Tag: 上海千花验证归来


7 from Sylhets Bishwanath elected London councillors


first_imgAs many as seven British-Bangladeshis from Bishwanath upazila have been elected councillors in London boroughs of Camden, Croydon and Redbridge.They were among the huge number of Bangladesh-origin candidates ran in the local elections held on May 3.Among them, four were re-elected while there elected for the first time.Monwar Hossain of Hazarigaon village of the upazila was elected councilor as the first Bangali and first Asian councillor in UK’s Bradford Council in 1972.Ayesha Chowdhury Rakhi was elected as the first woman of the Newham Council in 1994 and Abdul Jabbar elected the first Bangladeshi mayor of Oldham Metropolitan Borough Council in 2004.In 2009, Roshnara Ali was elected MP in the British Parliament as the first Bangladeshi. She has been elected MP for three consecutive times.Of the councillors, three were elected for Tower Hamlet Council, two in the Newham Council, one each in Oldham and South Work councils.Sirajul Islam, son of Sheikh Sirajul Islam of Uttar Dhamrada village in Biswanath union’s ward no 6, has been elected as councillor from Bethnal Green ward of Tower Hamlets Council for the 5th time. At present, he is the deputy mayor of the council.Ayesha Chowdhury Rakhi of Sardarpara village under ward no 7 of Deokalash union has been elected as councillor for 5th time in Bacton ward of Newham Council.Abdul Malek of Karpara village in ward no 5 of Daulatpur union has been elected as councilor from the Cold-hearted ward of Oldham Council for the 3rd time.Mohammad Ayas Mia of Dharai village under ward no 8 in Dashghar union has been elected as the councilor from 2nd time for the Tower Hamlets Council of ST Dunstan’s ward. At present, he is the deputy speaker of that council.Barrister Nazir Ahmad of Bahara Dubagh village in ward no 5 of Daulatpur Union has been elected as councilor for the first time from Newham Council’s Ilford ward.Shah Suhel Amin of Gaon village in ward no 4 Rampasha union has been elected councillor from White Chamber of Worm at Tower Hamlets Council for the first time.Sirajul Islam of Rajkumur village in ward no 6 of Bishwanath union has been elected councillor for the first time from South Work Council.last_img read more


PostMugabe presidential race in Zimbabwe on July 30


first_imgA Zimbabwe Electoral Commissioon (ZEC) official files through the voters roll at an inspection centre in Harare, ahead of Zimbabwe election. Photo: AFPZimbabwe announced on Wednesday it would choose a new president and parliament on 30 July, in the country’s first electoral test since the removal of its autocratic former leader Robert Mugabe.His successor, President Emmerson Mnangagwa, unveiled the date in the official Zimbabwe Government Gazette.”Monday, the 30th day of July, 2018 (is) the day of the election to the office of President, the election of members of the National Assembly and election of councillors,” Mnangagwa said in a proclamation.Once a right-hand man to the 94-year-old Mugabe, Mnangagwa dramatically succeeded the veteran leader in November after nearly four-decades in charge when troops swarmed the streets and briefly seized key sites.Mnangagwa, 75, will square off against the main opposition Movement for Democratic Change (MDC) party, now led by 40-year-old Nelson Chamisa following the death of Morgan Tsvangirai in February.If no candidate receives a simple majority in the first round of the presidential election, a run-off will be held on 8 September.Elections under Mugabe were marred by corruption, intimidation and violence, but Mnangagwa has vowed to hold a free and fair vote.The election will be the first to be monitored by Western observers in many years.On Monday Harare and the European Union announced that observers from the bloc would monitor polls in the southern African country for the first time in 16 years.- Western observers -The head of the last EU observer mission, Pierre Schori, was thrown out of Zimbabwe in 2002 on the eve of presidential elections that were condemned as flawed.Following the high-profile spat, Zimbabwe barred the EU and other Western observers from sending further missions to monitor polls in the country as Mugabe grew more and more defiant of foreign criticism up until his downfall.And in a further sign of Zimbabwe’s growing efforts to mend fences with former foes following Mugabe’s resignation, the country has applied to re-join the Commonwealth, the bloc of former British colonies said Monday.Harare’s membership was suspended in 2003 over the violent and graft-ridden elections the previous year.Zimbabwe left the Commonwealth at the height of violent land seizures, when white farmers were evicted in favour of landless black people — a policy that wrecked agriculture and triggered economic collapse.Commonwealth Secretary-General Patricia Scotland confirmed that the organisation would also send observers to the elections.Mugabe sent shockwaves through the ruling ZANU-PF, the party he dominated for decades, when he recently posed with a retired general who will take on the government in this year’s election.Despite a slew of reformist pledges and announcements it is unclear whether Mnangagwa, who was a vital cog in the ZANU-PF party and helped Mugabe to hold onto power for 37 years, has won the support of ordinary Zimbabweans.last_img read more


No security threat centering Pahela Baishakh home minister


first_imgHome minister Asaduzzaman Khan Kamal. File PhotoHome minister Asaduzzaman Khan Kamal on Saturday said there is no specific security threat centering this year’s Pahela Baishakh celebration programme, reports UNB.“There is no specific threat. Besides, detectives’ surveillance is on. No one will be able to create any obstruction in the celebration programme,” he said while talking to reporters after visiting DMP’s security arrangements at Ramna Park.He said Pahela Baishakh has now become a national progamme and law enforcers have been kept ready across the country so that people can celebrate Pahela Baishakh smoothly.Cyber decurity team is also monitoring social media sites so that no one can spread provocative messages, said the minister.last_img


Trump To Sign Executive Order On Offshore Drilling And Marine Sanctuaries


first_img Share Wyland/NOAA/APA shark swims off the coast of Midway Atoll on the northern edge of the Papahanaumokuakea Marine National Monument in Hawaii. The Trump administration plans to consider reversing the designation of some marine sanctuaries. Wyland/NOAA/APPresident Trump is set to sign an executive order Friday that aims to expand offshore drilling for oil and gas, and possibly reverse the designation of some marine sanctuaries. In a briefing with reporters at the White House Thursday night, Interior Secretary Ryan Zinke said, “This will cement our nation’s position as a global energy leader.”The order directs Zinke to review a five-year plan in which President Obama banned drilling in parts of the Pacific, Arctic, and Atlantic Oceans. Zinke said that will be a long process, and a complex one, acknowledging that not all areas have oil or gas, and not all coastal communities want offshore drilling. But he said revenue from offshore leasing had dropped by $15 billion during the Obama administration, with some of that due to the dropping price of oil, “but not all of it.” Zinke said 94 percent of the nation’s outer continental shelf is currently off limits for development of any kind.The oil and gas industry welcomed the move. In a statement, Jack Gerard of the American Petroleum Institute said expanding drilling in the Eastern Gulf of Mexico in particular “could create thousands of jobs and provide billions of dollars in government revenue.”Along the Atlantic coast, though, more than 100 cities and towns have passed resolutions against offshore drilling. In Kure Beach, N.C., Mayor Emilie Swearingen said tourism is the second largest industry in the state. “We don’t want the devastation from an oil spill,” she said. “It’s not whether it would happen, but when it would happen.”George Edwardson, president of the Inupiat Community of the Arctic Slope, said his council may consider filing suit at some point to challenge an expansion of offshore drilling. “Most of our food comes from the ocean,” he said.Zinke told reporters the administration will not remove the “stringent environmental safeguards already in place.” He also said he was optimistic about the development of offshore wind energy.The Obama administration’s drilling bans will remain in place for now. But even if they are eventually rolled back, there are questions about how effective the executive order will be in spurring new drilling. The price of oil is relatively low, hovering at about $50 a barrel, and offshore drilling is an expensive endeavor, especially in places like the Arctic. When asked whether the administration had been approached by any companies interested in drilling in the Arctic, Zinke said, “No.”It’s also not clear whether the Trump administration can reverse a separate offshore drilling ban that Obama announced a month before leaving office. He used an obscure provision of the 1953 Outer Continental Shelf Lands Act to issue what he called a permanent ban on offshore drilling in large parts of the Arctic and Atlantic Oceans. Obama administration officials said at the time that the law had no provision to reverse such a ban. When asked about this, Zinke said only that “everything” is under review, and “whatever recommendation I make I’m sure we’ll have the legal authority to complete it.”The executive order also imposes a halt on designating or expanding any National Marine Sanctuary, unless the action “includes a timely, full accounting from the Department of the Interior of any energy or mineral resource potential in the designated area.” Zinke says the administration will have 180 days to review all such designations and expansions over the past decade. He likened this to another executive order this week that directs a review of national monuments on public lands.Last year Obama made headlines when he quadrupled the size of a marine sanctuary in Hawaii. He also created the Atlantic Ocean’s first marine monument, preserving roughly 130 miles of sea canyons and underwater mountains off New England.Copyright 2017 NPR. To see more, visit http://www.npr.org/.last_img read more


WATCH Paintings Of Barack And Michelle Obama Unveiled At Portrait Gallery


first_img Share Brand new portraits of former president Barack Obama and former first lady Michelle Obama — wearing matching calm, strong expressions — were revealed on Monday at the National Portrait Gallery in Washington, D.C.Kehinde Wiley painted Barack Obama sitting in a chair, elbows in his knees, leaning forward with an intense expression. The background, typical of a Wiley painting, is a riotous pattern of intense greens.“Pretty sharp,” Obama said with a grin.Amy Sherald, a Baltimore-based artist, painted Michelle Obama sitting in a floor-length gown, chin on her hand, looking directly at the viewer with a calm, level gaze.The paintings, like the presidency they honor, are a historic first. Wiley and Sherald — both already famous for their portraits of black Americans — are the first black painters to receive a presidential portrait commission from the museum.Celebrities from Shonda Rimes to Steven Spielberg, former administration officials from Josh Earnest to Eric Holder, and members of the media filed into the Portrait Gallery’s expansive, glass-covered central courtyard for the ceremony. Kim Sajet, the director of the gallery, told the audience that a portrait was not truly finished until a viewer, a member of the public, had a personal encounter with it.Then came the unveiling — quite literally, as fabric covers were pulled off the portraits on a small stage.– / 4The paintings exemplify the two artists’ trademark styles.“Wiley typically portrays people of color posing as famous figures in Western art,” the Portrait Gallery writes. “Through this practice, he challenges the visual rhetoric of power that is dominated by elite white men.”Barack Obama said he admired how Wiley’s photos “challenge our conventional views of power and privilege.”But he said he rejected Wiley’s ideas that involved him, for instance, riding a horse.” ‘I’ve got enough political problems without you making me look like Napoleon,’ ” he remembered telling Wiley. ” ‘You’ve got to bring it down a touch.’ And that’s what he did.”“How do you explain that a lot of that is just simply not true?” Wiley said, when he took to the lectern. Then he got more serious.“The ability to be the first African-American painter to paint the first African-American president of the United States is absolutely overwhelming,” Wiley said. “It doesn’t get any better than that. I was humbled by this invitation but I was also inspired by Barack Obama’s personal story.”Sherald, “known for her stylized, archetypal portrayals of African Americans,” survived a heart transplant in 2012, the museum notes. “A personification of resilience herself, Sherald conveys the inner strength of her subjects through a combination of calm expressions and confrontational poses,” the gallery writes.“I am a little overwhelmed, to say the least,” Michelle Obama said in a speech, after helping Sherald reveal her work. “As you may have guessed, I don’t think there is anybody in my family who has ever had a portrait done, let alone a portrait that will be hanging in the National Gallery — at least as far as I know, Mom,” she said. “But all those folks who helped me be here today, they are with us physically and they are with us in spirit.”“I’m also thinking of all the young people, particularly girls and girls of color, who … will see an image of someone who looks like them hanging on the wall of this great American institution,” she said. “I know the kind of impact that will have on their lives, because I was one of those girls.”It was a point Sherald echoed minutes later, when she emphasized that her portrait of Obama was conceptual and archetypal, bigger than just one model.Mark Wilson/Getty ImagesObama stands between the portraits. His will be permanently installed in the “America’s Presidents” exhibit at the National Portrait Gallery in Washington, D.C.“You exist in our minds and our hearts in the way that you do because we can see ourselves in you,” she said, turning toward Michelle Obama.The National Portrait Gallery, a member of the Smithsonian Institution, has worked with outgoing presidents to commission a new portrait of each one since 1962.More recently it began collecting portraits of first ladies as well. The National Portrait Gallery, a member of the Smithsonian Institution, writes:“Official portraits are interesting beasts because they are, of course official: they signify the status and attainments of the person portrayed. But they also are deeply personal, even revelatory, portrayals that say something of the character of the man or woman who shows their face to the public. The style of the portrait – the pose, the colors, the setting, as well as facial features (in the 19th century stern and forbidding was definitely the default expression) – all convey a measure of the sitter.”The official National Portrait Gallery paintings of George and Laura Bush both featured relatively casual, relaxed poses, with small smiles.The gallery’s portrait of Bill Clinton, by Nelson Shanks, was controversial after Shanks said he’d hidden a reference to the Monica Lewinsky scandal in the canvas. A different portrait of Clinton, a Chuck Close painting of the former president’s grin, is on display in the museum.The new paintings of the Obamas will be on view to the public beginning Tuesday.Wiley’s painting of former President Obama will be permanently installed in the “America’s Presidents” exhibit (The Portrait Gallery has the “only complete collection of presidential portraits outside the White House,” the museum said in a statement.)Sherald’s painting of Michelle Obama will be on display through November in the museum’s “Recent Acquisitions” section.Copyright 2018 NPR. To see more, visit http://www.npr.org/.last_img read more


Fly dreams and the boundaries of evolutionary science


first_imgIt should be pointed out that many genetic therapies now on the table are based on treatment of somatic cells. If heritable changes to the genome can be introduced via predictable breaches in Weismann’s barrier, as many now presume exist, that is something we probably want to know more about. We need look no further than plants to see that genetic changes in germ lines can be produced as a result of genetic changes in somatic lines. Here somatic cell lineages (vegetative meristems) may be old enough to have accumulated many mutations subject to natural selection since seed germination.Neurobiologists are more interested in those heritable skills or experiences that can be packaged quickly into the germ line, almost perhaps, instantaneously. In many species, sperm are produced at a tremendous rate and practically speaking, they turn over daily. For his fly experiments, Ziv paired different odors with either an aversive or an appetitive stimulus, and trained them over the course of a few days to make the proper associations.The aversive stimulus was an electrified copper grid which presumably was distasteful enough to be seen as a non-lethal assault, but not so powerful as to prevent any formative interactions. Electrical shock may not be the cleanest stimulus (after all we know from the experiments of Miller and Urey that electricity of sufficient voltage can spawn amino-acids from gases), it seems to have what it takes to make a good impression. The appetitive stimulus in this case was of an appetitive nature—corn meal and sugar. While the opposite of shock may not be a sugar snack, the pair do provide a clear choice between good and evil.If precise mechanisms of inheritance are to be attributed to specific details of a stimulus, then the particulars of the odors themselves (3-octanol (OCT) or 4-Methylcyclohexanol (MCH)) are important in these studies. Other experiments, like those in mice, used acetophenone because a fair bit is already known about the receptors and circuitry involved in detecting it. Using a T-maze setup, Ziv was able to show that after the parents had mastered associations of odors with good and evil, the offspring of those flies later showed heightened sensitivity to them as well. However, for whatever reason, the effect was only strong with the MCH stimulus, and in the aversive pairing. Not only that, but the response to MCH was the opposite from the response that the parents had learned: the offspring preferred to move toward MCH instead of avoiding it.Ziv suggests that since the sensitivity to MCH was inherited, but the seemingly useful response (avoidance) was not, there is no inheritance of change at the neural circuit level going on. While that may be a fair enough conclusion, we really can’t make any sweeping conclusions at this point as to what is really going on. Ziv, like other explorers of Lamarckian inheritance, merely offers his controlled study with error margins in the same spirit as nearly every other scientific study put on the charts. If we take any of them at face value, we take all of them.Scientists look for inheritance of specific experiences because they can be quickly inserted into animal, and then later measured to clear effect. To further probe these behavioral phenomena, Ziv suggests that olfactory processes could be blocked at various stages in the adults. Reversibly altering specific pathways using dominant temperature-sensitive transgenes like UAS-Shi for example, would perhaps be one way to do this.Ultimately scientists want to look beyond transient effects and explore the inheritance of actual physical characteristics, like longer necks in giraffes or bigger hands in farmer’s sons. Opponents may argue that any significant results that one might obtain would merely uncover previous genetic pathways already built into the organism. In a way we have the same bottleneck that sensory neurobiogists decry when they try to account for the massive compression of information in a visual stimulus through the retina, and unto the digital output of the optic nerve spike train. However if we figure the entire retina, or the entire body, as a molecular computing volume down to the samllest scale, rather than just considering a few membrane-constrained channels, we hint at the source of power. Personality is the result of nurture, not nature, suggests new study on birds This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. Explore further © 2014 Phys.org Journal information: arXiv More information: arxiv.org/ftp/arxiv/papers/1312/1312.7331.pdf However those mechanisms that first generated life, and by implication continue to refashion it as fast as we try to comprehend, are still unknowns of a nature we have scarcely imagined. Strict adherence to the concepts of random genetic mutation followed by natural selection thrusts up a steep barrier to a full understanding of variation in the natural world. In order to push beyond this cusp, scientists have now turned to the ideas of Lamarck. The latest installment in the genetic saga of individual experience has just been published on the arxiv preprint server by Harvard neurosurgeon Ziv Williams. Ziv’s new results were obtained with flies, and they shadow the recent provocative data on murine (mouse) inheritance of ancestral fears. The latter study raised the roof on what is now possible in a scientific experiment. In demonstrating not only a mechanism for sperm-specific transmission of acquired traits from the father, but also precision modification of neural circuitry, that report set the bar extremely high for what might be proved in a study—and also for what might be swallowed by the larger community.With mice, it is possible to isolate the mechanism of transmission of a particular experience to the father’s sperm by doing in vitro insemination. While that is not so simple in flies, there is one big advantage to working with them—experiments can be more easily done at high n factor (number of flies). This is critical for discerning complex, but often weak, effects. The principle that information of a hereditary nature ratchets only in the direction from germ cells to somatic (body) cells is known as Weismann’s barrier. It is expected that any breakdown of this evolutionary diode (such as feedback from somatic to germ cells) would be a weak effect because the bandwidth for transmission of experience to germ cells would, at first glance, appear to be severely limited. Citation: Fly dreams and the boundaries of evolutionary science (2014, January 2) retrieved 18 August 2019 from https://phys.org/news/2014-01-boundaries-evolutionary-science.html In 2002, Secretary of state Donald Rumsfeld made a statement regarding weapons of mass destruction that today is still well known. He famously parsed the evidence (or lack thereof) into “known knowns, known unknowns, and unknown unknowns.” In squeezing virtually all that it can from the ideas of Darwin, evolutionary biology has produced a mountain of facts and ideas that fall squarely in the realm of Rumsfeld’s first two categories. Jean-Baptiste LamarckCredit: Wikipedialast_img read more


Best of Last Week Big Bang singularity unlocking Earths inner core and


first_img © 2015 Phys.org A research team from the University of Illinois and colleagues in China found earth’s inner core has an inner core of its own, with crystals aligned in a different direction. Credit: Lachina Publishing Services In other news it was recently noted that some researchers are using the DOE’s Fermilab Dark Energy Camera to unveil small objects in our solar system—the 570-megapixel camera is being used by some to track space junk, asteroids and other objects. Also a team of geologists described how they are attempting to unlock the mysteries of the planet’s inner core by applying a novel application of earthquake reading technology and have found that our planet’s inner core itself has an inner core, too.In other news, the world’s first rotary 3-D printer-cum-scanner was unveiled at the AAAS meeting—called the Blacksmith Genesis, it allows novices to scan an item, edit it and then print it. Also another team of researchers found that coral snake venom revealed a unique route to lethality—turns out it is a toxin that activates a certain kind of nerve cell protein that prevents cells in victims from resetting and ultimately leads to seizures in prey. And yet another team found amber fossil links to the earliest grasses, dinosaurs and fungus used to produce LSD—in Myanmar. Another team has found that a common plant extract fights brain tumors—silibinin, used to treat victims of poisoning and some liver diseases has been shown to be effective in treating Cushing’s Disease, where a tumor grows in the pituitary gland.And finally, if you have been taking medications to get rid of an infection, it might interest you to know that a team of researchers has found that the unwanted impact of antibiotics is broader and more complex than previously known—they found that the drugs have a much bigger impact on the microorganisms that live in our gut, than has been thought, further complicating their use. Journal information: Physics Letters B This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. (Phys.org)—It was an intriguing week for physics as a pair of theorists suggested that their quantum equation predicts the universe has no beginning and thus there was no Big Bang. In their paper published in Physics Letters B, Saurya Das and Rajat Bhaduri, suggest their math shows that the universe has existed forever and that it may also account for both dark energy and dark matter. Also, some at this year’s American Association for the Advancement of Science meeting have been hinting at the possible discovery in 2015 of a new particle in physics—due, they suggest, to the LHC coming back online, twice as powerful as before. Meanwhile, another group suggested that on quantum scales, there are many second laws of thermodynamics—they think there are whole families of them at extremely small scales. Citation: Best of Last Week: Big Bang singularity, unlocking Earth’s inner core and another problem with antibiotics (2015, February 16) retrieved 18 August 2019 from https://phys.org/news/2015-02-week-big-singularity-earth-core.html No Big Bang? Quantum equation predicts universe has no beginning Explore furtherlast_img read more


Sushila Goenka cremated


first_imgKolkata: Sushila Goenka, wife of R P Goenka and mother of Harsh Vardhan and Sanjiv Goenka, was cremated at the Keoratala burning ghat on Monday morning.Senior ministers of the state government, city based industrialists and people from all walks of life were present at the crematorium to pay their respects to the departed soul. She had died in Kolkata on Sunday evening.She was cremated this morning at Keoratala burning ghat in the presence of a large gathering of friends, family members and admirers. Her eldest son Harsh Vardhan Goenka, chairman of the RPG Group and youngest son Sanjiv Goenka, chairman of the RP-Sanjiv Goenka Group, were present along with their children and family members Rama Prasad Goenka’s brothers Jagdish Prasad and Gouri Prasad Goenka.Born in Kolkata, Sushila Goenka, daughter of Ram Sundar Kanoria, was married to Rama Prasad Goenka in 1948. An ardent devotee of Indian tradition and culture, she was well-known for her interest in Indian music and her intimate connection with some of the musical legends of India, including Lata Mangeshkar.last_img read more


Building a Profitable Wearable Device May Depend on Who You Partner With


first_img Opinions expressed by Entrepreneur contributors are their own. Hear from business owners and CEOs who went through a crippling business problem and came out the other side bigger and stronger. Problem Solvers with Jason Feifer Apple scores big in marketing, channel and brand, and has the best chance to take a product mainstream. Just look at how the iPad overtook a decade’s worth of tablet PCs in less than a year.Google’s open Android platform enables a product to be built on top of its code and offers access to Android apps.Microsoft has the best depth sensor, and its operating systems have already proven themselves in a number of products. What the company currently lacks is the ability to attract experienced and new developers, but by ‘acquhiring’ a tech startup, that problem will be easily solved.Amazon is now the go-to source for product searches, offering access to more than 100 million products — and their potential buyers. It’s more of a partner than a manufacturer of wearables.Facebook brings to the table 850 million people, making it the partner of choice for any wearable that aims to leverage facial recognition or social sharing.Do you think its possible to build a mainstream tech offering in the wearable category without the assistance or partnership of Apple, Google, Microsoft, Amazon or Facebook? Let us know in the comments below.  min readcenter_img Wearable electronic devices have moved beyond the pages of comic strips like Dick Tracy and have appeared in everything from eyeglasses that incorporate GPS to running shoes that pinpoint their wearer’s immediate location and bracelets that tabulate one’s exercise efforts.But wearables are still far from mainstream, and the next round of product engineering will require exploiting the relative strengths of the “big five platforms” — i.e., Apple, Google, Microsoft, Amazon and Facebook.So says a new report from Forrester Research Inc., adding that without these Blue Chip Companies, wearables — defined as “devices worn on or near the body that sense and relay information” — are just another passing fad.According to the Forrester report, five platforms are the only game in town — each with its own specialty: April 19, 2012 Listen Nowlast_img read more


11 Tips to Secure Mobile Devices and Client Data


first_img You have employees. They bring smartphones to work. All is fine, right? Wrong.Related: Meet the Cybersecurity Startup That’s Caught the Eye of Google’s Eric Schmidt First of all, the second an employee brings a personal mobile device to work, you can bet on a fusion of personal and business affairs occurring. This was evident when 2,000 office workers were surveyed as to:How many downloaded personal apps to tablets issued by their employer: 73 percentHow many did this with smartphones their company issued: 62 percentHow many did it with company-issued notebooks: 45 percentThe age group most guilty of this: 25 to 38 years oldThe number who used their smartphones and other mobile units to conduct company business: over 50 percentThat last percentage was slightly better news. But it hardly canceled out the aforementioned misuse, which may result in who-knows-how-much company business leaking outside the building to who knows where. That “50 percent” also raises the question: Have you, a decision-maker at your company, devised any plans to prevent or minimize how much company data leaves your building, in the form of storage inside your employees’ smartphones and other mobile devices?The solutions may lie in the strategies that company decision-makers and IT managers can draw on to control data leakage. These strategies fall under something called enterprise mobile management. But cooperation is required from both parties: the company and the employees.As a decision-maker, then, you’d be smart to think: “We’ll just never know, will we, where an employee’s smartphone ends up on the weekends — a device loaded with our most sensitive data!”Solutions for businessesBusiness owners and other company decision-makers should regard the personal smartphone as a potential company diary. You don’t want this diary going all over the place after hours. You don’t want it easily opened for all to see what’s written on the pages.Related: 4 Essentials to Secure Your Business Even From State-Sponsored Online ThreatsSo, try consider these strategies:1. Teach employees about phishing scams.Phishing maneuvers are a leading way that cybercriminals steal data. Research shows how easy it is to get employees to fall for these scams: The worker receives an email that has an urgency to it (e.g., subject line: “Get back to me asap”). Inside the mail is a link that the sender urges the recipient to click on. The link takes the user to a fake website that lures him or her into revealing sensitive company information.2. Inform employees that the sender may pose as the company’s bank or as someone from the board of directors.Even after being taught about phishing, employees may still be suckered into clicking on a link inside an email — as staged phishing attacks have shown. To make things simple and to avoid confusion, simply demand that employees not click on any links inside emails. No exceptions. Tell them that nobody will be penalized for not clicking on a link inside an email.3. Employees should be suspicious of free download offers. Clicking on these could activate a computer virus.4. Employees should buy applications from a trusted app store rather than from third-party sources.It’s hard to know what those third parties’ true motivations are.5. Employees should be sure to protect all their devices with passwords.If an employee leaves a device unattended, or it’s lost, could the finders get into any documents, or have to type in a password (which they don’t know, of course)?6. All devices used for business should have a “wipe” function.The more employees you have, the harder it will be to get every single one to password-protect his or her devices. Another layer of protection, then, is to require a “wipe” function. If the device is lost or stolen, all the data on it can be eradicated — remotely.7. All devices used for business should erase their data automatically after a set number of password attempts. This will discourage hackers.8. All devices, especially Androids, should be required to have anti-virus software.This protects the device from malware that comes with an app that’s downloaded.9. Employees should never “jailbreak” or “root” a mobile device.Malware can infiltrate if the walled garden of the device is broken down because the user has manipulated the device’s factory-installed operating system.10. Employees should activate their update alerts immediately rather than opt for “remind me later.” These updates patch up security holes so that evolving cyber-pathogens do not gain entry.11. Employees should be made aware that Wi-Fi in public is not secure.Even though connections to public Wi-Fi will say they’re not secure, not all users notice this alert; and some may not even know what it means. Instead, using a virtual private network (VPN) will significantly boost security for your company’s sensitive data. A VPN service, such as Hotspot Shield VPN, encrypts all cyberspace transmissions, scrambling them so that hackers can’t make sense of them.Certainly it’s true that employees themselves may be crooks working from the inside to commit cybercrime. But a significant volume of data leakage still stems from simple carelessness by employees — and a lack of information and knowledge about security. What have you done about this threat at your own company?Related: Password Statistics: The Bad, the Worse and the Ugly (Infographic) Opinions expressed by Entrepreneur contributors are their own. 5 min read June 11, 2015 Hear from Polar Explorers, ultra marathoners, authors, artists and a range of other unique personalities to better understand the traits that make excellence possible. How Success Happens Listen Nowlast_img read more


New programming video courses for March 2019


first_imgIt’s not always easy to know what to learn next if you’re a programmer. Industry shifts can be subtle but they can sometimes be dramatic, making it incredibly important to stay on top of what’s happening both in your field and beyond. No one person can make that decision for you. All the thought leadership and mentorship in the world isn’t going to be able to tell you what’s right for you when it comes to your career. But this list of videos, released last month, might give you a helping hand as to where to go next when it comes to your learning… New data science and artificial intelligence video courses for March Apache Spark is carving out a big presence as the go-to software for big data. Two videos from February focus on Spark – Distributed Deep Learning with Apache Spark and Apache Spark in 7 Days. If you’re new to Spark and want a crash course on the tool, then clearly, our video aims to get you up and running quickly. However, Distributed Deep Learning with Apache Spark offers a deeper exploration that shows you how to develop end to end deep learning pipelines that can leverage the full potential of cutting edge deep learning techniques. While we’re on the subject of machine learning, other choice video courses for March include TensorFlow 2.0 New Features (we’ve been eagerly awaiting it and it finally looks like we can see what it will be like), Hands On Machine Learning with JavaScript (yes, you can now do machine learning in the browser), and a handful of interesting videos on artificial intelligence and finance: AI for Finance Machine Learning for Algorithmic Trading Bots with Python Hands on Python for Finance Elsewhere, a number of data visualization video courses prove that communicating and presenting data remains an urgent challenge for those in the data space. Tableau remains one of the definitive tools – you can learn the latest version with Tableau 2019.1 for Data Scientists and Data Visualization Recipes with Python and Matplotlib 3. New app and web development video courses for March 2019 There are a wealth of video courses for web and app developers to choose from this month. True, Hands-on Machine Learning for JavaScript is well worth a look, but moving past the machine learning hype, there are a number of video courses that take a practical look at popular tools and new approaches to app and web development. Angular’s death has been greatly exaggerated – it remains a pillar of the JavaScript world. While the project’s versioning has arguably been lacking some clarity, if you want to get up to speed with where the framework is today, try Angular 7: A Practical Guide. It’s a video that does exactly what it says on the proverbial tin – it shows off Angular 7 and demonstrates how to start using it in web projects. We’ve also been seeing some uptake of Angular by ASP.NET developers, as it offers a nice complement to the Microsoft framework on the front end side. Our latest video on the combination, Hands-on Web Development with ASP.NET Core and Angular, is another practical look at an effective and increasingly popular approach to full-stack development. Other picks for March include Building Mobile Apps with Ionic 4, a video that brings you right up to date with the recent update that launched in January (interestingly, the project is now backed by web components, not Angular), and a couple of Redux videos – Mastering Redux and Redux Recipes. Redux is still relatively new. Essentially, it’s a JavaScript library that helps you manage application state – because it can be used with a range of different frameworks and libraries, including both Angular and React, it’s likely to go from strength to strength in 2019. Infrastructure, admin and security video courses for March 2019 Node.js is becoming an important library for infrastructure and DevOps engineers. As we move to a cloud native world, it’s a great tool for developing lightweight and modular services. That’s why we’re picking Learn Serverless App Development with Node.js and Azure Functions as one of our top videos for this month. Azure has been growing at a rapid rate over the last 12 months, and while it’s still some way behind AWS, Microsoft’s focus on developer experience is making Azure an increasingly popular platform with developers. For Node developers, this video is a great place to begin – it’s also useful for anyone who simply wants to find out what serverless development actually feels like. Read next: Serverless computing wars: AWS Lambda vs. Azure Functions A partner to this, for anyone beginning Node, is the new Node.js Design Patterns video. In particular, if Node.js is an important tool in your architecture, following design patterns is a robust method of ensuring reliability and resilience. Elsewhere, we have Modern DevOps in Practice, cutting through the consultancy-speak to give you useful and applicable guidance on how to use DevOps thinking in your workflows and processes, and DevOps with Azure, another video that again demonstrates just how impressive Azure is. For those not Azure-inclined, there’s AWS Certified Developer Associate – A Practical Guide, a video that takes you through everything you need to know to pass the AWS Developer Associate exam. There’s also a completely cloud-agnostic video course in the form of Creating a Continuous Deployment Pipeline for Cloud Platforms that’s essential for infrastructure and operations engineers getting to grips with cloud native development. Learn a new programming language with these new video courses for March Finally, there are a number of new video courses that can help you get to grips with a new programming language. So, perfect if you’ve been putting off your new year’s resolution to learn a new language… Java 11 in 7 Days is a new video that brings you bang up to date with everything in the latest version of Java, while Hands-on Functional Programming with Java will help you rethink and reevaluate the way you use Java. Together, the two videos are a great way for Java developers to kick start their learning and update their skill set.last_img read more