© 2012 Phys.org Distributed Credential Protection: Trying to beat the hackers and protect our passwords (Phys.org)—In what has become an annual tradition, SplashData, a company that makes productivity applications for smartphones, has released a list of passwords it claims are the most commonly used to access online applications. The list is compiled by the company using passwords that hackers have posted on various web sites to illustrate the ease with which online accounts can be cracked. SplashData refers to the top 25 passwords as the “worst passwords of the year.” Explore further The top three haven’t changed from last year: “password,” “123456” and “12345678.” SplashData indicates that many people fear forgetting their password more than they fear hackers breaching their account. Others, perhaps responding to reports of multiple recent website hacking incidents, have resorted to trying easy-to-remember (but still easy-to-hack) passwords such as “Jesus,” “mustang,” “welcome” and “ninja.” In response to the posting by SplashData, several computer security companies have posted tips to users aimed at encouraging protection of accounts with stronger passwords. Most companies persist with the tried-and-true standard of suggesting users choose passwords that mix numbers and letters, are at least eight characters long, and include punctuation characters. Experts also suggest users choose different passwords for different sites to prevent hackers from accessing all of their accounts if they happen to gain access to their single-use password. A third option is for users to choose difficult-to-remember passwords and then use a password manager application (such as SplashID Safe made by SplashData), which tracks all passwords and then enters them automatically when users log into to registered sites.SplashData encourages people—especially those who use the same password for access to online entertainment sites such as Facebook and Twitter, and those sites that hold important bank and credit card information—to take the task of choosing a password more seriously. The company also suggests that people who are currently using one of the “listed” passwords change it immediately, or risk having their account compromised. Citation: SplashData’s annual list shows people still using easy-to-guess passwords (2012, October 25) retrieved 18 August 2019 from https://phys.org/news/2012-10-splashdata-annual-people-easy-to-guess-passwords.html This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.
More information: Natural gas: The fracking fallacy, Nature 516, 28–30 (04 December 2014) www.nature.com/news/natural-ga … king-fallacy-1.16430 Journal information: Nature Just half a decade ago geological experts with the government and in private industry were bemoaning the sad state of U.S. energy production. Gas prices were high causing the government to invest funds in renewable resources, but then, suddenly, hydraulic fracturing, now known the world over as fracking took off, offering industry and consumers a seemingly unending energy source. President Obama boasted that fracking would provide the U.S. and other countries with natural gas for a hundred years. That boast was slightly tempered when the EIA suggested that peak production would likely last up till 2040, and then taper off after that. Now, the Texas team is suggesting that even that estimate is too optimistic—they suggest the peak will likely come in 2020, and after that production will fall off dramatically.The estimates differ, Inman says, because of differing approaches used to arrive at estimates. The Texas team used finer resolution he says, which offers a more realistic view of where we stand. As an example, he notes that the EIA made estimates based on county wide production in a given area, whereas the Texas team divided areas into one square mile units. Basing estimates on counties, he says, isn’t fine enough because county size varies so much, with some as large as a thousand square kilometers. He and his team believe that the EIA also erred by overlooking human nature in the equation. Mining companies tend to look for the sweet spots, which is where production will be highest, he notes—once the sweet spots are depleted, production drops dramatically because there is less gas to be found, which means adding more costs to retrieve it.Inman also claims that several other smaller university based studies have found the EIA’s estimates to be overly optimistic as well. He notes that it’s critical that true estimates be made, as the future U.S. economy is being based on investments in natural gas—not getting it right could very well spell disaster. Explore further This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. Citation: New study suggests US fracking boom may not last as long as predicted (2014, December 4) retrieved 18 August 2019 from https://phys.org/news/2014-12-fracking-boom.html (Phys.org)—A team of researchers with the University of Texas has conducted an analysis of the fracking business in the United States and has found that the estimates made by other groups, most specifically the Energy Information Administration (EIA) regarding the amount of natural gas that can be extracted, is much too high. In a Nature News Feature, team lead Mason Inman suggests that the boom may last just half as long as predicted. Credit: EIA/Univ. Texas/Goldman Sachs/Wood Mackenzie/Navigant, via Nature, doi:10.1038/516028a Water use for fracking oil resembles use for conventional production © 2014 Phys.org
Explore further (Phys.org)—A pair of researchers with the Paris School of Economics in France has conducted an analysis of competitive exam results that are used as a basis for hiring teachers in that country and has found that there exists a bias toward grading women higher in traditionally male-dominated fields. In their paper published in the journal Science, Thomas Breda and Mélina Hillion describe their study and results, and suggest that policies that target female students at an early age be modified to reflect the reality that young women face when considering a career in one of the sciences. New study explores gender bias in academic hiring There has been a lot of discussion in the education and employment fields over the past few years regarding the disproportionate number of males in STEM (Science, Technology, Engineering and Math) positions in many countries around the world. Some have suggested that the imbalance is a problem that needs to be addressed because it limits opportunities for women. Some have also suggested that the imbalance occurs because of male based biases in hiring practices. In this new effort, the research pair sought to discover whether this holds true for educational institutions.In France, those seeking teaching positions from grade school through college must take competitive exams—the exams have two parts, written and oral. The researchers obtained exam results from 10,000 applicants covering 11 different fields—some STEM, and some not STEM. For the study, the written parts of exams were graded with names hidden to prevent gender identification. Gender identification with oral grading was, of course, identifiable by graders. The implication was that the proportional numbers of people of a given gender passing the exams would be an accurate measure of the proportion of people of a given gender that would land a job as a teacher in their chosen field.Analyzing their data, the researchers were surprised to find that the gender bias that existed was actually in favor of the female students taking tests in STEM fields—they ranked it in the 10th percentile, which suggests women would have a leg up in being hired in their chosen fields. Interestingly, they also found a small gender bias for males taking exams in traditionally female-dominated fields.The researchers conclude by suggesting that their results indicate that policies aimed at encouraging young women to enter STEM fields should focus on the girls who are still too young to have made any career plans. © 2016 Phys.org Credit: CC0 Public Domain Citation: Study of accreditation exams reveals biases actually favor women in STEM positions (2016, July 29) retrieved 18 August 2019 from https://phys.org/news/2016-07-accreditation-exams-reveals-biases-favor.html Journal information: Science This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.
As Butts notes, there are many examples of people harboring beliefs that fly in the face of logic—people believing that humans sprang into existence just 10,000 years ago, for example, or groups of people adamantly insisting that inoculating infants causes autism despite mountains of evidence to the contrary. Such beliefs, the researchers say, can be based on other beliefs that prevent the acceptance of that which may seem obvious. Believing that we humans, for example, are too insignificant compared to the rest of the world to be able to cause something as impressive as global warming would make it very difficult to accept the idea regardless of the evidence. To make sense of such belief systems by groups of people, the researchers have extended prior work that led to the development of the Friedkin-Johnson model used to illustrate how individual people use information under complex circumstances to make decisions that can result in the formation of beliefs.The new model adds interpersonal influences where acceptance of one idea influences the acceptance of another—the result is a weighted network that allows for highlighting interdependent beliefs. Butts suggests that the new model and others that may follow could be used to identify the factors that prevent groups from accepting what others see as common knowledge and then to use that information as a means to allow them to see what is actually true. Citation: Model helps explore how changing certainty in belief of one statement can lead to changings belief in truth of others (2016, October 21) retrieved 18 August 2019 from https://phys.org/news/2016-10-explore-certainty-belief-statement-truth.html Journal information: Science A small team of researchers with members from the U.S., the Netherlands, Russia and Italy has developed a new model that illuminates how changing the degree of certainty a person holds for a given belief can lead to changes in beliefs about other things that a person believes to be true. In their paper published in the journal Science, the team outlines their model and offers some possible ways it might be used. Carter Butts with the University of California offers a Perspective piece on the model developed by the team and suggests that it could be used to model attitudes as well as beliefs in empirical propositions. Credit: Francisco Farias Jr/public domain This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. Explore further Believing in free will makes you feel more like your true self More information: “Why I know but don’t believe,” Science 21 Oct 2016: Vol. 354, Issue 6310, pp. 286-287. DOI: 10.1126/science.aaj1817 N. E. Friedkin et al. Network science on belief system dynamics under logic constraints, Science (2016). DOI: 10.1126/science.aag2624 © 2016 Phys.org
© 2018 Phys.org Journal information: Nature Credit: CC0 Public Domain Explore further More information: Shan Li et al. Modulating plant growth–metabolism coordination for sustainable agriculture, Nature (2018). DOI: 10.1038/s41586-018-0415-5AbstractEnhancing global food security by increasing the productivity of green revolution varieties of cereals risks increasing the collateral environmental damage produced by inorganic nitrogen fertilizers. Improvements in the efficiency of nitrogen use of crops are therefore essential; however, they require an in-depth understanding of the co-regulatory mechanisms that integrate growth, nitrogen assimilation and carbon fixation. Here we show that the balanced opposing activities and physical interactions of the rice GROWTH-REGULATING FACTOR 4 (GRF4) transcription factor and the growth inhibitor DELLA confer homeostatic co-regulation of growth and the metabolism of carbon and nitrogen. GRF4 promotes and integrates nitrogen assimilation, carbon fixation and growth, whereas DELLA inhibits these processes. As a consequence, the accumulation of DELLA that is characteristic of green revolution varieties confers not only yield-enhancing dwarfism, but also reduces the efficiency of nitrogen use. However, the nitrogen-use efficiency of green revolution varieties and grain yield are increased by tipping the GRF4–DELLA balance towards increased GRF4 abundance. Modulation of plant growth and metabolic co-regulation thus enables novel breeding strategies for future sustainable food security and a new green revolution. The green revolution was characterized by big increases in crop production in developing countries—it came about due to the increased use of pesticides, fertilizers and changes in crop varieties used. One of the changes to the crops came about as rice and wheat plants were bred to grow less tall to prevent damage from wind and rain. While this resulted in improved yields, it also resulted in the use of more nitrogen-based fertilizers, which are environmentally harmful. In this new effort, the researchers wondered if it might be possible to re-engineer green-revolution crop varieties in such a way as to restrict height and therefore retain high productivity, while also using nitrogen more efficiently.Prior research had shown that proteins in the DELLA family reduced plant growth. Crop breeding in the 1960s led to varieties of rice and wheat with genetic mutations that allowed the proteins to build up in the plants, thus stunting their growth. Unfortunately, DELLA proteins have also been found to be the cause of inefficient nitrogen use in the same plants—as a result, farmers used more of it to increase yields. To overcome this problem, the researchers crossbred varieties of rice to learn more, and found that the transcription factor OsGRF4 was associated with nitrogen uptake. Using that information, they engineered some varieties of rice to express OsGRF4 at higher levels, which, when tested, showed higher uptake of nitrogen. The team then planted the varieties they had engineered and found that they required less nitrogen to produce the same yields—and they were just as stunted. They therefore claim that it is possible to grow green-revolution crops that require less nitrogen. A team of researchers from the Chinese Academy of Sciences, the Academy of Agriculture and Forestry Sciences in China and the University of Oxford in the U.K. has found a way to grow green revolution crops using less nitrogen with no reduction in yield. In their paper published in the journal Nature, the group describes their research efforts and the results they found when planting newly developed plant varieties. Fanmiao Wang and Makoto Matsuoka with Nagoya University offer a News & Views piece on the work done by the team in the same journal issue. Matchmaking for sweet potato? It’s complicated Citation: A way to get green revolution crops to be productive without needing so much nitrogen (2018, August 16) retrieved 18 August 2019 from https://phys.org/news/2018-08-green-revolution-crops-productive-nitrogen.html This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.
Trivedi will be performing at the Closeup First Move Party in New Delhi on August 19 at Jawaharlal Nehru Stadium.“I love performing live because when you are doing it, you see the crowd in front of you, singing the song with you in tandem. When the whole crowd goes crazy behind what you’re doing, that feeling is unmatchable. “It’s
Kolkata: State Power minister Sobhandeb Chattopadhyay on Saturday held a meeting with various stakeholders to ensure uninterrupted power supply during the Durga Puja. Top officials from various power production and distribution agencies like Coal India, CESC, IPCL and DVC attended the meeting.”All of them have assured us that there would be no interruption of power supply during the festive days. It is projected that the demand would go up to 8,850 megawatt (MW) on the day of Shashthi which will probably be the highest. The demand will be on the higher side from the day of Tritiya till Ekadashi. All necessary steps will be taken for smooth power distribution,” Chattopadhyay assured. Also Read – Rain batters Kolkata, cripples normal lifeHe further said that assuming that the requirement may go up further by 700 MW, the department is keeping a reserve of it to meet the demand.It has been decided that out of 8,850 MW, West Bengal Power Development Corporation Limited (WBPDCL) and West Bengal State Electricity Distribution Company (WBSEDCL) will supply 6660 MW, Calcutta Electric Supply Corporation (CESC) will provide 1,860 MW, India Power Corporation Limited (IPCL) 70 MW and Durgapur Projects Limited (DPL) will ensure 260 MW.Officials from Coal India and the Railways who attended the meeting also assured of coal supply for the power units.Referring to queries about power cuts in certain areas of the state, the minister said maintenance work is going on in different parts of the state resulting in short spell power cuts in certain areas. He also assured that the problem will soon be sorted out.
Among most famous epics in Indian mythology, Mahabharat has always caught people’s attention like no other.The mythological story revolves around brothers who fight with each other for the throne, fame, and ideological values; the epic addresses innumerable philosophical battles a human being fights, often with themselves, as they try to understand their purpose in life. Perhaps, this is why when the Mahabharat came on television in India for the first time, people couldn’t help but keep watching it. Puneet Issar, who played Duryodhan, the oldest Kaurava in the 1988 television series, has now written and directed a play about the epic tale from Duryodhan and Karna’s perspective. Also Read – Add new books to your shelfWhile the story is generally told from the Pandavas perspective, who are perceived as the protagonists of the tale, Issar this time has decided to dwell on the moral and philosophical experience of Duryodhan and Karna as they waged their war against the Pandavas. Issar said, “History is always written by the victor. But they (Kauravas) were vanquished and they too have their side of the story.” The actor/director said that his play is about understanding the psychology of the character. “Duryodhan was not the villain in the story. He was the anti-hero for sure, but if you look at Mahabharat as a classical tragedy, Duryodhan was the protagonist from his perspective.” Adding that the beauty of Mahabharat lies in the fact that the story always played around with grey areas, Issar said, “Maybe he (Duryodhan) was more black than white, rather dark grey; but he too had shades of positive light.” Also Read – Over 2 hours screen time daily will make your kids impulsiveThe play focuses on softer moments of the eldest Kaurava brother, such as his love for his parents; his devotion towards Karna as a friend, which broke an important barrier of inter-caste friendship in that era. “I always felt all the unknown aspects of his life – the human side of Duryodhana, like his immortal bond of friendship with Karan should be portrayed and shown to the audience,” Issar said. Interestingly, Issar has directed his son Siddhant as a 16-year-old Duryodhan, showcasing the legendary warrior in the early stages of his life; while he, himself will be stepping into the shoes of a mature, older Duryodhan, once again, this time on stage. “It was very challenging. People have very high expectations from the character. Stepping into my shoes is not easy. But the way Siddhant has prepared and worked on the character is incredible. He is outstanding as young Duryodhan – what I did 30 years ago. He has surpassed me by miles,” Issar said. He added that Siddhant, through his scenes, tries to depict inner psychology of Duryodhan – the thought process, emotions, vices, views and situations that transformed him into the ‘super-villain’ that he was. However, Issar remains mindful of not glorifying some of the horrible things that Duryodhan so easily condones. He said that the play does not even try to justify these things. “We will address the good and the bad. We are just trying to bring out their perspective,” he said. The play, which will stage at the Kamani Auditorium in the Capital on July 27 and 28, is being promoted by India’s leading entertainment destination BookMyShow.
When you’re looking for a real-life model for Jesus Christ, you’d be hard pushed to think of a less appropriate stand-in for the Prince of Peace than Cesare Borgia. One of the most notorious members of Renaissance Italy’s most notorious dynasties, the cruel Cesare was thought to be the inspiration for Niccolo Machiavelli’s satirical handbook for would-be tyrants, The Prince.Jesus in artThanks to his father – who became Pope Alexander VI in 1471 – Cesare was made a bishop at the age of 15 and a cardinal at the age of 18. At this point in history the Pope directly ruled over a kingdom that dominated central Italy from its capital of Rome.Cesare BorgiaThough a rising star in the church, Cesare fancied himself a military man. There was one problem though, his father had chosen that career for his older brother, Giovanni. Pope Alexander had appointed his pride and joy Captain General of the Church — the supreme commander of the Papal States’ armed forces.Sacred Heart JesusCoincidentally, in 1497, Captain General Giovanni Borgia was found floating lifelessly in the River Tiber. Cesare left the church, inheriting his brother’s role, titles and wealth, plus the title Duke of Valentinois as a gift from the Pope’s staunch ally King Louis XII of France.Giovanni BorgiaThe family weren’t exactly short of enemies in Italy, but some suspect Cesare was behind his brother’s end, perhaps even drawing the blade himself. Further Borgia family drama comes from the fact that both Cesare and Giovanni shared a mistress — Sancha of Aragon, the wife of a third brother, Gioffre Borgia. A notorious womanizer, Cesare fathered 11 known illegitimate children.Profile portrait of Cesare Borgia in the Palazzo Venezia in Rome, c. 1500–10As papal warlord, Cesare rampaged across the neighboring Italian states, while at home anyone who stood in his way, including family and friends, was done away with. When his army rebelled against him, Cesare played peacemaker. He agreed to an amnesty and then in bad faith ordered all the ringleaders to be “taken care of”.A Glass of Wine with Caesar Borgia (1893) by John Collier. From left: Cesare Borgia, Lucrezia Borgia, Pope Alexander VI, and a young man holding an empty glass.This very strange idea that one of the modern images of Jesus is based on Cesare originally comes from a claim made by the renowned novelist Alexandre Dumas and picked up and expanded upon by biblical theorists. The argument goes that Jesus was originally depicted as appearing non-European because he was Jewish, which did not sit well with the Borgia pope at the time. So in order to create a more “European-looking” Jesus Pope Alexander VI commissioned new paintings of Jesus using his illegitimate son Cesare as their model.He then allegedly “ordered the destruction of all art depicting a Semitic Jesus,” thereby popularizing one of the main enduring images of Jesus we have today. So the theory goes.It’s certainly true that images of Cesare Borgia from the period are uncannily similar to the images of Christ painted around the same time. Cesare even gazes serenely off canvas in his most famous depiction.His friendship with Leonardo da Vinci may have also helped popularize a particular depiction of Jesus that echoed Cesare’s appearance. (Inevitably, given Cesare’s reputation, they were also rumoured to have been lovers).Salvator Mundi by Leonardo da Vinci, c.1500.A similar theory which has long been floating around posits that Jesus, as a Jewish man, was previously depicted as a Middle Eastern figure until the outbreak of the Crusades made it politically unpalatable to have him resemble the “enemy.”One problem with this is is the timeline doesn’t make sense. The Crusades in the Middle East took place between 1096 and 1291, whereas Cesare lived between 1475 and 1507.The first headquarters of the Knights Templar, on the Temple Mount in Jerusalem. The Crusaders called it the Temple of Solomon. Photo by Andrew Shiva CC BY-SA 4.0Another problem is that it ignores the evidence. Jesus began to appear as a figure with a beard and long hair in the 5th century, and his skin tones varied across this period, largely to reflect whichever culture had created the image.Jesus cleansing a leper, medieval mosaic from the Monreale CathedralBut if you want to compare a painting of Cesare Borgia to a painting of Jesus Christ, look at the icon of Christ Pantocrator at St Catherine’s Monastery in Sinai.Like Cesare, Christ Pantocrator has long brown hair, a brown beard, and a noble face with defined features, a strong jawline and cheekbones. It looks every inch like the “generic” depiction of Jesus doesn’t it?Christ Pantocrator was painted on a wooden board in the 6th century, 800 years before Cesare was born.Read another story from us: 3 Men who Believed they were Jesus were Forced to Live Together – It Ended BadlyThe theories are interesting to study, but, as many Biblical theories and hypothesis about the true image of Christ, they are short on concrete evidence.
Here’s a first look:What it is: BlackBerry Management Center lets you manage your business’s BlackBerry devices from anywhere using an online Web application. You can manage a number of things through the service like setting up email, contacts and calendars for each of your company phones. If a phone gets lost, you can lock it and display a message telling whoever finds the phone how it can be returned. Worst case scenario: you can use BlackBerry Management Center to wipe the data from a lost or stolen phone, including its microSD card. You can also restore the settings and content from a lost or broken phone onto a new phone.What you might like: Managing user phones from the Web application is as easy as promised, although you’re going to have to do some legwork to sync company devices with your BlackBerry Management Center account. The hard part mostly boils down to retrieving several ID numbers attached to your various BlackBerry devices as well as making sure apps like BlackBerry Protect and email are properly configured on each device. Once that’s done, using the service is pretty much a matter of navigating a few simple menus that display your options for each smartphone.Another useful feature: Employees who use their personal Blackberry devices in your business can add them to the service. In that case, users can determine how much control BlackBerry Management Center has over their device.What you might not like: The mobile work crowd is diverse. And if they’re not all using BlackBerrys, they’re not all controlled by this product. Which absolutely limits how much order the Management Center will bring to the mobile chaos in your shop.What to do: If your shop has a bring-your-own-gadget-to-work culture, Management Center is not for you. It simply does not support a broad enough array of devices to make it worth the hassle. But if your business has even a couple of BlackBerry devices in the mix, this service could provide some peace of mind.How do you keep track of your company’s smartphones? Let us know in the comments section. min read August 22, 2011 Attend this free webinar and learn how you can maximize efficiency while getting the most critical things done right. Register Now » Free Webinar | Sept 5: Tips and Tools for Making Progress Toward Important Goals If smartphones are a small-business boon, they’re also a potential liability.Not only do businesses who offer them to employees have to keep track of who is using what device, they’re also loaded with information you don’t want “just anyone” to have access to. (If you’ve ever had to replace a lost or stolen company smartphone, you know what a hassle it can be.)The Waterloo, Ont.-based smartphone giant Research in Motion recently debuted its new BlackBerry Management Center — basically a do-it-yourself tool for managing three to 100 BlackBerry devices. It’s free, which makes it an appealing choice for companies that can’t afford expensive IT services to handle their growing arsenal of smartphones.It’s also one more reason RIM hopes businesses will continue to use its products. Google’s recent blockbuster buy-out of Motorola Mobility means these business oriented technologies are more important to the struggling smartphone maker than ever before. Opinions expressed by Entrepreneur contributors are their own.
This story appears in the October 2015 issue of Entrepreneur. Subscribe » Fleet managementWhether you run your own business or commute to someone else’s, you are highly dependent on your vehicle. Automatic, a free app combined with a $100 wireless adapter, can help optimize this costly and essential part of your operation. The Automatic adapter plugs into a vehicle’s onboard computer via its ODB-II diagnostics port and connects to an iOS or Android smartphone via Bluetooth. With built-in GPS, the device keeps track of where your vehicle goes or — perhaps even more useful — where it’s parked. An accelerometer detects impacts, helping Automatic monitor for accidents and alerting the company to call for help on your behalf. The device pulls together a treasure trove of data on your vehicle and driving activity. Every trip gets a tally for miles, minutes, miles per gallon and fuel cost. You can tap on each listing for more information, including a map overlay showing where you went. On an everyday basis, having this kind of intelligence makes for smarter trip planning and driving. For example, it will tell you how many miles you can travel before you run out of gas. The Automatic output is clever and not distracting; the adapter chirps out brief tones to relay feedback on your driving– there’s one sound for lead-footed accelerations and another for jamming on the brakes. All of this is window dressing to Automatic’s future. The company has opened up its API to software developers to increase the device’s utility. The Your Mechanic app ties into your vehicle’s diagnostics software and will hail a mobile mechanic who will come to your home or office to perform fixes and maintenance services. Expense and accounting apps Concur, Expensify and FreshBooks sync with your vehicle to automatically track mileage and flow the data into your expense reports and tax documents. And Automatic Fleet (now in invite-only beta) will give business owners the opportunity to manage multiple drivers through their real-time GPS locations and ETA at customers’ locations, based on route and traffic data. While not yet as powerful as the dedicated enterprise telematics and fleet-management systems offered by Verizon, Ram or Ford, Automatic can let a small business enter the fleet-management game at a fraction of the cost. October 12, 2015 This hands-on workshop will give you the tools to authentically connect with an increasingly skeptical online audience. Free Workshop | August 28: Get Better Engagement and Build Trust With Customers Now 2 min read Enroll Now for Free
2 min read RIP Lily: Makers of the “world’s first throw-and-shoot camera” are closing their business and refunding customers who pre-ordered one.Unable to secure financing to manufacture and ship its drone, the startup today announced plans to “wind down the company.””We have been delighted by the steady advancements in the quality of our product and have received great feedback from our beta program,” founders Antoine Balaresque and Henry Bradlow wrote in a blog post. “At the same time, we have been racing against a clock of ever-diminishing funds.”Bradlow and Balaresque built their first prototype in September 2013 in the basement of a U.C. Berkeley robotics lab, but Lily didn’t make her debut until May 2015.Users simply place a tracking device in a pocket or the waterproof wrist case, throw Lily in the air, and watch as she flies herself, using GPS and computer vision to follow you while shooting video and stills. A lithium-ion battery promised 20 minutes of flight time on a two-hour charge; the drone also has an IP67 waterproof rating.Early-bird buyers pre-ordered the Lily Camera for $899 — $100 off the expected U.S. retail price. As of January 2016, the firm had collected $34 million in pre-sales.”Our community was the drive that kept us going even as circumstances became more and more difficult,” the blog said. “Your encouraging words through our forums and in your emails gave us hope and the energy we needed to keep fighting.”Now, the company is focused on handling refunds, which will happen over the next 60 days.”After so much hard work, we are sad to see this adventure come to an end,” Balaresque and Bradlow wrote. “We are very sorry and disappointed that we will not be able to deliver your flying camera, and are incredibly grateful for your support as a pre-order customer.””Thank you for believing in our vision and giving us the opportunity to get this far,” they added. “We hope our contribution will help pave the way for the exciting future of our industry.” This story originally appeared on PCMag This hands-on workshop will give you the tools to authentically connect with an increasingly skeptical online audience. January 12, 2017 Enroll Now for Free Free Workshop | August 28: Get Better Engagement and Build Trust With Customers Now
This story originally appeared on PCMag Enroll Now for Free This hands-on workshop will give you the tools to authentically connect with an increasingly skeptical online audience. I was at an event recently that screened a 1956 short film — Key to the Future — in which GM envisions what self-driving cars would look like in 1976. The footage — with a uniformed guy in a control tower directing a singing family along a highway for autonomous vehicles — inspired chuckles from the audience.One aspect of the video that did become a reality is the interstate highway system, a major milestone in vehicle transportation that better connected rural communities and big cities and cut travel time. But they also displaced entire urban neighborhoods when they were constructed and divided others once the work was complete. They enabled mass migration to suburbs for the more affluent, who could now easily commute by car into cities for work. But this sapped the tax base of large cities, setting up prolonged urban decay during the 60s and 70s. Sixty years since the GM film, we’re now are on the cusp of another major transformation in transportation with self-driving cars, and some are concerned they will have similarly negative unintended consequences.Freed from the Drudgery of DrivingExperts think we’ll first see fully autonomous cars in urban areas, with city dwellers and commuters alike buzzing around in autonomous pods, freed from the drudgery of driving.Ford, for example, has promised to mass produce fully self-driving cars for ride-sharing purposes by 2021. Uber is already testing autonomous vehicles, while the self-driving tech start-up Nutonomy currently offers robo-taxis rides in Singapore.Urban designer Peter Calthorpe, one of the top minds who spoke at the TED conference earlier this week, has a more pessimistic view of autonomous vehicles and how they could affect cities. While autonomous vehicles offer myriad benefits, such as increased mobility for the disabled and others, Calthorpe is concerned about further isolating people already detached by compulsive interaction with portable devices.”Putting people in their private bubbles, whether they have a steering wheel or not, is the wrong direction,” Calthorpe told TED head curator Chris Anderson following his talk. He worries about people using self-driving cars as solitary electronic chauffeurs or butlers that run errands and don’t require their owners to ever leave the home.Calthorpe’s other concern is that autonomous vehicle “will revitalize sprawl” as society becomes more urbanized. Others are also questioning whether self-driving cars could lead to longer commutes if people can be productive while in the car, making traffic worse in urban areas.Hesham Rakha, an engineering professor at Virginia Tech who studies traffic flow, told NPR in February that it’s difficult to predict whether self-driving cars will improve traffic congestion. “I don’t know the answer,” he admitted. “If the road is less congested, more people are going to be attracted to that road, and so basically it will become congested because it’s supply and demand.”And all those utopian visions of driverless cars making traffic and accidents a thing of the past could look just like as silly as GM’s Key to the Future film from 60 years ago. Free Workshop | August 28: Get Better Engagement and Build Trust With Customers Now May 1, 2017 3 min read
by Taboolaby TaboolaSponsored LinksSponsored LinksPromoted LinksPromoted LinksYou May LikeKelley Blue BookYou Won’t Believe How Affordable These Ford Car Models AreKelley Blue BookUndoGrepolis – Free Online GameGamers Around the World Have Been Waiting for this GameGrepolis – Free Online GameUndoTODAYPolice Identify Girl Licking Ice Cream Tub In Viral VideoTODAYUndoForbesAmerica’s Richest Self-Made WomenForbesUndoVerizon WirelessThis new phone will blow your mind.Verizon WirelessUndoMy Food and FamilyHealthy, Homemade Drunken Thai Noodles In Just 20 MinutesMy Food and FamilyUndoAdvertisement If you follow gaming hardware company Corsair, you may have seen an extremely entertaining video on what Google Chrome does to your computer’s RAM. I had a good laugh along with everyone else — and then, a few days later, I noticed Chrome going to town on my RAM while I was trying to have a videoconference for work. Was it time to go back to Firefox? Could Microsoft’s exhortations to use Edge actually have some merit? Before I deleted Chrome in a fit of pique, I figured I should at least investigate the alternatives first.I ran a few casual tests to see just how hungry each Internet browser was for RAM, and the data bore out a surprising conclusion. While Chrome is, indeed, a resource hog, the other two major browsers are even worse. If you want to preserve some RAM for other applications, there are more effective ways than consigning Chrome to the Recycle Bin.Why does Chrome use so much RAM?Before we dive into the testing, it’s important to understand a few things about RAM, and why Chrome uses so much of it. First off, to hash out a very basic point, RAM stands for random-access memory. It’s a form of data storage that programs use in real-time.MacBook Air vs MacBook Pro: Which 13-inch MacBook Is Right For You?Apple’s entry-level MacBook Air and Pro look pretty similar, but our testing proved they differ in crucial ways.Your Recommended PlaylistVolume 0%Press shift question mark to access a list of keyboard shortcutsKeyboard Shortcutsplay/pauseincrease volumedecrease volumeseek forwardsseek backwardstoggle captionstoggle fullscreenmute/unmuteseek to %SPACE↑↓→←cfm0-9接下来播放Which Cheap Tablet Is Best? Amazon Fire 7 vs Walmart Onn02:45关闭选项Automated Captions – en-USAutomated Captions – en-USAutomated Captions – en-US facebook twitter 发邮件 reddit 链接https://www.laptopmag.com/articles/google-chrome-resource-hog?jwsource=cl已复制直播00:0003:4603:46 To oversimplify things a bit, just as you store files on your hard drive permanently, programs store data in RAM temporarily. The more RAM you have, the more programs you can run simultaneously. Likewise, very complex programs (like video games) require a lot of RAM to run by themselves. If you run out of RAM, your computer will start juggling applications and apportioning RAM based on (perceived) priority.As you can imagine, an Internet browser like Chrome can eat up a ton of RAM, depending on what you’re doing. Reading a static document probably won’t take up much memory, but editing a Google Document, watching a movie on Netflix, playing a browser game or streaming music can demand quite a lot of your computer’s attention.MORE: How to Remove Extensions from ChromeIf you’re using Chrome as a multimedia powerhouse, it’s going to use up a lot of RAM. There’s no way around that. However, the browser can take up a lot of memory, even if you’re just checking e-mail or browsing through search results. This has less to do with Chrome itself and more with what you have installed on it.Remember, Chrome isn’t just one entity: it’s a collection of tabs and extensions, and each one takes up a different amount of RAM. To determine exactly where your RAM is going, you can open up task manager on Windows (Ctrl + Alt + Del) or utility monitor on Mac (search “utility monitor” in the Finder). You should be able to drop down Chrome into multiple processes, then determine which process is tied to which extension or tab. It’s a bit tedious, but at least you’ll know where all of your memory is going.If you find that one extension is eating up an inordinate amount of RAM, you can disable or delete it in Chrome’s Extensions menu (Settings, More Tools). You can also keep an eye on which tabs are RAM-intensive, but remember: If something like Netflix is taking up a lot of memory, that’s just the program working as intended.Putting Chrome, Firefox and Edge to the TestIt wasn’t until I ran a few tests that I realized that Chrome — as bloated and resource-intensive as it is — may actually be the best option of the three.My experiment was as follows: I loaded fresh installations of Chrome, Firefox and Edge on my computer, then loaded up ten tabs that I might run in an everyday situation. (It’s not likely that I’d have all ten of them open at once, but I’m also not perfect about closing my tabs when they’re not in use, and neither is the average user.) These tabs included Google Drive, Netflix, YouTube, Amazon and the Tom’s Guide homepage. Some were very demanding; others were lightweight.RAM usage is also dynamic, so it changes as you use websites. But even once I let all the pages settle, the results were clear: Chrome was less than half as demanding as its Mozilla and Microsoft counterparts. My 10 tabs took up 725 MB of RAM on Chrome, while they demanded 2.6 GB on Firefox and 3.1 GB on Edge.Matters didn’t change much when I increased the stress on the browsers. At the recommendation of my editor, I added 10 more tabs to the test, including demanding sites like Spotify, Shutterstock, Dropbox and Rotten Tomatoes. Chrome still consumed the last RAM, hovering around 1.2 GB. Strangely, Firefox acquitted itself better in this round, consuming only 1.5 GB of memory. (If I had to guess, I would assume this is due to better optimization; Firefox can the data in certain tabs and deprioritize others.) Edge came in a distant third place: 2.0 GB after the Universal Windows Platform memory limiter kicked in, but about 4.2 GB before that happened.I should stress at this point that my test wasn’t highly scientific; it was just an everyday usage scenario, and this could vary tremendously depending on your computer’s makeup and your online habits. It could also change a lot depending on what kind of plugins you install on each browser. But, at least the way I use the Internet, Chrome is the least greedy of the three major Web browsers. And believe me, considering how much memory Chrome can eat up, that conclusion doesn’t exactly fill me with joy.Bottom LineAt least anecdotally, Chrome uses a lot of RAM, and the other two use even more. But savvy computer users may point out that this isn’t really a bad thing — at least depending on how much RAM you have. RAM isn’t like hard drive space; there’s no real reason to conserve it. RAM prioritizes and resets every time you open a new program. Unused RAM isn’t doing anything useful; in theory, the most efficient computer is one that uses every available byte of memory.The trouble, of course, is that humans don’t really think about how much memory a given process will consume, and a computer can only prioritize as well as it’s programmed. Leaving some RAM open may not be efficient, but it’s prudent. You never know how demanding that next website you open will be, or whether you’ll need to open up a Word processor to take a few notes, or if you’ll suddenly have to jump onto a video call. Having some RAM at your disposal makes computing easier and more efficient.In the end, if you want to save RAM, switching away from Chrome isn’t the way to go. Disabling extensions you don’t use, closing tabs when you’re done and limiting access to demanding sites (at least when you need the memory for other things) will serve you much better.Credit: Google; ShutterstockHow to Enable Do Not Track in ChromeHow to Use Chrome Extensions in Incognito ModeHow to Use Chrome Browser
Mozilla launches Firefox Containers TestPilot experiment by Martin Brinkmann on March 05, 2017 in Firefox – Last Update: December 15, 2018 – 14 commentsMozilla launched a new TestPilot project for the Firefox web browser yesterday that brings Containers to all versions of the web browser.We talked about the web browser’s Containers functionality before in our first look of the feature back in mid 2016. Containers look a lot like Firefox profiles on first glance, but they are different in several characteristics.Update: Mozilla released the Multi-Account Container add-on for Firefox that replicates the functionality.One of the main differences is that containers run under the same profile. While they do separate certain kinds of data when used, other data is not separated like it is the case if you are using profiles in the Firefox web browser.Basically, many of the bits of data that get transferred or created when you connect to websites are separated, while features such as extensions, bookmarks, or browser preferences are not.This makes Containers less powerful than profiles, but still useful for certain use cases. You can use the to sign in to the same web service multiple times, separate browsing activities by using different containers for activities like shopping, social media, research, or entertainment.The latter can be quite useful to limit tracking or ad retargeting among other things. You can sign in to Gmail for instance, and use Google Search in another container to avoid that the account is linked to the searches.Firefox Containers TestPilot experimentThe newly launched Containers experiment of the TestPilot project brings the feature to all versions of Firefox. You do need to install the TestPilot extension first, and then the Containers experiment to make use of the feature.If you move the mouse cursor over the plus icon in the tab bar, you will notice the new container options that you can launch from there in new tabs. Simply move the mouse over the plus, and select one of the available containers that you want to launch.You find the color of the container under the tab as an indicator that the tab has been opened in a particular container. All containers use icons and colors to help you distinguish between them.Since containers separate most site data, you will notice that you are not signed in to any account because of that for instance.The functionality of the experiment is somewhat limited right now. You can edit the four default containers — personal, work, finance and shopping — and create your own custom containers as well.A click on the container icon in the main Firefox toolbar lists all containers. You can click on any to open a tab in the selected container. The menu indicates as well if sites are currently opened in selected containers. A click on the arrow icon next to a container opens a list of all sites of that container.From there, you may move the tabs to a new window, or hide the container. Hiding hides all tabs of the selected container until you return to the menu later on to reveal the container again in the browser.The order in which container tabs are displayed in Firefox may be change with a click on the sort button. This moves tabs of any container next to each other in the browser’s tab bar.Closing WordsMozilla launched the Containers TestPilot experiment to gather data on usage. The data will certainly play a role when it comes to making a decision on the future of the feature. Will it land in Firefox?I would like to see more functionality added to it prior to that, like the ability to restrict sites to containers, shortcuts to open them quickly, or control over a containers set of saved data.Now You: What’s your take on Containers in Firefox? SummaryArticle NameMozilla launches Firefox Containers TestPilot experimentDescriptionMozilla launched a new TestPilot project for the Firefox web browser yesterday that brings Containers to all versions of the web browser.Author Martin BrinkmannPublisher Ghacks Technology NewsLogo Advertisement
(Credit: Fraunhofer Institute for High-Speed Dynamics)What happens when you’re hit by something going 15,000 miles per hour? Total obliteration, more or less.That’s a very real scenario that spacecraft engineers must keep in mind every time they put something in space. Collisions with objects in orbit are rare, but they do happen. In the past, paint chips have left craters in the space shuttle and a French satellite was disabled in 1996 after its gravity-gradient boom was severed by a chunk from an exploded rocket.Shields Up!To protect expensive spacecraft, shields are in order. And not just any hunk of metal will do. Objects in space are moving fast — craft in low-Earth orbit whizz by at around 17,000 miles per hour — and we can’t make a single shield thick enough to protect against that kind of speed. So, engineers have turned to something called a Whipple shield, named for its creator, Fred Whipple. Instead of a single layer of material, a Whipple shield relies on several, each separated by empty space.The outermost layer is designed to break apart when hit, shattering the projectile at the same time. The resulting cloud spreads out the force of the impact across a greater surface area, decreasing the force at any one point and increasing the chances that the inner layer will hold. Many spacecraft today, the International Space Station included, utilize Whipple shields.You can see a Whipple shield in action in the video from the European Space Agency. It shows a 2.8 millimeter aluminum bullet shot from a gas gun impacting the shield. The bullet is traveling around 15,000 miles per hour, but it doesn’t manage to penetrate the thin secondary shield. The reason is clear — upon impact with the first layer the bullet gets totally vaporized, robbing most of its destructive power. The shield is a fiber metal laminate, or thin layers of metal held together by a composite.Updated versions of Whipple shields use fillings of Kevlar or Nextel ceramic fibers between layers to add even more protective power. And as an added benefit, the shields are far lighter than conventional armor would be, though they do make the spacecraft a bit bigger.The one downside, of course, is that Whipple shields are pretty much a single-use product. Once the first layer has been breached, the shield won’t work anymore. But, because impacts in orbit are still so rare, the chances of being hit twice in the same place are exceedingly low. And, for now, that’s enough.
Researchers at the University at Buffalo have found that 3D printers have fingerprints, essentially slight differences in design that can be used to identify prints. This means investigators can examine the layers of a 3D printed object and pinpoint exactly which machine produced the parts.“3D printing has many wonderful uses, but it’s also a counterfeiter’s dream. Even more concerning, it has the potential to make firearms more readily available to people who are not allowed to possess them,” said Wenyao Xu, lead author of the study.The researchers found that tiny wrinkles in each layer of plastic can be used to identify a “printer’s model type, filament, nozzle size and other factors cause slight imperfections in the patterns.” They call their technology PrinTracker.“Like a fingerprint to a person, these patterns are unique and repeatable. As a result, they can be traced back to the 3D printer,” wrote the researchers.This process works primarily with FDM printers like the Makerbot which use long spools of filament to deposit layers of plastic onto a build plate. Because the printers used in 3D printed guns are usually more complex and more expensive there could be less variation in the individual layers and, more importantly, the layers might be harder to discern. However, for some simpler plastic parts could exhibit variations.“3D printers are built to be the same. But there are slight variations in their hardware created during the manufacturing process that lead to unique, inevitable and unchangeable patterns in every object they print,” said Xu.
GAYSTARNEWS- A dispute over a parking lot has led a Texas art gallery owner to put up satirical gay conversion therapy signs targeting a local church. The sign in question | Photo: Video/ABC13 eTN Chatroom for Readers (join us) ‘I’m as gay as a goose,’ Butler further explain for anyone who’s unclear on where he stands. ‘It is not anti-gay. I have been a gay activist my entire adult life on the national life. It is satire.’The church respondsSenior Pastor at River Pointe, Patrick Kelley, released a statement regarding the matter.‘We are sorry to have inconvenienced Mr. Butler because we want to be the best neighbors possible,’ he said. ‘We host a Bible study across the street from Mr. Butler’s property, in our private residence, and will continue to be diligent to prevent our guests from using Mr. Butler’s four parking spaces.’H/t: ABC13More from Gay Star NewsChristians fight anti-LGBTI preacher Franklin Graham despite vile backlashThis church unfurled a new inclusive Pride flag to kick off Calgary Pride weekRead Pope Francis’ letter on sexual abuse: ‘We abandoned the little onesGot a news tip? Want to share your story? Email us . The stand-off between art gallery owner and pastor led the former, Hiram Butler to put up a sign outside his gallery reading: ‘Parking Only For Gay Conversion Therapy.’It all began with Bible study.Local Houston church River Pointe owns a house across the street from Butler’s gallery. They host Bible study there a few times a week. This leads to crowded street parking and people leaving their cars on Butler’s property.‘We would not care if they park in our parking spaces one night a week. three to five nights a week where you can’t park? It’s not acceptable,’ Butler said.‘We tried reason. We tried anger. Neither of those things worked, so we’re trying humor and see if that will reach them.’According to him, this dispute has been going on for years.There are also bumper stickers reading: ‘Follow me to the Blossom Gay Conversation Therapy Center where we pray the straight away.’Artist Robert Rosenberg said he suggested the sign as an ‘alternative solution’ to ’embarrass people and force them into behaving better’.‘It’s meant to be satire. It’s meant to ironic. Sometimes the only way to deal with those people is hitting them over the heads as hard as you can with a joke,’ he added.The sign first went up on 20 August and Butler plans to keep it there for a while. Share this:TwitterFacebookLike this:Like Loading… LGBTI-inclusive church gets political – and compassionate – after sign is vandalizedAustralia’s senate passes motion to tackle conversion therapyMichigan church slammed for ‘counselling’ sessions for LGBTQ teenage girlsRead the full article on Gaystarnews: :https://www.gaystarnews.com/article/parking-lot-dispute-church-texas-gay-conversion-signs/
Mexico City, Mexico — The senate in Mexico City has approved the request from the government of Quintana Roo to investigate and revoke the concession granted to Aguakan.During the ordinary session of the Senate a point of agreement was approved for the state government, headed by Carlos Joaquín González, along with municipal administration, to investigate and revoke the granted concession to Aguakan for not fulfilling their obligations with Quintana Roo.“There have already been investigations that indicate that Aguakan is not doing its job, is robbing people and polluting the water. It is time that Governor Carlos Joaquín, who has a majority in congress, revoke once and for all the concession. He already has the necessary tools to do it,” said Senator Villegas Canché during the hearing.The governor of the state, through the parliamentary fraction of PAN, joined the proposal of Senator Marybel Villegas Canché, who seeks to revoke the Aguakan concession.Photo: Senado de México“I’ll take the floor and I’ll work to get Aguakan to leave Quintana Roo,” Marybel Villegas said, while holding up an image that showed the ecocide generated by Aguakan, while mentioning that the revocation would not cost the state a single peso.The request for Aguakan concessions to be investigated and revoked was unanimously approved by the Environment Committee and the Senate Plenary. “We are still fighting Aguakan because our task is to defend the Quintana Roo people against robberies and excesses,” Senator Marybel said at the end of her speech to the senate.The company Aguakan was granted a 30-year concession to provide water to the region under the Borge administration.Click to share on Facebook (Opens in new window)Click to share on Twitter (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on WhatsApp (Opens in new window)
Get the biggest Daily stories by emailSubscribeSee our privacy noticeThank you for subscribingSee our privacy noticeCould not subscribe, try again laterInvalid EmailA major Cheshire road is closed this morning (Thursday July 25) due to a burst water main. The A533 Booth Lane, between Sandbach and Middlewich, is currently shut in both directions as a result of the issue. There is no word on when it will reopen at this stage – although police say United Utilities are aware of the situation. Cheshire Police first confirmed the road was shut at around 4.20am this morning – and this may have an impact on traffic during rush hour. A police spokesman said: “A533 Booth Lane, between Sandbach and Middlewich is closed in both directions due to a burst water mains. “United Utiltilies are aware and responding to deal.” Want to keep up to date with the latest traffic and travel news?Each day Stoke-on-Trent Live journalists bring you the latest news on the roads and railways across Stoke-on-Trent, North Staffordshire, South Cheshire and further afield to help keep you on the move. For the very latest updates on roads including the M6, A500, A50 and more, visit our dedicated traffic and travel news channel here. We also run a live news feed each weekday, which you can access on our website’s homepage from 7am to 9pm from Monday to Friday. And for more as-we-get-it updates on the roads across the region and beyond, join The Sentinel’s traffic and travel Facebook group here. Read MoreTop stories on StokeonTrentLive Police search for missing woman Dad slams ‘disgusting’ hospital window Punter found hiding in bushes Driver named following fatal collision Follow StokeonTrentLive Download our app – You can download our free app for iPhone and iPad from Apple’s App Store , or get the Android version from Google Play . Follow StokeonTrentLive on Facebook – Like our Facebook page to get the latest news in your feed and join in the lively discussions in the comments. Click here to give it a like! Follow us on Twitter – For breaking news and the latest stories, click here to follow SOTLive on Twitter . Follow us on Instagram – Featuring pictures past and present from across Stoke-on-Trent, North Staffordshire & South Cheshire – and if you tag us in your posts, we could repost your picture on our page! We also put the latest news in our Instagram Stories. Click here to follow StokeonTrentLive on Instagram .