Wednesday, July 29, 2009

HD Trick Challenge

Fantastic video! Saw this on someone's tweet and was amazed at how they did it...









Of course like all people I did not pause to think of the answer and immediately clicked on the answer revealed video...



Simple answer right? But the preparation is so super complex if you think about it.

I want to do something like that too! Anyone out there interested to get it started with me?

I can be a prop in the video. I sit really still.

Monday, July 20, 2009

Sec 3 Science Project 2009!

Yeah! It's the annual Pythagoras' Switch Project. I am beginning to look forward to this project as the students ideas are becoming more and more innovative as the years proceed. My aim to be able to flood youtube with the students' videos this year and hopefully come up with some ideas for TKK Young Inventors' award!











And finally one project from last year!



Have fun!

Monday, July 13, 2009

Unburnt paper



The coin, which is a good conductor of heat, transfers the heat away from the flame and prevents the paper from burning up.

Water is a bad conductor of heat



The ice at the bottom of the test tube fails to melt even though the water at the top is boiling. Water is a bad conductor of heat and the heat at the top does not conduct to the bottom of the test tube.

Convection

Now teaching on transfer of thermal energy. Was telling 305 about convection. Here's two videos on it.



Friday, July 3, 2009

Cold Boot Attacks

Wow... this video is awesome! Normally I will think that the information from RAM is wiped out the moment power is cut from the computer. But this research shows otherwise! The information from RAM is kept from seconds to a few minutes and if the temperature is cooled down by using simple tools, the information can be kept for up to 10 minutes! Wow.. this means that if the RAM is being transferred to another computer, then the contents can be read... encryption keys can be stolen and private information is no longer private... or like what this research shows... RAM reading software can be developed and usedto decrypt the information just like that... Scary thought.

How then to protect your information that is stored in computers? Make sure it is not stolen physically!


Mr Goh's School Calendar

Disclaimer

Please do not try any of the experiments carried out in the videos shown on this blog without any adult supervision. They can be dangerous. Always seek an adult's supervision and advice before carrying out any of the experiments.