Pages

Friday, September 28, 2012

Intel launches Windows 8 tablets with new ‘Atom’ processor


San Fransisco: Intel Corp roped in device makers such as Samsung Electronics Co Ltdand Hewlett Packard Co on Thursday to showcase tablets powered by its new “Atom” processor — a chip it hopes will help it biannually break into that crowded market.
Intel initially brushed off any threat from tablets such as Apple Inc’s iPad, but now hopes the combination of a low power consuming processor with touch friendly Microsoft Corp Windows 8 software will win over enterprise customers looking to deploy tablets, but keep PC-based software and hardware.
The world’s largest chip maker says the “Atom Z2760″ – formerly code named “Clover Trail” – is tailored to work with the latest version of Microsoft’s operating system, due in late October. Tablets that use both the Atom and Widows 8 will be able to run widely used software such as Word and Excel, while connecting to peripherals such as printers.
It also lengthens battery life, enabling tablets to run 10-plus hours of streaming high-definition video, said Intel applications processor division chief Eric Reid.
Targeting corporations and government agencies means the first wave of Intel-powered tablets and tablet-laptop hybrids will avoid the worst of the consumer war now raging between Google Inc and Amazon.com Inc .
“These new Atom-based tablets have been targeted at spaces where Intel and Microsoft can win, the enterprise market, and as an alternative to a notebook,” said Patrick Moorhead, head of Moor Insights and Strategy.
Dell Inc , Acer Inc, Asustek Computer Incand ZTE Corpround out the half-dozen PC makers that trotted out their upcoming tablets, some of which sport a detachable keyboard or stylus designed to support free-form drawing and writing.
“Every tablet shown today does what neither an iPad or Kindle Fire HD does well, which is creating content and controlling via a keyboard and trackpad,” he said. “This provides differentiation while not going head to head with Apple and Amazon.”
With PC sales expected to stagnate over the next year or two, Intel hopes to make up for lost time and regain market share ceded to rivals such as Qualcomm Inc , Texas Instruments Inc and Nvidia Corp , whose applications processors now power most tablets except the iPad.
Although the “Intel Inside” sticker remains affixed to 80 percent of the world’s PCs, the Santa Clara, California, company has been slow to adapt its chips for smartphones and tablets.
Analysts say the semiconductor industry leader has woken up to the tablet threat only in the past year. It is now rushing into the mobile market, motivated in part by slowing PC sales across consumer, businesses and even the emerging market segments it once relied on to propel sales.
This month, it cut its third-quarter revenue estimate by a more than expected 8 percent and withdrew its full-year outlook entirely.
Intel’s tablet strategy so far has focused on Windows 8 and its “x86″ architecture found in most of the world’s PCs. But executives said this month that tablets running their processors and based on Google’s Android software are also in the works.
Microsoft’s main assault on the tablet market involves Windows RT, a version of Windows 8 that works off the ARM Holdings chip designs that now dominate the market and drive the iPad and other mobile devices.



Nasa's Mars rover finds first evidence of water

Nasa's Mars rover, Curiosity, dispatched to learn if the most Earth-like planet in the solar system was suitable for microbial life, has found clear evidence its landing site was once awash in water, a key ingredient for life, scientists said Thursday.

Curiosity, a roving chemistry laboratory the size of a small car, touched down on August 6 inside a giant impact basin near the planet's equator. The primary target for the two-year mission is a three-mile (five-km) -high mound of layered rock rising from the floor of Gale Crater.
Scientists suspect the mound, known as Mount Sharp, is the remains of sediment that once completely filled the crater. Analysis of a slab of rock located between the crater's north rim and the base of Mount Sharp indicate a fast-moving stream of water once flowed there.
Images taken by Curiosity and released on Thursday show rounded stones cemented into the rock, which rises like a piece of jack-hammered sidewalk from the planet's surface.
In this 2011 file artist's rendering, a "sky crane" lowers the Mars Science Laboratory Curiosity rover onto the surface of Mars. AP/Nasa/JPL-Caltech
The stones inside the rock are too big to have been moved by wind, Curiosity scientist Rebecca Williams, with the Planetary Science Institute in Tucson, Arizona, told reporters on a conference call.
"The consensus of the science team is that these are water-transported gravel in a vigorous stream," she said.
The rock is believed to be from the floor of an ancient stream which was once between ankle- and knee-deep.
The analysis is based on telephoto images taken by the rover, which is en route to a patch of land named Glenelg where three different types of rock intersect.
Scientists have not yet decided if the slab of rock warrants a chemical analysis, or if there are better targets for Curiosity to look for the building blocks of life and the minerals to preserve it.
One of the first images from the Curiosity rover is pictured of its wheel after it successfully landed on Mars. Reuters/Courtesy Nasa TV
"The question about habitability goes beyond the simple observation of water on Mars," said lead scientist John Grotzinger at the California Institute of Technology.
"Certainly flowing water is a place where microorganisms could have lived. This particular kind of rock may or may not be a good place to preserve those components that we associate with a habitable environment," he said.
The $2.5 billion Mars Science Laboratory Curiosity mission is Nasa's first astrobiology mission 


Post your comments..



Thursday, September 27, 2012

California man linked to anti-Islam film arrested


A California man linked to an anti-Islam film that has stoked violent protests across the Muslim world was ordered jailed without bond on Thursday by a federal judge over accusations that he violated terms of his probation on a bank fraud conviction.
                
Nakoula Basseley Nakoula, 55, has been under investigation by probation officials looking into whether he violated the terms of his 2011 release from prison on a bank fraud conviction while making the film.
As a condition of his release, Nakoula, a Coptic Christian who most recently lived in the Los Angeles suburb of Cerritos, was barred from accessing the Internet or using aliases without the permission of a probation officer, court records show.
The court has a lack of trust in the defendant at this time, Chief Magistrate Judge Suzanne Segal said in making the ruling, citing a pattern of deception and the possibility Nakoula was a flight risk.
The crudely made 13-minute movie, billed as a trailer, was filmed in California and circulated online under several titles including Innocence of Muslims. It portrays the Prophet Mohammad as a fool and a sexual deviant.
On Sept. 11 and in the ensuing days, the clip sparked a torrent of anti-American unrest across the Muslim world. The outbreak of violence coincided with an attack on U.S. diplomatic facilities in the Libyan city of Benghazi that killed four Americans, including the U.S. Ambassador Christopher Stevens.
Federal probation officers investigating whether Nakoula, who was brought into the court wearing street clothes with his hands in cuffs and shackled at his waist, violated the terms of his release while making the film.
Federal prosecutors have made eight allegations against Nakoula of violating the terms of his release, including lying to probation officers. Nakoula's defense attorney had asked a federal judge in Los Angeles that he be given bond of $10,000.
BOUNTY FROM PAKISTAN
Nakoula has stayed out of the public eye for much of the past two weeks, amid outrage in Muslim countries over the film. Last week, Pakistani Railways Minister Ghulam Ahmad Bilour offered $100,000 to anyone who kills the maker of the video.
The Pakistani prime minister's office later distanced itself from the railways minister's statement.
Nakoula's attorney, Steve Seiden, said on Thursday he was extremely concerned for (Nakoula's) safety, suggesting he might not be safe in federal prison in Los Angeles because of the presence of Muslim prisoners there.
Prosecutors countered that Nakoula would actually be safer in custody than on the outside.

Romney or Obama Win Means No Escape From Fiscal Crisis of Debt




Consumers, banks and businesses have been busy getting their balance sheets into better shape since the U.S. economic recovery began more than three years ago. Now, it’s the government’s turn.
Whoever wins the presidency will contend with a budget on a trajectory dubbed unsustainable by Federal Reserve Chairman Ben S. Bernanke. Barack Obama or Mitt Romney will have to tame a deficit that has topped $1 trillion in each of the past three years, Bloomberg Markets magazine reports in its November issue. How the new president goes about it will influence the direction of financial markets and define the economy and society for his four-year term and beyond.
“We’ve made a lot of progress getting the private-sector balance sheet in order,” says Mark Zandi, chief economist at Moody’s Analytics in West Chester, Pennsylvania. “Where we’ve got a lot of work to do is on the public side.”
Research from Harvard University economists Carmen Reinhart and Kenneth Rogoff shows why it’s necessary to do that work. Their data on sovereign indebtedness, which go back more than two centuries, demonstrate that growth has been hobbled when central government debt is more than 90 percent of annual gross domestic product five years in a row. The U.S. is now at the Reinhart-Rogoff debt threshold.
Gross federal debt has exceeded 90 percent of GDP for the past two years and is projected to remain above that level through 2017 at least, according to the White House’s Office of Management and Budget. Even publicly held debt, which excludes the special-issue securities held by the Social Security trust fund and other government agencies, reached 68 percent of GDP in 2011.

‘Subpar Economy’

“It’s not about we’re going to have a financial crisis tomorrow,” Reinhart says. “We’re just going to have this subpar economy.”
The sea of red ink is pushing business executives to get involved in the debt debate and should force political leaders to act, says David Cote, chief executive officer of Honeywell International Inc., who was a member of the debt reduction panel created by Obama and led by former Republican Senator Alan Simpson and former White House Chief of Staff Erskine Bowles, a Democrat.
“We have more debt on a percent-of-GDP-basis today -- by a large amount -- than we did during the Reagan years, World War I, the Civil War, the Revolutionary War,” Cote said at the Bloomberg Markets 50 Most Influential Summit on Sept. 13. The only time the U.S. was deeper in debt was during World War II. “And then, we had a very good reason,” he said.

Debt Clock

Cote is on the steering committee of the Campaign to Fix the Debt, a group pushing for a comprehensive plan to get the federal budget on better footing.
Budget matters have permeated the presidential campaign. At their convention in Tampa, Florida, in August, Republicans displayed a running tally of the rising national debt -- 14 digits, about $16 trillion -- above the stage. A week later, at the Democratic convention in Charlotte, North Carolina, former President Bill Clinton reminisced about the budget surplus at the end of his second term in 2000.
The costs of doing nothing are rising. Unless and until business leaders see that the gridlock in Washington can be broken, they’re going to be reluctant to make investments or hire more workers, according to Cote. The political inaction hurts growth. “What it causes you to do is sit there and say, ‘I’m better off waiting right now. I shouldn’t spend my shareowners’ money until I have some sense of where things are going,’” he said.

Fiscal Cliff

Fear that politicians will be unable to reverse the long- term trend in the debt is compounded, in Cote’s view, by the possibility that they will fail to stop the huge tax increases and spending cuts scheduled to go into effect starting next year. Although leading the country off this so-called fiscal cliff would almost halve the budget deficit, economists say it’s exactly the wrong way to go about it if you want to limit harm to the economy. The abrupt austerity would likely strangle the fragile three-year-old recovery.
Maya MacGuineas, president of the Committee for a Responsible Federal Budget, based in Washington, says there’s growing support on Capitol Hill for tackling the debt in a constructive manner. She says she’s hopeful that a “grand bargain” to put the government’s finances on a sounder footing may be possible between a newly elected president and Congress, helped along by the need to deal with the fiscal cliff.

Grand Bargain

The term grand bargain is shorthand for a compromise that addresses the long-term trend of a budget that gets harder to balance as health-care costs rise and the population ages. The goal is to put a deal in place now that shows the government is committed to a plan to shrink the deficit -- without shocking the economy in the near term.
Alan Blinder, a former Fed vice chairman who’s now a professor at Princeton University, says his ideal policy would be $500 billion of stimulus up front coupled with $5 trillion in deficit cuts over the following 10 years. The former is unlikely, he says, with Republicans having made stimulus a dirty word in Washington. And the latter may not happen either, as long as interest rates stay low. Blinder says policy makers will likely tackle the debt piecemeal, with limited changes in the tax code and compromises on spending rather than an overarching agreement.
“There is more discussion about dealing with the deficit than I’ve heard in a long time,” says Howard Gleckman, resident fellow at the Urban Institute and editor of the TaxVox blog. Still, he says he remains skeptical that the talk will translate into action. Like Blinder, he says low interest rates allow policy makers to kick the can down the road.

Samsung Galaxy Note 2 Hands-on Review in India


Samsung Galaxy S3 vs Galaxy Note 2: Specs and features comparison



They come from the same company but attract different people. Here we compare Samsung Galaxy S3 vs Galaxy Note 2 specs and features.
Samsung has finally introduced its latest smart-phone Galaxy Note 2 in many counties in the world. It will be released in United States too within a couple of weeks. Though, given its huge size it is being called a phablet (phone+tablet), but it largely remains a smart-phone and people happily use it to make phone calls. When some people were pressed about the huge size of the Galaxy Note, they countered why people still use landline handsets for making and receiving calls.
The second version of the much admired phablet is launched in the market when there is very tough competition among top smart-phones in the market. We have Apple’s recently introduced iPhone 5 that has also come with relatively bigger size, Samsung’s own Galaxy S3 that is still a hot selling smartphone and HTC’s One X, besides many other mid and top range smart-phones. But notwithstanding the availability of so many top smartphones, Samsung’s Galaxy S2 is going to hold its own in the market and attract millions of customers to it.
Samsung’s Galaxy S3 also comes with a very big size. It comes with 4.8 inch display that makes it biggest smartphone available in the market. But it pales in Galaxy Note 2’s comparison. Here we compare these top Samsung smart-phones.
To be true, both Samsung Galaxy S III and Galaxy Note 2 come with the best specs in any smart-phone available in the market. The two also showcase the segmentation that the Korean technology company has tried to do in the market and be the market leader. Phablet of more than 5 inch size didn’t exist before Samsung launched it and it launched its second version that comes even with better specs.
When it comes to form factor, the new version of phablet is just an oversized Galaxy S3. They have different functions and are aimed at entirely diverse customers. When Galaxy S3 is just a smartphone for all, the Note 2 is a special device for those, who have to write and consume more data than to call and receive calls. Galaxy S3 is certainly smaller compared to Note 2. The device has the dimensions of 136.6 x 70.6 x 8.6mm and it weighs at 133 grams. Taking it alone, it is one of the world’s most slimmest and lightweight handsets. But, Galaxy Note 2 is naturally larger and heavier than the S3. The gadget measures in at 151.1 x 80.5 x 9.4mm and weighs at 180 grams, because it is a 5.5-inch phablet.
Galaxy S3 is the biggest smart-phone and its massive 4.8 inch display proves it amply. Galaxy S3 comes with a 4.8-inch Super AMOLED display with 720×1280 pixels at 306ppi. The second generation Note on the other hand comes with the same resolution, but pixel-per-inch-rate falls to 267 with its expansion to a larger 5.5-inch display. It is also makes use of Super AMOLED capacitive touchscreen technology. Both devices have got their displays protected against scratches by Corning’s Gorilla Glass 2.
Both the phone and phablet compete well when it comes to processor. Galaxy S3 and Note 2 show off the same Exynos 4412 Quad chipset inside. The new quad core-based chipset from Samsung is the most exceptional thing with the latest Samsung handsets. The devices also have the same Cortex-A9 processors, but they differ in clocking speed, which goes 1.4GHz for Galaxy S3 and 1.6GHz for Galaxy Note 2. The handsets extract their graphical performance from the same Mali-400MP GPU. Yet, the S3 has only 1GB of RAM, which is 2GB in Note 2. 2GB Ram will make it faster than any other phone available in the market and create a benchmark for others to follow.
Galaxy Note 2 is going to be loved by users who have waited for its launch with great patient. It comes pre-loaded with Jelly Bean making it much more desired than anything else Android offer. Galaxy S3 on the other hand comes with Android 4.0 Ice Cream Sandwich. There is still no clarity as to when it will get the latest Android firmware update. The S3 is publicly available in two memory variants; 16GB and 32GB. The Note 2 is announced to feature 16GB, 32GB and 64GB versions, however. Both devices have microSD slots, with the former having 64GB and the latter having 32GB compatibilities. Meanwhile its smart stylus has got smarter in the new generation of the phablet and users are going to love it.

Win Race with Visual Studio 2012





Social Engineering

It all begins with a team of hackers that spy on a specific company and seek out data needed to hack into its system. Members of this team underhandedly make people cooperate with them through psychological tricks. Once they do, these intruders obtain data necessary (as usernames and passwords) to access company networks. Knowing that most business staff workers are kind and polite as well as trusting, hackers pretend they’re employees of the targeted enterprise while asking for simple favors. Rather than physically breaking into an enterprise’s system, they seek out information as a way to get unauthorized access to it. This practice is referred to as social engineering.

As you know, a chain is as strong as its weakest link. If security were a chain, its weakest link would be the natural human kindness to trust anybody based on his or her word alone. No matter how effective our firewalls and our antivirus and anti-spyware programs work, they can only do so much to deter intruders. Every business needs a security policy to prohibit “visitors” from entering secured areas of its buildings. Employees must be trained not to let in strangers or answer security-related questions over the phone.


Gaining Company Info

Just like hackers, social engineers seek to gain confidential facts or unauthorized access as a means of finding out more about a targeted company. With such data, intruders can commit fraud, obtain network access, undergo industrial espionage, steal one’s identity, or simply raise havoc with the company’s network. Common targets of such malicious acts are telephone companies, answering services, prominent corporations, banks, military and government agencies, and hospitals. Still, any company, large or small can be a victim to social engineering.

Why is social engineering becoming widespread? Because asking people for passwords or other illicit access data is much simpler than technical computer hacking. Even those with a great degree of hacking expertise find it’s much simpler to make a phone call and ask one for his password.

Companies are attacked via social engineering on a physical basis. Sources of illicit info about an entity are sought in the workplace, through the phone system, from trash cans, and via online access. Hackers have been known to walk into offices pretending to be a consultant or janitor. Such a person will casually strut around the workplace and seek out papers with passwords on them or watch over employees’ shoulders as they log in. Once the intruder found such data, that person will leave the premises and enter into the company’s network from their home.


Hacking by Phone 

Another popular form of social networking is done over the phone. A potential hacker will call a user and impersonate one who has authority or relevance as a means of getting data from the user. Often, a hacker may claim they’re calling from within the corporation and then will play tricks on its operator. Such a person will say something like, “Hello, I am your representative from AT&T and I will need some info from you to fix a problem with your account.” They may ask for one’s AT&T card number and PIN combination.

One of the most vulnerable places of social engineering within a company is its help desk. Its staff are trained to be friendly, but taught the minimum necessary to answer common inquiries. Most of its employees know little, if anything about the security of their employer and are also paid low wages. All they do is answer a caller’s questions and move onto the next caller. Hence, the help desk is a potential gold mine for hackers and a large security hole for the entity.

Yet another method called “shoulder surfing” is done at pay phones and ATMs, especially at large airports. People lurk around these machines and peek over users’ shoulders to obtain credit card and PINs. Users must be extra careful when using them.


Going Through Trash

Illicit information is also obtained via dumpster diving. Social engineering is done by pulling out discarded documents and company materials as phone books, employee handbooks, memos, calendars, system manuals, and any other sensitive data printed on paper. Additional data can be found on user/password login lists, source code printouts, floppy disks, storage tapes, stationery, and discarded computer equipment.

How are these items useful to a hacker? Company phone books list the names and numbers of employees hackers can call and beguile. Organization charts reveal names and positions of a company’s staff. Employee handbooks give the hacker an idea of how secure the business is (or isn’t). Technical information found in system manuals and source code reveals sensitive data needed to unlock and access the network. Media such as disks, tapes, and hard drives may hold all kinds of data that will benefit a hacker. Stationery and memo forms serve as an authentic way to send employees malicious correspondence.

Requesting Info Online

Working online is yet another form of social engineering. Some hackers send online-forms to be filled out by users and require the entry of a username and password, email address, or card number and PIN combination. With these forms are advertisements stating the user has won some sort of sweepstakes and all he needs to do is supply information to claim his prize. Also, people tend to use the same username/password pair for more than one account and once a hacker has these two pieces of data, he may access other sites that the user visits frequently. Some users respond through their corporate email addresses unknowingly letting the hacker know where they work. Yet other hackers will send correspondence via the US mail asking for info.

Yet, the oldest trick in social engineering is pretending to be the network administrator. Real network administrators already know the username/password combinations of every employee, even if one decides to change theirs on the spur of the moment. If there are concerns related to a company’s network, employees should talk with their networker face-to-face.

In Conclusion

Social engineering is becoming increasingly popular among hackers. It is best to be alert at all times and never give information out over the phone, even if the voice sounds familiar. Never open up emails, especially attachments, from parties you don’t know. Shred all documents before throwing them in the trash and have all computer media and hardware physically destroyed before disposing of them. Remember, legitimate network staff and company reps will never call you and ask for passwords. If you’re unsure about a request made via the phone, arrange to meet the caller in person.


About the Author: Publishnprosper publishes articles on numerous computer usage topics. In his articles you will find useful tips on maintaining your computer and keeping it virus-free. If you’re interested in purchasing antivirus software, you may find coupons onhttp://www.dailydeals4you.comKaspersky coupon codesBitdefender promo, etc.

Lumina 920 vs IPhone 5


September 27 isn't Google's birthday, nevertheless there's a doodle


New Delhi: There is a doodle on the Google home page that celebrates the company's 14th birthday. But the interesting fact is that September 27 isn't the search giant's birthday.
The selection of September 27 as Google's birthday seems to be a one of convenience than the actual date when the company was founded.
Google celebrated September 7 (the day when the company was incorporated) as its birthday till 2005.

In 2005 Google changed the date to September 27 to make it coincide with the announcement of the record number of pages that the search engine was indexing.
For its 14th 'birthday' doodle, Google posted an animated doodle on its home page. The doodle shows a chocolate cake with 14 candles on it and the Google logo etched on the cake. As soon as the candles are blown out, the cake then gets covered in Google colours and the 14 candles rearrange themselves as tally marks to denote the number 14.
In 2011, when Google turned 13, Google doodled for itself a photograph that showed Google's 13th birthday celebrations. It had a cake on a table with 13 candles on it, and Google logo sat around the table in party hats while gifts and balloons added to the celebratory mood.
It's has been 14 years since 1998 when two Stanford university students, Larry Page and Sergey Brin, got together to form a company that would change the face of the Internet, for ever.



Obama exploiting Arab Spring for political gain: Assange


Wikileaks founder Julian Assange has accused US President Barack Obama of seeking to exploit the Arab Spring revolutions for political gain, reported guardian.co.uk.
Addressing a gathering of diplomats at the UN through a satellite videolink, Assange focused on Obama's address to the UN General Assembly Tuesday in which the president gave a staunch defence of freedom of speech and spoke of American support for the revolutions in the Arab world.
Assange said that it was 'audacious' for the American government "to take credit for the last two years of progress", given past US support for the ousted Arab dictators. Mohammed Bouazizi, a Tunisian street peddler whose suicide sparked the revolt, "did not set himself on fire so that Barack Obama could get re-elected", said Assange, adding that it was "disrepect to the dead to claim that the United States supported the forces of change."
Going on to claim that it was the leak of classified US diplomatic cables to Wikileaks by Bradley Manning, an US soldier, that "went on to help trigger the Arab Spring", Assange spoke of the treatment meted to Manning in a US prison. While referring to Obama's UN defence of the freedom of expression, Assange recalled how Manning was held in isolation, stripped and left naked for hours in his cell.
"The time for words has run out. It is time to cease the persecution of our people and our alleged sources. It is time to join the force of change not in fine words but in fine deeds," Assange was quoted as saying

Tuesday, September 25, 2012

RED ALERT!!

PLANT TREES AND SAVE OUR EARTH

More than 100 million people will die and global economic growth will be cut by 3.2% of gross domestic product (GDP) by 2030 if the world fails to tackle climate change, a report commissioned by 20 governments said on Wednesday. As global average temperatures rise due to greenhouse gas
emissions, the effects on the planet, such as melting ice caps, extreme weather, drought and rising sea levels, will threaten populations and livelihoods, said the report conducted by humanitarian organisation DARA.
It calculated that five million deaths occur each year from air pollution, hunger and disease as a result of climate change and carbon-intensive economies, and that toll would likely rise to six million a year by 2030 if current patterns of fossil fuel use continue.
More than 90% of those deaths will occur in developing countries, said the report that calculated the human and economic impact of climate change on 184 countries in 2010 and 2030. It was commissioned by the Climate Vulnerable Forum, a partnership of 20 developing countries threatened by climate change.
"A combined climate-carbon crisis is estimated to claim 100 million lives between now and the end of the next decade," the report said.
It said the effects of climate change had lowered global output by 1.6 percent of world GDP, or by about $1.2 trillion a year, and losses could double to 3.2% of global GDP by 2030 if global temperatures are allowed to rise, surpassing 10 percent before 2100.
It estimated the cost of moving the world to a low-carbon economy at about 0.5% of GDP this decade.
COUNTING THE COST
British economist Nicholas Stern told Reuters earlier this year investment equivalent to 2% of global GDP was needed to limit, prevent and adapt to climate change. His report on the economics of climate change in 2006 said an average global temperature rise of 2-3 degrees Celsius in the next 50 years could reduce global consumption per head by up to 20%.
Temperatures have already risen by about 0.8 degrees Celsius above pre-industrial times. Almost 200 nations agreed in 2010 to limit the global average temperature rise to below 2C (3.6 Fahrenheit) to avoid dangerous impacts from climate change.

But climate scientists have warned that the chance of limiting the rise to below 2C is getting smaller as global greenhouse gas emissions rise due to burning fossil fuels.
The world's poorest nations are the most vulnerable as they face increased risk of drought, water shortages, crop failure, poverty and disease. On average, they could see an 11% loss in GDP by 2030 due to climate change, DARA said.
"One degree Celsius rise in temperature is associated with 10% productivity loss in farming. For us, it means losing about 4 million metric tonnes of food grain, amounting to about $2.5 billion. That is about 2 percent of our GDP," Bangladesh's Prime Minister Sheikh Hasina said in response to the report.
"Adding up the damages to property and other losses, we are faced with a total loss of about 3-4% of GDP."
Even the biggest and most rapidly developing economies will not escape unscathed. The United States and China could see a 2.1 percent reduction in their respective GDPs by 2030, while India could experience a more than 5% loss.
The full report is available at: http://daraint.org/