Liberia Pays Tribute to UN Peacekeepers

first_imgThe Liberian Embassy at the Court of Saint James, London, has joined other UN Member States in the United Nations Association in the United Kingdom (UK) to pay tribute to hundreds of UN peacekeepers who lost their lives while discharging their duties around the world.According to a dispatch from the embassy, Liberia’s diplomatic mission was joining her counterparts in the UK to pay homage to the gallantry of UN peacekeepers who gave their lives to ensure global peace and security at a time when the world body had just lifted the arms embargo and remaining sanctions imposed by its Security Council (UNSC) during the years of Liberia’s civil upheaval.When the civil crisis ended in 2003, the UN deployed one of its largest missions in the world in Liberia. It had a 15,000-strong force with peacekeepers coming from all over the world. Following more than a decade of relative peace and stability, the UN Mission in Liberia (UNMIL) is now handing over full security to the care of the Liberian government by June 30. It has pulled out nearly all of its peacekeepers from the country. According to the UN peacekeeping fact sheet, as of April 30, its present mission strength in Liberia is now 4,704 including 3,745 uniformed personnel (troops: 2,674, military observers: 65 and police: 632); 1,159 civilian personnel, including 358 international civilians and 801 local civilians. It also has 174 UN Volunteers. It says since September 2003, it has recorded 196 fatalities.According to the Liberian Embassy dispatch, the ceremony, which was held recently in the UK, began with a parade led by Heads of Missions and military representatives of UN member countries. It was climaxed by the laying of wreaths at the Glorious Dead Monument in London, close to the venue of the first meeting of the UN General Assembly in 1946.The remembrance ceremony was organized by the United Nations Association of the UK, in commemoration of the International Day of Peacekeeping, under the United Nations flag.The interim Charge d’ Affaires at the Embassy of Liberia accredited to the Court of Saint James, Ms. Genevieve A. Kennedy, performed the wreath-laying at the Glorious Dead Monument on behalf of Liberia. Ms. Kennedy recounted the heroic contributions of UN Peacekeepers in planting the seeds of peace and democratic transformation that continues to produce useful fruits across every sphere of the Liberian society.Liberia, reputed as a post conflict success story under the stewardship of President Ellen Johnson Sirleaf, has moved to reclaim its place in the comity of nations; with a fledging democratic environment that has conducted two successful elections, extended the reach of infrastructural development, while consolidating its contribution to global peace, with a contingent of the restructured Armed Forces of Liberia posted to Mali under the United Nations flag.The Chair of the United Nations Association in the United Kingdom, David Wardrop, gave a reflective account of UN Peacekeepers and their selfless contributions toward global peace.“Let us remember those who have laid down their lives in lands far from their own in the service of peace. They came from 123 countries. 194 are mourned. They chose to serve their country. Their country chose them to serve the world, to serve us,” the dispatch quotes Mr. Wardrop as saying.The ceremony honored the dedication of 120,000 uniformed and civilian personnel serving under the United Nations Flag.It was also an ideal platform for Liberia to pay tribute to the role of UN Peacekeepers, for securing the environment for peace and democratic governance as Liberia and the United Nations coordinate the conclusion of a successful presence in the country.Share this:Click to share on Twitter (Opens in new window)Click to share on Facebook (Opens in new window)last_img read more

Read More →

Jealous lover nabbed after motorcycle accident

first_imgBerbice acid attackThe man who Police were on the hunt for following an acid-throwing incident, was arrested on Saturday morning in Linden.Divisional Commander Ian Amsterdam told Guyana Times that Police in Berbice received information that 34-year-old Alfred D’Yonge, called “Nat a boy”, was involved in a road accident while riding his motorcycle in Linden, Region 10 (Upper Demerara-Berbice) early Saturday morning.The victim, Shondell WilliamsonAccording to the Divisional Commander, Police in Linden were contacted and went to the Mackenzie Hospital where the suspect was receiving medical attention. After being treated, Police transported D’Yonge to New Amsterdam where the investigation into the acid throwing incident is ongoing.On Thursday, Shondell Williamson, 26, of Peter D’Aguiar Street, New Amsterdam, had just arrived in her yard when the man dressed in female clothing approached her and doused her with the acid. The injured woman said that although she saw her assailant, she was shocked by his appearance and could not move.The suspect; Alfred D’YongeAccording to reports, the suspect, who was thought to be in Linden, telephoned Williamson saying he wanted to speak with his children. At this point, the woman related that she was in disbelief as she saw the person on the other end of the call approaching her in a dress, carrying a bottle in one hand and a bowl in the other.As the man got close enough to Williamson, he threw the substance into her face, emptying a part of the bottle’s contents into the bowl and again doused the woman from her head.After Williamson raised an alarm, the man ran out of the yard, breaking the bottle on the gate, before jumping into a waiting car. It is believed that D’Yonge was hiding behind the two storied house, waiting to launch his attack.This newspaper was told that the couple shared an abusive relationship for several years, and it was only recently that they separated. D’Yonge and Williamson have two children together, ages three and nine. (Andrew Carmichael)last_img read more

Read More →

Cameras can do more than watch workers

first_imgQuestion: As our business has expanded to several locations, it’s gotten harder to keep an eye on things. Surveillance cameras would help for security, but I’m hearing about other uses like monitoring workers as well. Is that possible? – SECURITY SHOPPER Answer: Video security systems are increasingly popular as the technology improves and security-conscious small business owners take advantage of the benefits surveillance systems offer. Overall, sales of network video surveillance products and services are expected to grow by more than 40 percent this year. High quality digital video systems are replacing old-style VCR tapes and low-quality surveillance cameras. And motion-sensitive cameras with Web-based, high-speed point and click review make it possible to access entire days of recordings in minutes. As businesses become more aware of what digital video technology can do, its uses are spreading rapidly. For example: A small deli chain in Portland, Ore., uses a Web-based system to observe and evaluate employees. Instead of visiting each store, the manager checks on each location right on his desktop PC. A car dealership lets customers watch their cars being serviced via large screens in the waiting area with more than 40 cameras and three servers handling data storage. Managers can get a close-up view of vehicles as they enter the service bay for dent and scratch detection. That’s helped reduce claims that vehicles were damaged while at the facility. DVR systems even can be integrated with point-of-sale (POS) systems to provide a visual record of transactions, and easily can be searched for instances of voided or unusual transactions. EYESthere customers, for example, can simply double-click on a transaction to bring up the video to show what happened. Businesses of all sizes are installing DVR surveillance. They range from the car dealership with 40-plus cameras, to small retail outlets with just two or three. Installation costs average about $1,100 per camera, with additional amounts for monthly support and other services. Cameras are available to fit every business need, from armor-plated equipment to infrared (night-vision) cameras, and those with zoom capabilities. Some businesses are even using face-recognition software to either identify VIP customers, or banned patrons. Rene, the EYESthere CEO, also reports that many business customers like the technology so much, they have it installed at their homes too. These resources can help: Business.com (www.business.com) is an excellent place to find a full range of security camera and surveillance system providers. EYESthere (www.eyesthere.com) can design just about any customized solution your business needs. EZ Watch (www.ezwatchstore.com): StarDot Technologies (www.stardot-tech.com); Extreme CCTV (www.extremecctv.com); and Axis Communications (www.axis.com) are a few leading equipment and service providers. Daniel Kehrer (editor@business.com) is editor of Business.com, the top business search engine, and Work.com, a “how-to” site for small business.160Want local news?Sign up for the Localist and stay informed Something went wrong. Please try again.subscribeCongratulations! You’re all set! With 24/7 live video viewable from any Web browser or PDA, small businesses are thinking about surveillance systems not just as security, but more as a way to manage many business locations without having to be there. One firm taking advantage of the trend is EYESthere, a new franchised provider of customized digital video security solutions for business. Rick Rene, CEO, says such services not only help guard property, premises and people, but have become a new type of business tool that entrepreneurs are using to increase efficiency and help them manage more productively. Web-based solutions, for example, offer much more than security. They can be used to train employees, monitor job performance and reduce travel costs. “What surprises me the most is how often customers use our cameras when nothing security-related is happening,” says Randy Andrews, who heads product development for EYESthere. “Business owners are discovering things about their businesses that they didn’t know before, such as employee behavior, both good and bad, or efficiency issues.” Instead of outdated and clunky video tape technology, a digital video recorder (DVR) converts a security camera signal to digital format that can be archived and made available online or through a local area network (LAN). Cameras can act on motion sensors, eliminating the need to review hours of tapes. And time stamping lets you quickly view almost any event. Systems also can send an e-mail or other notification so you can go online to see what’s happening live. last_img read more

Read More →

Do you fancy starring in ‘Dancing At Lughnasa’?

first_imgA reading/casting for the Butt Drama Circle’s production of the Brian Friel classic ‘Dancing at Lughnasa’ will take place this Sunday in Ballybofey.Directed by Shaun Byrne, the adult cast will consist of five females and three males – including one narrator.The reading/casting will take place in the Balor Theatre, from 12 noon to 3 pm and all interested actors are welcome to come along. Dancing at Lughnasa is a 1990 play about the five Mundy sisters, set in August 1936 in the fictional town of Ballybeg, County Donegal. A ‘memory play’, it is loosely based on the lives of Friel’s mother and aunts who lived in Glenties.This production of this much loved play will take part in the regional heats of the All Ireland Drama Festival in early 2017.Last year, the award-winning Butt Drama Circle had one of its most successful festival runs in years, just missing out on a place in the All Ireland Drama finals in Athlone with their production of another Friel class, ‘Translations.’Do you fancy starring in ‘Dancing At Lughnasa’? was last modified: September 28th, 2016 by StephenShare this:Click to share on Facebook (Opens in new window)Click to share on Twitter (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on Reddit (Opens in new window)Click to share on Pocket (Opens in new window)Click to share on Telegram (Opens in new window)Click to share on WhatsApp (Opens in new window)Click to share on Skype (Opens in new window)Click to print (Opens in new window)last_img read more

Read More →

Mickey Joe Harte’s new single skyrockets to number one

first_imgMickey Joe Harte has claimed the number one spot on the iTunes Irish Country Charts.The Lifford singer-songwriter’s new single, ‘For The Broken Hearted’, surpassed gems by stars such as Shania Twain, Taylor Swift, and Nathan Carter.Since releasing the single two weeks ago it has been met by a fantastic reception, garnering thousands of views on YouTube and being played on national airwaves. The song was also chosen as Hot Press’ Track of the Day last week, and has featured on RTÉ’s Radio 1 Playlist.The single sees Mickey Joe leaning a little further toward the Americana Roots genre.Mickey Joe fans are in for a treat, as this is the first single to be released from his sessions with producer Dieter Kirchenbauer in Germany. A further single is planned for spring 2018, followed by a new EP. Mickey Joe loves to perform live, and we are looking forward to some Irish shows by him from spring of 2018.Mickey Joe Harte’s new single skyrockets to number one was last modified: October 8th, 2017 by Elaine McCalligShare this:Click to share on Facebook (Opens in new window)Click to share on Twitter (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on Reddit (Opens in new window)Click to share on Pocket (Opens in new window)Click to share on Telegram (Opens in new window)Click to share on WhatsApp (Opens in new window)Click to share on Skype (Opens in new window)Click to print (Opens in new window) Tags:chartItunesMickey Joe HarteMUSIClast_img read more

Read More →

Maxwell’s Equations Touch Quantum Mechanics

first_imgMIT physicists are cheering a breakthrough that celebrates the applicability of Maxwell’s theory to the nano scale.James Clerk Maxwell, a devout Christian who revolutionized physics with his theory of electromagnetism in 1865, has been vindicated again and again. One scale of phenomena, however, has been difficult to reconcile with the famous Maxwell’s Equations: the nanometer scale, where electromagnetic forces clash with quantum mechanics. Now, Massachusetts Institute of Technology (MIT) is saying, “Cheers! Maxwell’s electromagnetism extended to smaller scales.”More than one hundred and fifty years have passed since the publication of James Clerk Maxwell’s “A Dynamical Theory of the Electromagnetic Field” (1865). What would our lives be without this publication? It is difficult to imagine, as this treatise revolutionized our fundamental understanding of electric fields, magnetic fields, and light. The twenty original equations (nowadays elegantly reduced into four), their boundary conditions at interfaces, and the bulk electronic response functions … are at the root of our ability to manipulate electromagnetic fields and light….Therefore, wondering what our life would be without Maxwell’s equations means to try to envision our life without most of current science, communications and technology.Indeed, it would be difficult to overstate the impact of Maxwell’s work, which built on the experimental work of Michael Faraday (another devout Christian). It gave engineers both a theoretical understanding and practical equations to use. Those equations cover an enormous range of phenomena from atoms to galaxies. Formulated within the classical physics era, Maxwell’s theory nevertheless was ready for Einsteinian relativity without needing revision. Newton, Maxwell and Einstein are often portrayed as a triumvirate of the greated physicists in history.On large (macro) scales, bulk response functions and the classical boundary conditions are sufficient for describing the electromagnetic response of materials, but as we consider phenomena on smaller scales, nonclassical effects become important…. Why does this powerful framework break down towards nanoscales? The problem is that electronic length scales are at the heart of nonclassical phenomena, and they are not part of the classical model. Electronic length scales can be thought of as the Bohr radius or the lattice spacing in solids: small scales that are relevant for the quantum effects at hand.Now, Yang et al. found a way to connect Maxwell’s Equations to the scale of subatomic particles, where quantum phenomena tend to overwhelm the behavior of phenomena – and the equations still hold. The physicists are clearly excited about what this means.On the experimental side, the authors investigate film-coupled nanoresonators, a quintessential multiscale architecture. The experimental setup was chosen because of its nonclassical nature. Even so, recently graduated postdoc and lead author Yi Yang comments: “When we built our experiment, we were lucky enough to run into the right geometry that enabled us to observe the pronounced nonclassical features, which were actually unexpected and excited everyone. These features eventually enabled us to measure the d-parameters, which are hard to compute for some important plasmonic materials like gold (as in our case).”The new model and experiments are momentous both for fundamental science and for diverse applications. It makes a hitherto unexplored connection between electromagnetism, material science, and condensed matter physics—one that could lead to further theoretical and experimental discoveries in all related fields, including chemistry and biology.The world is poised to get better with Maxwell’s Equations still intact after 155 years, now extended to the realm of the very small. What might we see? Notice the enthusiasm:Application-wise, this work points to the possibility of engineering the optical response beyond the classical regime – an example would be to explore how to extract more power from emitters using antennas.MIT Professor Marin Soljačić is enthusiastic: “We expect this work to have substantial impact. The framework we present opens a new chapter for cutting-edge nanoplasmonics—the study of optical phenomena in the nanoscale vicinity of metal surfaces—and nanophotonics—the behavior of light on the nanometer scale—and for controlling the interaction of nanometer-scale objects with light.”It appears God gave his humble servant a peek behind the veil into the fundamental workings of nature, but a view even more magnificent than Maxwell was able to comprehend at the time.Related reading: “Has physics ever been deterministic?” – a philosophical discussion from the University of Vienna on Phys.org.Be sure to read our biographies of Maxwell and Faraday and Newton, and all the other godly scientists who believed the Bible, trusted God as Creator, and helped make our modern world.Artwork by J. Beverly Greene commissioned for this biography. All rights reserved.(Visited 389 times, 3 visits today)FacebookTwitterPinterestSave分享0last_img read more

Read More →

Helpful tips for reducing soil erosion

first_imgShare Facebook Twitter Google + LinkedIn Pinterest Soil erosion is an annual problem throughout the Eastern Corn Belt. Recent research estimates that farmland across the Corn Belt looses close to four tons of soil per acre each year due to erosion. Additionally, even under the best conditions topsoil buildup is very slow, if it occurs at all. Soil particles can be detached and moved out of a field by both wind and water. Wind can pick up small soil particles, transporting them long distances. Water moving along the ground surface can remove a thin sheet of soil, create small channels, or wash out large gullies.Soil erosion has a large number of negative effects to both crops and the environment. It is important to use various management practices to protect the soil’s surface and minimize the likelihood of erosion. Factors that contribute to erosion‪1. Rainfall — soil erosion increases as length or intensity of rainfall increases.‪2. Slope length/grade — soil erosion is worse on longer/steeper slopes because water moves faster across the soil.‪3. Vegetation/residue — growing plants and residue protect the soil from rain impact, slow down flowing water and increase infiltration of water into the soil, as well as protecting the soil from wind erosion.‪4. Soil texture/structure — courser soils (sands) with larger pores allow for faster infiltration (less erosion) of water than soils with finer textures (clays). Soil structure is the arrangement of sand, silt, and clay particles into aggregates. Good structure at the soil surface will also allow for increased infiltration, poor structure leads to more runoff and erosion. Poor structure is associated with low organic matter, equipment traffic on wet soils, and exposure of disturbed soil to adverse weather. The costs‪1. Yield Potential — soil erosion removes topsoil, which is high in organic matter and contains the nutrients essential for crop growth. Erosion generally decreases yield potential.‪2. Nutrients — nutrients needed for crop growth are located in the topsoil where fertilizers, crop residues, and manure are applied; soil erosion will decrease the nutrient content.‪3. Water holding capacity — loss of topsoil organic matter can change the overall texture of a soil and result in lower water holding capacity.‪4. Organic matter — topsoil is high in organic matter where crop residues and manure have been added to the soil. Erosion usually results in decreased organic matter.‪5. The environment — water quality in streams, lakes, etc. can be greatly negatively affected by sediment and nutrients that are brought in by soil erosion. Wind erosion can result in reduced air quality. Possible solutions‪1. Reduce tillage — tillage exposes soil to the environment and makes it more likely to be eroded by wind or water.‪2. Manage crop residue — keeping crop residues on the soil surface helps protect soil from wind, rain, and running water. Residue can protect soil from erosion when crops are not growing in a field.‪3. Grass Waterways — maintaining grass waterways in low areas where a high volume of runoff is possible will slow the speed of running water and allow for sediment to be kept in the field.‪4. Cover crops — cover crops allow protection for a field during times of the year when crops are not growing. Cover crops protect the soil from wind, rain, and running water.‪5. Row width/direction — narrower crop rows will canopy sooner and allow for better protection of the soil. Crop rows that are planted perpendicular to slopes will decrease runoff and increase infiltration vs. rows that are planted in the same direction as the slope.last_img read more

Read More →

Google Invests $4.25M in Crowdsourced Online Ad Marketplace Trada

first_imgA Web Developer’s New Best Friend is the AI Wai… chris cameron Why Tech Companies Need Simpler Terms of Servic… 8 Best WordPress Hosting Solutions on the Market Related Posts “We’re really happy to have another significant venture firm taking a position in the crowdsourcing ecosystem.”– Neil RobertsonTrada allows small businesses and large ad agencies to run search marketing campaigns across Google, Yahoo! and Bing with the help of the company’s rapidly expanding community of paid search experts. Trada now boasts over 500 total search experts, and says another 300 are on a waiting list to participate. Over 200 business and agencies currently use trada, 55 of which signed up just last month. Of those that joined in June, a full quarter came from large ad agencies.“We’re growing very quickly and we’re very happy with the uptake,” Trada founder and CEO Neil Robertson told ReadWriteWeb. “Google Ventures looked at our businesses and the assessment was that our growth was interesting to them.”New Cash, New Goals The $5.75 million C round brings Trada’s total fundraising to just under $8 million. Robertson says the company has been extremely tight budgeted thus far, spending just $2 million over the last two years. The sudden influx of cash will give the company breathing room to expand and try some new things, he says.First, the company plans to help provide improved and tailored services to both its large agency customers and its smaller business customers. Secondly, it will expand internationally to run campaigns in more countries. Currently, Trada accepts international customers and experts in the U.K., Australia and Canada, but has yet to brand out to non-English speaking countries.Lastly, as part of the company’s long-term goals, Trada is looking to extend its crowdsourced PPC ad model to other forms of online advertisements. Robertson says the company started with PPC ads because of the obvious crowdsourcing benefits to keyword campaigns. Now the company realizes that other ad styles – including display, banner, mobile and video ads – can also work on this model. The company also expects to allow for campaigns on newer ad platforms, like Facebook and Twitter in the near future.The Google Bump Google piece of the funding comes from Google Ventures, the company’s investment arm. Rich Miner, one of the original co-founders of Android, has been on boards with Robertson in the past and now manages the Google Ventures fund. Miner joins Robertson and Foundry Group’s Seth Levine as members of Trada’s board.While the connection between Google and Trada is an easy one to make, Robertson says that not preferential treatment is given to any of the search giant’s investments. As Robertson added, Google likes to make sure that “all boats rise with the tide” when it comes to its investments. The relationship will also not affect or limit the services which Trada offers to its customers, said Robertson.The fresh cash certainly puts a smile on the faces at Trada, but out of everything, Robertson is most excited for the crowdsourcing community at large.“We’re really happy to have another significant venture firm taking a position in the crowdsourcing ecosystem,” said Robertson, who heads an information group of similar companies known as the Crowdsortium. “It’s a good sign to see larger tech companies in the evolution of this industry.”Photo by Flickr user horiavalan. Back in May, we mentioned that Boulder startup Trada – a crowdsourced solution for creating keyword-based pay-per-click (PPC) ad campaigns – had introduced support for Microsoft’s Bing search engine. Today, Trada is getting a huge leg-up from Bing’s competition as Google Ventures has invested over $4 million, leading the company’s latest round of funding. Joining Google in the Series C round is Foundry Group, whose $1.5M investment mark’s the Bouler firms third investment with Trada. Tags:#Google#web Top Reasons to Go With Managed WordPress Hostinglast_img read more

Read More →

Weekly Wrap-Up: There’s a New Evening Edition, the Mac Retina Display Disagreement and Twitter’s Credibility Problem

first_imgA Web Developer’s New Best Friend is the AI Wai… Why Tech Companies Need Simpler Terms of Servic… Tags:#web#Weekly Wrap-ups Top Reasons to Go With Managed WordPress Hosting robyn tippinscenter_img A Web design firm, not a newsroom, has built a stellar Evening Edition of the top stories from across the Web. Our writers are at odds on the MacBook Pro’s Retina Display. Twitter has a credibility problem. After the jump you’ll find more of this week’s top news stories on some of the key topics that are shaping the Web – plus highlights from some of our six channels. Read on for more.These Designers Did for Fun What News Sites Can’t Do to Save Their BusinessA Web design studio built the first news site I’ve ever read from top to bottom two days in a row, and it did so as a side project. Mule Design is not in the journalism business. It builds sites to solve all manner of client communication problems. But it did in a week’s work what news organizations can’t seem to do at all: deliver their output in a form that’s comfortable and convenient for the audience. I couldn’t help myself. I had to figure out how and why. MoreYes, MacBook Pro’s Retina Display Is Brilliant, But Not For the Average UserFirst, I’d like to thank all the readers who commented on our post. Some of the criticisms made me cringe, such as being called a “link-baiting whore,” while other remarks were more insightful and worth taking seriously. But whether the comments were for or against the post, I’m humbled that so many people took the time to participate in such a lively discussion. Because of that, we want to explain our reasoning further. MoreTwitter’s Credibility ProblemWhere you read something may impact credibility as much as what you read – especially if where you read something is on Twitter, according to a new study. Published last month in Communication Quarterly, the research by Mike Schmierbach and Anne Oeldorf-Hirsch used two experiments to show that a New York Times story posted on the website was seen by respondents as more credible than when the same story was posted on the newspaper’s Twitter feed. Additionally, stories posted on Twitter were seen as less important than stories in a newspaper or linked by a blog. MoreMore Top StoriesWhat Google Lost When Marissa Mayer Left to Run YahooOn Monday, The New York Times broke the story that Marissa Mayer, employee No. 20 at Google, had suddenly resigned by phone to become the CEO of Yahoo. Yahoo’s gain is Google’s loss, as Mayer was personally responsible for some of Google’s most iconic products. Here are just some of Mayer’s accomplishments over her years at Google. More[Infographic] Survey: Consumers Are Concerned About Privacy, Tracking, AdvertisingHow much do social and mobile service providers know about you? What are they doing with your personal information? If you’re worried, you’re not alone. A Harris Interactive survey commmissioned by TRUSTe, which helps its clients manage customer privacy, shows that 60% of adults surveyed are more concerned about their online privacy now than they were a year ago. MoreFrom Inmates to Entrepreneurs: The San Quentin Startup AcceleratorPrison inmates have all day, every day, to sit around and think. It could be the world’s largest pool of untapped brain time. Chris Redlitz decided to put it to productive use. He founded the Last Mile startup accelerator program at San Quentin State Prison in California. “I’ve driven by San Quentin every day for the last 14 years, but never bothered to understand the prison system,” says Redlitz, who lives in Marin County north of San Francisco (where the prison sits on San Francisco Bay) and runs the KickLabs tech accelerator in San Francisco. MoreHow to Get Bloggers to Write About Your Startup: Insider AdviceIt’s every startup’s dream – to get the attention of the people who matter. You might think that refers to customers or clients, or even venture capitalists or angel investors. Nope. We’re talking about bloggers. Sure, investors and customers are vital to the success of a startup business, but few things can turn your tech startup into the “it” company on everyone’s lips (and tweets) as quickly as getting mentioned by a prominent blog or blogger. More5 Surprising Facts About Yahoo CEO Marissa MayerNew Yahoo CEO Marissa Mayer confirmed on Monday that she and husband Zachary Bogue are expecting a son in October. Her pregnancy makes all the more notable Mayer’s landmark appointment to the helm of a tech titan – only 19 Fortune 500 companies are headed by women, and not long ago a pregnant chief executive was unthinkable. But beyond her pregnancy, she is a multifaceted, dynamic leader who might prove to be the smartest choice for Yahoo since it fell from grace. Here are some lesser-known facts about Mayer that hold clues to her ability to save Yahoo. MoreAge Bias: Young Startup Founders Get More Investor CashBlame Mark Zuckerberg. Since he invented Facebook in the third grade (or so it seems) high-tech investors have been throwing more and more money at younger and younger whiz kids. Older entrepreneurs may not like the trend – but it shows no sign of slowing anytime soon. MoreThe New Microsoft Office: 20 Things to Like, Not Like and Worry AboutFor all the parental and media hand-wringing, sexting remains a poorly studied phenomenon. But according to new peer-reviewed research, that concern might not be unfounded. Teen texts are indeed ablaze with sexual content – but how does technology-based sexual activity intersect with actual behavior? MoreReadWriteWeb ChannelsStartAge Bias: Young Startup Founders Get More Investor Cash7 Ways to Help Startup Workers Innovate From Inmates to Entrepreneurs: The San Quentin Startup AcceleratorBizDear Marissa Mayer: Don’t Change YahooAmazon Gets Ready for Sales TaxesEnterpriseFollow ReadWriteEnterprise on Twitter.The New Microsoft Office: 20 Things to Like, Not Like and Worry AboutUtilities and Other Industries Not Ready for Big Data, Say New Oracle ReportsDon’t Believe the Doomsayers: Microsoft’s Q4 Results Are Good News CloudWhat’s Killing the Printer Business?Is a VMware/EMC Cloud Spin-Off in the Works?HackFollow ReadWriteHack on Twitter.Copyright Enforcement Irony: Hip Hopper Lord Finesse Silences YouTube Rapper Dan BullMobileFollow ReadWriteMobile on Twitter.Tablets & PCs: One Industry or Two?ReadWriteWeb CommunityYou can find ReadWriteWeb in many places on the web, a few of which are below.ReadWriteWeb on FacebookReadWriteWeb on TwitterReadWriteWeb on Google+ReadWriteWeb on LinkedInReadWriteWeb on PinterestSubscribe to the ReadWriteWeb Weekly Wrap-upWant to have this wrap-up delivered to you automagically? You can subscribe to the Weekly Wrap-Up by RSS or by email. Related Posts 8 Best WordPress Hosting Solutions on the Marketlast_img read more

Read More →

9 Main Security Challenges for the Future of the Internet Of Things (IoT)

first_imgVaibhav Shah is CEO of Techuz, proudly serving startup and enterprise clients for custom web and mobile application needs. Techuz has been developing the scalable web application & mobile app solution using Angular, Reactjs Nodejs, PHP and ReactNative. Follow the Puck Vaibhav ShahCEO Tags:##Iot #Iotinhealthcare #Internetofthings #technologytrends#IoT Security#security issues iot Related Posts Internet of Things (IoT) is one of the hottest technologies in the era of digital transformation, connecting everything to the Internet. It is the core technology behind smart homes, self-driving cars, smart utility meters, and smart cities. But there are nine main security challenges for the future of the internet of things (IoT).The number of IoT devices is rapidly increasing over the last few years. According to an analyst firm Gartner, there will be more than 26 billion connected devices around the world by 2020, up from just 6 billion in 2016.While IoT devices bring effective communication between devices, automate things, save time and cost and have numerous benefits, there is one thing still concerning the users—iot security. There have been specific incidents which have made the IoT devices challenging to trust.Several smart TVs and cash machines have been hacked, which is negatively impacting the trust of not only consumers but also enterprises. Having said that, let’s have a deep dive into the most critical security challenges for the future of the Internet of Things (IoT).1. Outdated hardware and software.Since the IoT devices are being used increasingly, the manufacturers of these devices are focusing on building new ones and not paying enough attention to security.A majority of these devices don’t get enough updates, whereas some of them never get a single one. What this means is that these products are secure at the time of purchase but becomes vulnerable to attacks when the hackers find some bugs or security issues.When these issues are not fixed by releasing regular updates for hardware and software, the devices remain vulnerable to attacks. For every little thing connected to the Internet, the regular updates are a must-have. Not having updates can lead to data breach of not only customers but also of the companies that manufacture them.2. Use of weak and default credentials.Many IoT companies are selling devices and providing consumers default credentials with them — like an admin username. Hackers need just the username and password to attack the device. When they know the username, they carry out brute-force attacks to infect the devices.The Mirai botnet attack is an example that was carried out because the devices were using default credentials. Consumers should be changing the default credentials as soon as they get the device, but most of the manufacturers don’t say anything in the instruction guides about making that change. Not making an update in the instruction guides leaves all of the devices open to attack.3. Malware and ransomware.The rapid rise in the development of IoT products will make cyberattack permutations unpredictable. Cybercriminals have become advanced today — and they lock out the consumers from using their own device.For example, an IoT-enabled camera that captures confidential information from home or the work office — and the system is hacked. The attackers will encrypt the webcam system and not allow consumers to access any information. Since the system contains personal data, they can ask consumers to pay a hefty amount to recover their data. When this occurs, it’s called ransomware.4. Predicting and preventing attacks.Cybercriminals are proactively finding out new techniques for security threats. In such a scenario, there is a need for not only finding the vulnerabilities and fixing them as they occur but also learning to predict and prevent new threats.The challenge of security seems to be a long-term challenge for the security of connected devices. Modern cloud services make use of threat intelligence for predicting security issues. Other such techniques include AI-powered monitoring and analytics tools. However, it is complex to adapt these techniques in IoT because the connected devices need processing of data instantly.5. Difficult to find if a device is affected.Although it is not really possible to guarantee 100% security from security threats and breaches, the thing with IoT devices is that most of the users don’t get to know if their device is hacked.When there is a large scale of IoT devices, it becomes difficult to monitor all of them even for the service providers. It is because an IoT device needs apps, services, and protocols for communication. Since the number of devices is increasing significantly, the number of things to be managed is increasing even more.Hence, many devices keep on operating without the users knowing that they have been hacked.6. Data protection and security challenges.In this interconnected world, the protection of data has become really difficult because it gets transferred between multiple devices within a few seconds. One moment, it is stored in mobile, the next minute it is on the web, and then the cloud.All this data is transferred or transmitted over the internet, which can lead to data leak. Not all the devices through which data is being transmitted or received are secure. Once the data gets leaked, hackers can sell it to other companies that violate the rights for data privacy and security.Furthermore, even if the data doesn’t get leaked from the consumer side, the service providers might not be compliant with regulations and laws. This can also lead to security incidents.7. Use of autonomous systems for data management.From data collection and networking point-of-view, the amount of data generated from connected devices will be too high to handle.It will undoubtedly need the use of AI tools and automation. IoT admins and network experts will have to set new rules so that traffic patterns can be detected easily.However, use of such tools will be a little risky because even a slightest of mistakes while configuring can cause an outage. This is critical for large enterprises in healthcare, financial services, power, and transportation industries.8. Home security.Today, more and more homes and offices are getting smart with IoT connectivity. The big builders and developers are powering the apartments and the entire building with IoT devices. While home automation is a good thing, but not everyone is aware of the best practices that should be taken care of for IoT security.Even if the IP addresses get exposed, this can lead to exposure of residential address and other contact details of the consumer. Attackers or interested parties can use this information for evil purposes. This leaves smart homes at potential risk.9. Security of autonomous vehicles.Just like homes, the self-driving vehicles or the ones that make use of IoT services, are also at risk. Smart vehicles can be hijacked by skilled hackers from remote locations. Once they get access, they can control the car, which can be very risky for passengers.Wrapping upUndoubtedly, IoT is a technology that should be called a boon. But since it connects all the things to the Internet, the things become vulnerable to some sort of security threats. Big companies and cybersecurity researchers are giving their best to make things perfect for the consumers, but there is still a lot to be done. Internet of Things Makes it Easier to Steal You… Small Business Cybersecurity Threats and How to… Why IoT Apps are Eating Device Interfaceslast_img read more

Read More →