citizen or not.
OK, but should I be worried? I’m no terrorist and not even criminal. I have nothing to hide. Will this really affect me?
Yes and no.
The immediate impact on your life is probably zero. These intelligence systems sift through and store huge amounts of data and it is impossible to read every single message. They use automatic filters that trigger on certain secret keywords, and flag these messages for closer examination. A message to or from you may trigger a filter once in a while, but its harmless nature will be apparent in the manual examination. There are of course a lot of private secrets that shouldn’t leak to others, but they are of no interest to authorities. The risk that such secrets leak through PRISM is close to zero. Most ordinary people fly under the radar of these systems and will not really notice them at all. What’s more scary is the stored data. We have no clue about how it will be used in the future and who will have access to it. To cite Snowden: “Even if you are not doing anything wrong, you are being watched and recorded. … You don’t have to have done anything wrong. You just have to eventually fall under suspicion from somebody. Even by a wrong call. And then they can use this system to go back in time and scrutinize every decision you ever made. Every friend you ever discussed something with and attack you on that basis to sort of derive suspicion from an innocent life and paint anyone in the context f a wrongdoer.”
So you should be very worried on a principal level. Have you ever thrown away something, just to later realize how much you would have needed it? This is what’s happening to privacy today. Many claim that they have nothing to hide and that the loss of privacy is a fair price for security. There are however two fundamental problems with that reasoning. Very few have any idea about what price we really pay, i.e. what impact the loss of privacy may have on our future lives. And nobody knows what security we get in return, if we get any at all.
The price. Today we live in a world where Internet still isn’t fully integrated in our lives. The development is fast but the net is still often seen as an alternative to handling your business in the traditional way. Any privacy issue will naturally be magnified by the day Internet is our mainstream way to communicate with other people and businesses. The intelligence systems of today are also fully capable of collecting data for any purpose, even if the official reason for building them is the fight against crime and terrorism. Today we are building more and more capable systems that tap into something that is becoming the backbone in our society. And all this with a blatant lack of openness and very rudimentary control of the purpose and use of these systems. I call this a recipe for disaster. Future misuse is inevitable, unless we change direction.
Can there for example be fair democratic elections in a country where one of the parties control the intelligence agencies, which in turn can intercept all electronic communications, including those of their political enemies?
And the upside, the benefit? Security? Sure, it sounds nice and easy to tap into the mail traffic between terrorists, wait until you have enough evidence and then bust in to arrest them all before they strike. But it’s not that easy. You can defeat these systems by using encryption, like PGP. This will still leave metadata about the communication and does not protect your identity. But you can use anonymity networks like TOR to access a webmail account. The groups that pose a real threat is no doubt competent enough to do this, so PRISM won’t catch them. Anders Behring Breivik killed 77 in Norway in July 2011. He acted alone and didn’t need to plan the attack with anybody else. Here again, nothing to catch for PRISM. So what are we left with? A couple of lunatics who work together but aren’t skilled enough to protect their communications. The authorities will catch some of these every now and then, and proudly present the catch to prove how necessary their intelligence system is. We will never know if these lunatics really were capable to perform the strikes they were detained for. So it all boils down to something that won’t catch the real threats, but still is a privacy problem for ordinary people who aren’t motivated to use all the countermeasures.
But is there anything we can do? Some claim that we have lost the battle and privacy is dead. I disagree. Privacy is fatally wounded but not dead. It needs CPR to survive, but there is a chance if enough people realize that we shouldn’t throw privacy away.
Here’s tree concrete advices about how you can deal with government intelligence and the privacy threat it poses.
- The fight for our future privacy is not about technology, it’s about politics. Prerequisites for privacy are a strong protection in the legislation as well as openness and clear rules for the inevitable cases where privacy must be breached to fight crime. Vote for candidates who share the concern about privacy and are motivated to join the fight. Get familiar with EFF.
- Should I avoid services that participate in PRISM? You can if you like, but it may not make much difference. And some PRISM-systems are hard to avoid. But as mentioned above, we don’t know how the PRISM-data will be (mis)used in the future. If you want to minimize your exposure to intelligence, prefer cloud services located in your own country. They are not perfectly safe either, but you do at least know what legislation applies to them. Things always get complicated when you communicate over borders. The legislation and secret practices in other countries may differ significantly from your own country, and a cloud service provider must naturally obey the authorities in the country where their server farm is located.
- You can safely assume that if a government wants your unprotected data, they will get it. No matter where you live and whom you communicate with. And no matter if it’s your own government or some other. There are numerous known intelligence programs that target both stored data and data in transit, and even more that have remained secret. You really need to use strong cryptography and other means of protection if you have secrets that is of interest to authorities. You need to pay attention to a lot of different factors so go through your case with a trustworthy expert. Remember that intelligence systems can be used for industrial espionage as well, so relevant business secrets should be protected too. Criminals and terrorist are not the only ones who have a reason to hide.
http://safeandsavvy.f-secure.com/2013/06/11/should-i-be-worried-about-prism/?ecid=4767&nlcid=4767
Sunday, July 7, 2013
Dell "Exploring" Wearable Computing Options...
I've written here before about the shrinking market for PCs as smart phones and tablets continue to take more and more of the market.
Now comes word that computer maker Dell is “exploring” the market of wearable computing.
Obviously as PC sales continue to go down, Dell is looking for a way to increase sales and to help offset the decreasing market for PCs.
Google Glass has made a lot of folks really stop to consider the idea of a device worn on the body that can connect and communicate in real-time.
While Dell has made no statement regarding what kind of hardware they would be looking at, the idea that they are considering a move to wearable devices shows that the company feels that's where the market is headed.
There will obviously be lots of growing pains as these devices hit the market as no one really knows the repercussions of devices such as this. However, I certainly feel that at some point in time this will be a major part of the technology market.
Friday, July 5, 2013
Sometimes You Just Gotta Reboot...

Thursday, July 4, 2013
Happy Independence Day!!!
No post today as I'm spending time with family & friends.
I hope you are doing the same & enjoying the celebration of what America is all about!
Wednesday, July 3, 2013
Feedly On Your iPad… *and* in The Cloud

Tuesday, July 2, 2013
Triodent Announces the V4 System

Monday, July 1, 2013
BlackBerry Chooses to End Manufacture of PlayBook Tablet
