Business – small or large – now flourishes online. Hi CW – yes! Unfortunately you are preaching to the choir here about the benefits of solar power, hydro, wind, geothermal, etc. We really do need to become energy independent. Big oil is a big hurdle, however. To confuse things further, electrical engineering technology (EET), is the name given to the applied electrical engineering domain that deals with the hands-on manufacturing, maintenance and repair of electrical systems and circuitry, and involves working with everything from industrial electronic motors to consumer electronic products. Preliminary data taken over three months showed a decrease in total cholesterol and waist circumference, an increase in HDL and a positive adherence to lifestyle changes. Eastwood says that because there is so little data for wireless health, she and her team wrote a paper about compliance, which included tracings from app data that revealed that two women in the study had shaken their phones to simulate daily exercise. For many people, information is perhaps the most important aspect of desktop computers, laptops and smartphones. Another plus point about elementary OS is that it’s a widely used distribution.Â This means that you won’t end up with a Linux spin that’s rather unknown and not be able to find support and help easily. Yes, I agree abnertegan that we cannot avoid or get rid of mobile phones or cell phones totally but we should take some preventative steps now or it will be too late. Thanks for the link though. We are already under massive surveillance from our governments, with the world starting to look more like George Orwell’s fictional 1984 novel than like the real world which Orwell lived in when he wrote it. The real danger, however, is the in power that the analysis of this ‘big data’ gives government to not only watch us, but to manipulate and control us. I’m not necessarily talking about the kind of MK-Ultra mind-controlled assassin type of control here – more like the kind of control seen in advertising and social engineering, only much more effective. Security updates are much more critical in nature. These make sure ‘holes’ in the operating system aren’t left open after they’re discovered. Typically, most hackers would exploit these. When you hear of the latest Microsoft exploit, this is what is being referred to. Hackers and virus code writers have software which continuously scans for computers on the internet which have not patched these vulnerabilities so they can be exploited. Sharing of information: People want to share information by transferring files or by organizing events in a working environment or as part of their social lives. They use email to do that as it is cheaper and easier than telephone calls. Social bookmarking sites and online clipboards are on the rise to fulfill a need to share information.