pisusuwe

pisusuwe

NonBJP opposition parties unlikely to meet on May 21

first_imgAmaravati: The non-BJP opposition parties are unlikely to meet on May 21 as Trinamool chief Mamata Banerjee has requested TDP president N Chandrababu Naidu to fix a date after the declaration of results on May 23 for it, at the convenience of other parties.”Our leader is yet to take a call on this. It depends on the outcome of the elections. The meeting, though, is bound to happen after the 23rd,” a member of the TDP politburo said here on Monday. Also Read – 2019 most peaceful festive season for J&K: Jitendra SinghDuring their meeting on Thursday last, the AP Chief Minister reportedly suggested to his West Bengal counterpart that a meeting of the non-BJP opposition parties be convened on May 21 to discuss the post-poll strategy. She, however, expressed reservations over this, citing the impending counting of votes on May 23. TDP sources here aver that Mamata Banerjee expressed apprehensions over the safety of the EVMs stored in strong rooms across the country and, as such, there was a need for all opposition parties to keep a constant vigil to thwart the BJP’s “nefarious plans.” Also Read – Personal life needs to be respected: Cong on reports of Rahul’s visit abroadShe also felt that opposition leaders should remain in their respective states to monitor the counting arrangements, as well as safety of the strong rooms. “Hence, she wanted the opposition meeting to be held after May 23. Anyway, the opposition meeting has to happen after the results are out,” the TDP leader said. Meanwhile, Chandrababu Naidu continued his tirade against Prime Minister Narendra Modi, saying a certain despondency has crept in in the latter. “His latest utterances are an indication of Modis despondency. He is talking about Rajiv Gandhi, who died 28 years ago. He is also trying to derive mileage from the sacrifices of Army men,” the TDP chief said at a meeting of the partys Nandyal Lok Sabha constituency leaders here Monday.last_img read more

Read More

pisusuwe

Fracking firm linked to 2014 BC temblor says cause of recent quake

Fracking firm linked to 2014 B.C. temblor says cause of recent quake not established by Tamsyn Burgmann, The Canadian Press Posted Aug 26, 2015 6:13 pm MDT Last Updated Aug 27, 2015 at 9:20 am MDT AddThis Sharing ButtonsShare to TwitterTwitterShare to FacebookFacebookShare to RedditRedditShare to 電子郵件Email VANCOUVER – A natural gas operation that halted work after a 4.6-magnitude earthquake in northeastern British Columbia last week has been linked to the largest earthquake in the province that’s been attributed to fracking.Progress Energy, which is owned by Malaysia’s Petronas, paused its operations after the Aug. 17 quake that occurred 114 kilometres from Fort St. John.The B.C. Oil and Gas Commission has previously said that hydraulic fracturing — or fracking — by the same company triggered a 4.4-magnitude earthquake that was felt in Fort St. John and Fort Nelson in August 2014.Progress Energy responded late Wednesday, saying the cause of the recent quake has not yet been established.“The northeast B.C. foothills is a seismically active area with more than 6,000 seismic events each year, 99 per cent of which measure a magnitude so low that they are not felt on the surface,” said a statement from spokesman Dave Sterna.The company has voluntarily installed 17 seismic monitoring stations in its operating area, Sterna added.A report by the commission said fracking has caused nearly 200 seismic events in the Montney Trend, which stretches from the B.C.-Alberta boundary near Dawson Creek to the B.C. Rocky Mountain foothills.The report that investigated fracking, the process of fluid injection into rock to extract natural gas, looked into quakes recorded between August 2013 and October 2014.A statement from Rich Coleman, B.C.’s minister for natural gas development, said drilling must stop immediately and the commission must be notified if seismic activity reaches a magnitude of 4.0 or higher.“Operations can only resume once a mitigation plan — such as reduced pumping pressures — are agreed on by the commission,” he said.Coleman said quakes related to hydraulic fracturing are rare, with only about 2.6 per cent of fracking operations in the Montney linked to a seismic event.The province collects earthquake data at 10 stations throughout B.C.’s northeast.“We implemented preventive measures that make sense for our province,” said Coleman. “Seismicity can be managed through geologic understanding, pumping protocols and monitoring.”Energy giant Petronas is also working with the B.C. government on a $36-billion liquefied natural gas project, called Pacific Northwest LNG.The commission did not respond to a request for comment.Follow @TamsynBurgmann on TwitterNote to readers: This story has a corrected headline. A previous version had a headline that said the fracking firm caused the recent quake, but as the story made clear the firm says the cause has not been established. read more

Read More

pisusuwe

Holidaymaker who stole pebbles from Cornwall beach forced to return them or

The council removed two of the four warning signs on Tuesday due to the backlash.Local artist Jen Dixon described the decision to erect signs as “a shame,” adding: “We must have such a problem with stone theft that the beach is now littered with large red and yellow signs threatening prosecution.”They are so darn ugly on our beautiful beach.”It seems very heavy-handed to have that so many signs.”This new approach comes three years after a local council were forced to microchip flowers and shrubs due to people stealing them from public parks.Devon District Council said they experienced such “severe” theft of public plants that council gardeners resulted in microchipping them as a deterrent.Local Jackie Carpenter, who lives near Crackington Haven beach in Cornwall, said the signs “ruin the ‘beautiful place’ view”.“They also provide a horrible ‘police-state’ sort of environment,” she added.Lisa Ward, who also lives in the Crackington Haven area, said: “I have overheard visitors walking onto the beach commenting on how aggressive they look”.Cornwall Council which owns 57 of the county’s beaches said it “strongly urged visitors not to remove stones or sand”.A spokesman said: “It may seem harmless but given the many thousands of visitors to Cornwall’s beaches every year every stone removed could have an impact on coastal erosion, natural flood defences and wildlife habitats”. Want the best of The Telegraph direct to your email and WhatsApp? Sign up to our free twice-daily  Front Page newsletter and new  audio briefings. However, critics have claimed the signs – which were installed in late July – are heavy handed and spoil the beach.In one case, the council traced a holidaymaker back to his home hundreds of miles away and threatened him with prosecution, resulting in the man driving a carrier bag of stones all the way back to the beach. sign Theft has become so common on the beach that the local parish council in Crackington Haven have had to put up several signs warning it is illegal. Credit:APEX/APEX A holidaymaker has been forced to drive hundreds of miles to return pebbles he “stole” from the beach after the local council threatened him with prosecution.The incident took place in Crackington Haven, Cornwall where beach pebble theft has become so common that the parish council was forced to put up several signs warning it is illegal.It came after visitors complained that they were being “aggressively” threatened with prosecution for taking stones home at the Cornish beauty spot.Removing stones from public beaches is illegal under The Coastal Protection Act 1949 and St Gennys Parish Council have warned that visitors who are found to be doing it could face a fine of up to £1,000 for leaving the area exposed to erosion.Parish clerk Barry Jordan said: “Those who saw the damage of the floods a few years ago know what water can do, take away the pebbles and the haven would be damaged during every storm.”Mr Jordon told The Telegraph that the council are not willing to name the gentleman due to data protection reasons. read more

Read More

pisusuwe

Man who snatched cellphone because he was hungry sentenced to 6

A thirty-seven-year-old man of Plaisance, East Coast Demerara (ECD) claimed that an extreme state of hunger prompted him to “snatch” a cellular phone when he was brought before the Georgetown Magistrates’ Courts earlier today (Wednesday) to answer to the charge of simple larceny.It is alleged that Simon Persaud stole from the person of Adia Agard (Complainant), one Samsung smart phone valued at $60,000 on October 30 2017 at Avenue of the Republic, in Georgetown.Persaud readily admitted to the offence and told the court of presiding Magistrate Fabayo Azore that he was hungry and decided to try the “phone snatching thing” he had heard about. He said that after the complainant alerted the police in the area, he started to run “wild” neither knowing what he was doing or where he was going when he was apprehended by the police.“I’m sorry, it’s the first time I try something like this and I get catch”, he said in an apology to the complainant before the court.Upon hearing his explanation the Magistrate rhetorically questioned “What to do with you?” to which the accused suggested community service as he pleaded with the Magistrate not to send him to prison with hardened criminals.Moreover, he indicated that he was a labourer by trade and most of his family resides overseas with no one to pay his fine.Having considered all mitigating factors in the circumstances- the remorse of the accused and the fact that the phone was recovered among other things- the Magistrate sentenced him to serve six months community service at the Brickdam Police Station (Georgetown) on every Friday of the week.Persaud thanked the Magistrate and vowed to be a law-abiding citizen as he was happily escorted out of the courtroom. Share this:Click to share on Twitter (Opens in new window)Click to share on Facebook (Opens in new window)RelatedMan accused of snatching cell phone remanded to prisonOctober 21, 2013In “Crime”Man gets 2 months jail for robbing schoolboy of cellphoneNovember 2, 2017In “Court”Teen admits to snatching cell phones from minibus passengers – jailed for six monthsMarch 3, 2016In “Crime” read more

Read More

pisusuwe

Fines of €650k for hospitals in breach of doctors working hours

first_imgTHE IRISH MEDICAL ORGANISATION recommended yesterday that junior doctors say ‘yes’ to the Labour Relations Court proposals that will bring an end to junior doctors working shifts more than 24 hours and will establish financial sanctions to hospitals that are in breach of the European Directive on working hours.The HSE have agreed that by 14 January, no doctor will work more than a 24 hour shift and that all hospitals will be compliant with working time directives by the end of 2014.Breaching agreementsUnder the agreement with the IMO, any hospital found to be in breach will be sanctioned. Hospital managers will also face sanctions if their hospital breaks the rules.No additional payment will be made to doctors under the new agreement.Speaking on RTE’s Morning Ireland, Barry O’Brien, National HR Director for the HSE said he didn’t think the word “sanction” was an appropriate word to use, but said under the agreement there is a method in place to “incentivise compliance”.He said the IMO and the HSE had agreed to work collectively to maximise compliance by the end of 2014.Financial hitHospitals that are found to break the rules in relation to working hours will be hit financially.O’Brien said that the amount of money is dependent on the grade of hospital, stating that there are three bands of hospitals.The bigger hospitals will be hit with a yearly sanction of €650,00, band two hospitals will be hit by €350,000 and band three by €225,000.He said the hospitals would be penalised pro rata on a monthly basis if they haven’t complied.When asked what punishments hospital managers will face, he said that they will be subject to “HR procedures and policies,” which he clarified could be the reassigning of the responsibility of implementation to another manager or another manager could be reassigned their job.PatientsHe said that the HSE were working to reschedule patients that had their appointments and operations cancelled last week during the strike.O’Brien said they were taking it in good faith that an agreement had been made with the IMO and said they would not be waiting for the outcome of the ballot on November 14 to reschedule patient appointments.“We are taking it in good faith the agreement made and we are taking action, today, to reschedule those people who were discommoded last week,” he said.Read: IMO recommends junior doctors say ‘yes’ to LRC proposals>Read: Taoiseach tells junior docs and HSE: Go back into the LRC and sort this out>last_img read more

Read More

pisusuwe

The 5 at 5 Wednesday

first_imgEACH WEEKDAY EVENING, TheJournal.ie brings you five things you should know before you head out the door.1. #ATHLONE: A two-year-old boy was taken from his Roma family and placed into care in Athlone last night before being returned to them this morning. In a similar case in Dublin, DNA tests are currently being carried out on a seven-year-old girl taken from a Roma family in Tallaght.2. #PRICE HIKES: Fares on buses, trains and the Luas will all cost more from next week after price increases were approved by the National Transport Authority.3. #MEDICAL CARDS: A six-year-old girl with Down syndrome and additional health problems had her medical card removed before it was reinstated following numerous complaints.4. #HSE: The Health Service Executive is predicting an end-of-year deficit of €105 million which could yet rise further according to RTÉ.5. #ONLINE: Facebook have reversed an earlier decision and have removed a controversial beheading video on the site but insisted their policies have not changed.last_img read more

Read More

pisusuwe

Man still in custody over Tallaght shotgun attack

first_imgA MAN IS still being questioned over a shooting last night in which a woman died and another woman was seriously inured.The 60-year-old woman – named locally as Mary Dargan – was killed following a shooting in a house in the Killinarden area of Tallaght yesterday afternoon, while another woman in her 30s, believed to be the victim’s daughter, was injured.She was taken to Tallaght Hospital with gunshot wounds. Her injuries are not life-threatening.Today, gardaí said that a man in his 50s who was arrested yesterday is still in custody.He was taken to St James’ Hospital with non-life threatening injuries and detained under Section 30 of the Offences Against the State Act, 1939.The Irish Mail said this morning that during the incident a young girl was thrown out of a downstairs window by her mother – the younger woman – when the man entered their home with a gun.The young girl is believed to be four years of age.Read: 66-year-old woman killed, daughter injured in Tallaght shotgun attack>last_img read more

Read More

pisusuwe

Twobedroom Co Dublin house for €25k and theres just one catch

first_imgARE YOU LOOKING to get out of renting, but lacking the cash to buy?This detached Co Dublin home could be right for you. It’s got two bedrooms, a bathroom with electric shower, and a full kitchen. And it costs just €25,000.Here’s the catch: it’s a 20ft by 25ft log cabin.The cabin is currently located in Ballyboughal, not too far south of the Meath border. But it can be disassembled, stacked on a truck and put together again anywhere you like.From the description on Daft.ie:This fantastic log cabin has been a home to a young family for the last two years and has proved itself to be a comfortable, dry and warm environment to live […] This property is fully plumbed, double glazed, very well insulated and runs off a central heating system. Dismantling and erecting this lovely log cabin would only take a couple of days.Here’s what it looks like:last_img read more

Read More

pisusuwe

Nissan Leaf may hold key to championshipwinning Formula One cars

first_imgIf you are a fan of Formula One racing, then you are aware that last year’s World Champion, Sebastian Vettel, is already dominating the 2011 season in his Red Bull-sponsored car. Of the five races so far this season the Red Bull cars have consistently been faster than anyone else in qualifying, and while other teams are more competitive in the race, Vettel has still managed 4 out of 5 race wins.One of the complaints about Formula One from past seasons has been a lack of overtaking during the race. So this year drivers got two new systems to help aid those overtakes. The first is a Drag Reduction System (DRS) that opens up the rear wing on the racing car allowing for increased speed on the straights. The second is the reintroduction of the Kinetic Energy Recovery System (KERS), which gives drives the ability to boost their speed using power from an on-board batteries for several seconds each lap. Together, they make the act of overtaking that much easier and has resulted in some exciting moments.KERS works by harvesting energy generated from a Formula One car under breaking. The driver then has access to a set amount of that power boost energy for one lap. At the end of each lap the allowed quota is reset and another few seconds of power boost is there to be used.While Red Bull undoubtedly has the fastest car on track so far in 2011, that speed is even more impressive when you consider the team’s KERS setup doesn’t work very well and keeps breaking. With it working 100%, who knows how much further ahead they would be.The team isn’t sharing why the system keeps letting them down, but requests to drivers during races not to use it for several laps, or to use it all in one burst, suggest the batteries may be getting too hot.Red Bull is, of course, determined to fix the KERS problems, and so has turned to a company that knows a lot about battery tech: Nissan. Nissan has impressed recently with the introduction of the Leaf electric car. Yet it seems unusual that a team pushing for performance above all else would see an eco-friendly, realtively slow vehicle as the key to getting faster. But then Nissan has managed to create a vehicle that runs purely on battery power, which translates to reliability, and that’s exactly what Red Bull needs right now.In return for Nissan’s help, Red Bull hopes to test the Japanese company’s battery tech to its limits. And while this may be all about racing at the moment, it could lead to more responsive, more efficient, and faster road cars for us all in the future.via Wiredlast_img read more

Read More

pisusuwe

LG unveils 29inch 219 monitor

first_img21:9 aspect ratio displays aren’t a new idea. Philips grabbed our attention back in 2009 when it launched a 21:9 HDTV, allowing you to watch your movies without borders. Then Vizio more recently announced it was embracing 21:9 for a range of TVs. Now it seems LG is bringing the same option to monitors.IFA 2012 kicks off later this week, and LG is using the event to show off two new premium IPS monitors. The first is the more conventional EA83, which is a 27-inch 16:9 display capable of a 2560 x 1440 resolution. Brightness is rated at 350 nits and response time is 5ms. LG is positioning the EA83 at power user consumers who need a lot of screen real estate and want to take advantage of that high resolution.The EA93 is the more interesting new entrant on to the monitor market, though. It’s a 29-inch panel with a 21:9 aspect ratio and resolution of 2560 x 1080. Brightness is rated at 300 nits and response time matches the EA83 at 5ms.LG says the EA93 is perfect for watching movies, but also for multitasking. The display is equipped with a screen splitting feature allowing it to be split into four segments to help organize your desktop.Personally, the EA83 looks to be the better of the two monitors if you don’t just use your PC for entertainment. That higher resolution and 16:9 aspect ratio works better for actual work, and hooking up two EA83s would make for a great setup if your graphics card can handle it.There’s no pricing information coming out of LG yet, but I don’t expect either monitor to be cheap. We shouldn’t have long to wait to find out final pricing, though. LG is planning a November release for both displays.Read more at LGlast_img read more

Read More

pisusuwe

Donation illuminates Alaska Native civil rights history

first_imgA recently donated collection of letters, essays, photographs and newspapers is shedding new light on the history of Alaska Native civil rights. One particularly controversial figure in the documents spent half a century advancing Alaska Native causes. He’s the namesake of Sealaska Heritage Institute’s new archives.Download AudioRosita Worl marvels over the donated collection in the William Paul Archives. (Photo by Elizabeth Jenkins/KTOO)“Here look at this: ANB people and traditional leaders. Ooo, I see my grandmother over there,” says SHI president Rosita Worl, She stands over a table of photographs of ancestors in regalia, Alaska Native Brotherhood meetings and less formal gatherings–relaxing around a table for dinner.“Cyrus Peck, Walter Soboleff. Here, that looks like Betsy Sophia.”The collection spans from the 1940s all the way to the 70s and was donated by brothers Ray and Cy Peck. The sons of Cyrus Peck Senior, who published the newspaper Voice of the Brotherhood.“Remember at this point and time we don’t have social media. We don’t even have TV. So the newspaper print is really important in terms of educating people about what was going on, coalescing people into political action.”Some of the photos were taken by Ray Peck. He remembers his father giving him a Polaroid camera when he was a teen and asking him to take pictures of the Alaska Native Brotherhood.“I used a Polaroid ’cause I could always tell and take another one right away. And they were black and white and they’d turn out perfectly for printing.”He says, at the time, he didn’t know he was capturing history. He would paste the photos on the freshly typed sheets from his dad’s typewriter and run them off to the printer at The Juneau Empire. After his dad passed away, he found boxes full of old newspapers and letters and thought…“Get ’em to a safe place instead of sitting in my house. And maybe people will get some information out of it.”Peck turned over the boxes to the William Paul Archives in the Walter Soboleff Building. He donated correspondence between his dad and Paul, who was an important but sometimes divisive leader in the brotherhood.“He had progressive ideas and he stepped on a lot of feet.”A letter dated March, 1 1949, from William Paul to Cyrus Peck Senior. (Photo by Elizabeth Jenkins/KTOO)You might not know attorney William Paul, by name. But you’re probably familiar with some of stuff he did: fighting for voting rights and the Alaska Native Claims Settlement Act.“He is the father of land claims. He really brought it to the forefront.”A Tlingit, Paul was the first Native elected to office when Alaska was a territory, and he was a leader in the Alaska Native Brotherhood. The organization formed in 1912 to combat segregation and racism. Paul was later instrumental in this.Worl knew him. She says he was a mentor growing up but recognizes he was also controversial.“Both within the Native community and the non-Native community. The non-Native community thought he was arrogant and brash.”She even calls some of his political activity unethical.In the 1920s, a historian says Paul became politically powerful by helping Alaska Natives vote — for exactly whom he wanted them to vote for. He prepared cardboard cutouts that covered ballots and left only his picks. With the cutouts, literacy wasn’t a barrier.He was also accused of taking campaign donations from salmon canneries, an industry whose unsustainable practices he vilified. Worl says tactics like this might be part of the reason he’s not more well known. Still, he’s an important figure.“Here you have an indigenous population taking the laws of the oppressor to protect themselves,” she says. “I should begin, the storm has broken. Roy Peratrovich is angry…”Rosita Worl reads a letter to Cyrus Peck Senior from Paul. It’s about segregation in the schools, dated March 1, 1949.“From there we went on and considered the entire problem of Indian education and what we consider to be the policy of the Indian office…”With the newly acquired materials, she hopes scholars and individuals can piece together a complex narrative of Alaska Native Civil Rights.“More often when you read histories, Native people are seen as passive recipients of Western culture, they aren’t viewed as the active individuals in pursuing these rights. With these documents, we’re able to demonstrate that. We’re able to portray history from our perspective.”Worl encourages the public to donate items as they find them. Ray Peck says he may have a few more boxes to rummage through back home.William L. Paul Sr. (left) with Walter Soboleff, M. Quinto and Ray Peck on a boat. (Photo courtesy of Sealaska Heritage Institute)last_img read more

Read More

pisusuwe

Vodafone Idea posts quarterly loss to raise 35 billion

first_imgReuters/file photoIndia’s telecom operator Vodafone Idea Ltd reported a second-quarter loss on Wednesday and said it is looking to raise about Rs 250 billion ($3.5 billion).The company said its board is evaluating ways to raise the capital in which promoters Vodafone Group will chip in Rs 110 billion and Aditya Birla Group Rs 72.5 billion.This is the first quarterly result since Vodafone Plc merged its Indian operations with Idea Cellular in August, creating the country’s largest telecom operator by subscribers and revenue.The company’s after-tax loss was Rs 49.74 billion in the second quarter ended September 30, which included a one-time charge of Rs 5.66 billion, mainly due to integration and merger-related costs.Revenue from operations was Rs 76.64 billion.The results included numbers for Idea Cellular up to August 30 and Vodafone Idea from August 31 to September 30 and were not comparable to earlier periods, the company said in a statement.India’s telecom industry has been battered by a price war, sparked by the entry of billionaire Mukesh Ambani-owned Reliance Jio Infocomm Ltd. Rival Bharti Airtel Ltd’s second-quarter profit plunged over 65 percent.last_img read more

Read More

pisusuwe

Student killed in Gazipur road crash van torched

first_imgAngry locals torched a covered van after a college student was crushed to death at Brobari area in Gazipur on Saturday. Photo: Prothom Alo Amid the ongoing student demonstrations demanding safe roads, another college girl was killed after being hit by a covered van at Barabari on Dhaka-Mymensingh Highway on Saturday which was later torched by an angry mob, reports UNB.The deceased was identified as Farzana Alam Mim, 19, a student of Safiuddin SarkerAcademyand College (SSAC) in Tongi.Locals said the Mymensingh-bound covered van hit the girl while she was crossing the road around 11 am, leaving her seriously injured.Doctors declared Farzana dead when she was taken to Tongi Government Hospital, said officer-in-charge of Tongi Police Station Kamal Hossain.Meanwhile, angry mob managed to halt the covered van along with its driver and set the vehicle on fire while the driver was given a good beating, witnesses said.The enraged people also blocked the Dhaka-Mymensingh Highway in College Gate area of Tongi.Firefighters doused the flame, he said.last_img read more

Read More

pisusuwe

Saddam hanged mystery lives

first_imgSaddam Hussein. Photo: CollectedIn his native village of Al-Awjah, the mausoleum of Iraq’s executed dictator Saddam Hussein has been reduced to broken concrete and tangled barbed wire, showing no trace of his remains.The man who ruled Iraq with an iron fist for a quarter of a century was hanged at dawn on 30 December, delighting many of the country’s long-oppressed majority Shiites and symbolising the humiliation of Saddam’s fellow Sunnis.US president George W Bush then personally authorised the immediate transfer of the dictator’s body on an American military helicopter from Baghdad to the northern city of Tikrit, near Al-Awjah.But today, mystery and doubt hang over the final resting place of a man whose very name for decades filled Iraqis with dread.Is his body still in Al-Awjah or was it exhumed, and, if so, where to?Sheikh Manaf Ali al-Nida, a leader of the Albu Nasser tribe to which Saddam’s clan belongs, has held on to a letter his family signed when they received the body, agreeing that Saddam be buried without delay.Saddam, 69, was laid to rest before dawn in the mausoleum he had commissioned years earlier.The place turned into a richly-adorned pilgrimage site to which supporters and groups of local school children would flock on his birthday on 28 April.Today, visitors need special authorisation to enter, the site lies in ruins, and Sheikh Nida has been forced to leave the village and seek refuge in Iraqi Kurdistan.Since the 2003 US-led invasion, his tribe has been “oppressed because we were close” to Saddam, he said, wearing the traditional robes and keffiyeh headscarf of Iraq’s tribes.“Is it normal that we should pay such a heavy price for generation after generation just because we’re from the same family?”Blown upAt Saddam’s grave, the mainly Shiite paramilitaries of the Hashed al-Shaabi coalition, tasked with security in the area, say the mausoleum was destroyed in an Iraqi air strike after the Islamic State jihadist group posted snipers on its roof.Sheikh Nida was not there to witness the blast-but he is convinced that Saddam’s tomb was “opened and blown up”.Jaafar al-Gharawi, the Hashed’s security chief, insisted: “The body is still there.”One of his fighters, however, speculated that Saddam’s exiled daughter Hala had flown in on a private plane and whisked her father’s body away to Jordan.“Impossible!” said a university professor and longtime student of the Saddam era, who declined to give his name.“Hala has never come back to Iraq,” he said. “(The body) could have been taken to a secret place… nobody knows who moved it or where.”If that was the case, Saddam’s family would have closely guarded the secret of the location, he added.Saddam’s tomb could have suffered the same fate as that of his father, at the entrance to the village, which was unceremoniously blown up.But some, including Baghdad resident Abu Samer, believe the Iraqi strongman is still out there.“Saddam’s not dead,” he said. “It was one of his doubles who was hanged.”last_img read more

Read More

pisusuwe

Wildlife Refuge Expansion Will Provide Flooding Defense Conservationists Say

first_imgU.S. Fish and Wildlife Service Southwest RegionThe McFaddin National Wildlife Refuge is seen submerged by Hurricane Harvey’s floodwaters in September 2017.More than 8,100 acres of wetlands are being added to the McFaddin National Wildlife refuge near Beaumont, Texas. Conservationists said the expansion of the refuge will lead to a more storm-resilient Gulf Coast.The wetlands, once part of the Sabine Ranch, are a natural buffer against hurricanes and storm surge. They’re also a winter home for waterfowl and other birds, and the non-profit Conservation Fund said these lands absorbed an estimated 1.5 billion gallons of rain during Harvey.“If that property were to have been converted to something else or not in wetlands, that water would have been additional water that would’ve ended up in adjacent cities like Port Arthur or Beaumont,” said Julie Shackelford, Texas Programs Director for the Fund. The group is hoping to raise enough money to add another 4,000 or so acres to the refuge in the future. Sharelast_img read more

Read More

pisusuwe

Headup display wins top navigation prize in Munich

first_img Citation: Head-up display wins top navigation prize in Munich (2011, October 27) retrieved 18 August 2019 from https://phys.org/news/2011-10-head-up-prize-munich.html The display carries virtual road signs to warn of conditions ahead. Attractions such as service stations and hotels are identified by virtual signs floating above them.The images appear to be outside the windshield from a distance of two meters to infinity. They are described as volumetric (“truly 3-D”) and they are capable of refreshing at a rate of 60 frames per second. The designers had pilot-level situational awareness in mind when working on the display design A no-need-to-think-about-it, realtime stream of information was the goal, yet it had to be cost-engineered for the car market, where drivers could see moving, not fixed, images, constantly refreshing. The system would have to be small, light and inexpensive enough to make its way into all cars. © 2011 PhysOrg.com “The world’s foremost automotive display researchers had essentially given up trying to push the size and cost of 3-D conformal HUDs down far enough to enter the automotive supply chain. We did not,” says a company spokesman.According to Making Virtual Solid, the technology requires a small hardware package, and can operate in bright sunlight,According to Inside GNSS, MVS-California has designs and manufacturing plans and is seeking ecosystem partners to build on its system’s potential use in automotive, trucking, marine, and avionics markets. Explore further This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.center_img More information: galileo-masters.eu/index.php?k … anzeige=press47.htmlwww.mvs.net/technology.html#true3d The HUD system is described as an augmented reality navigational display engine designed to provide non-distracting, translucent location guidance. Images are projected directly onto the car’s windshield. “Non-distracting” and “translucent” are the strong attributes, as the company touts its system’s use of 3-D technology to beam the display across the entire front window of the car. With a less robust readout, that would be no better than a road map over glass, but “True3D” creates a readout that blends into what the driver sees on the road in front of the vehicle. A luminous, three-dimensional landscape over the real world delivers information that the driver needs without the driver having to look elsewhere than on the road, and it is less distracting too than a small rectangle nearby the windscreen wipers. Augmented reality windshield from GM to show drivers potential hazards (w/ Video) (PhysOrg.com) — A navigation system making use of something called “True3D” technology has won the top prize in this year’s European Satellite Navigation Competition in Munich, Germany. The ESNC is an international innovation contest that awards the best ideas for applications in satellite navigation. There were 401 proposals from almost 50 countries. The winner was selected by an international panel of experts. The company that designed the system, Making Virtual Solid (MVS-California), entered its True3D Head Up Display & Navigation System, which won the Galileo Master 2011 grand prize of 20,000 Euros.last_img read more

Read More

pisusuwe

KVIC participates in

first_imgOne can visit and buy goodies at attractive prices as Khadi Village Industries Commission (KVIC) under the Ministry of Micro, Small and Medium Enterprises, Government of India is participating in the 35th edition of India International Trade Fair which is organised by  India Trade Promotion Organization, Government of India.The fair which began on November 14 has the theme ‘Make In India’ which was finalised by India Trade Promotion Organization.  Also Read – ‘Playing Jojo was emotionally exhausting’This is the biggest ever Pavilion inside and outside of the Hall No: 15  admeasuring 2834 sq meters. Around 200 participants comprising Khadi institutions and PMEGP units across the country shall put up their most exquisite products in the pavilion in a grand manner. In addition to Khadi institutions and PMEGP units, first time, 10 nationalized banks have also associated with KVIC as sponsor and put-up their stalls inside the pavilion. A theme pavilion in tune with the theme of IITF-2015 is also being setup featuring the vision document of  KVIC.  Also Read – Leslie doing new comedy special with NetflixFirst time the technical demonstration of spinning and weaving of khadi and selfie with Gandhiji and charkha is also arranged inside the pavilion to attract youth and connect with Khadi.Kalraj Mishra, Union Minister for MSME, Government of India inaugurated KVIC Pavilion with lighting the traditional lamp and Giriraj Singh, Minister of State for MSME along with Dr Anup K Pujari, Secretary, MSME, government of India was guest of Honour. On the inaugural function Vinai Kumar Saxena, Chairman, KVIC, Jai Prakash Tomar, Member, KVIC, LC Goel, Chairman & Managing Director ITPO, SN Tripathi, Development Commissioner-MSME, BH Anil Kumar, Joint Secretary, MSME, Arun Kumar Jha, Chief Executive Officer, KVIC were also present. Arun Kumar Jha, Chief Executive Officer, KVIC  said that almost every variety of khadi produced across the country such as moonga and endi silk , peshmina shawls, kosa silk, muslin khadi, wide range of sarees from West Bengal, Orissa, Karnataka,  Maharastra, Tamil  Nadu,  blankets,  jackets,   phirans, woolen caps and others are displayed. A very wide range of designer readymade designed by young entrepreneurs under the PMEGP will also be displayed to attract youths.Besides Khadi, the wide range of REGP/PMEGP products are also displayed, which includes herbal cosmetic, shampoos, soaps, cane and bamboo products of North East, wood carving furniture of Saharanpur, artificial jewelry, Punjabi Jutti, Achar, Anwala Murabba, Bikanery Namkeens, pickles, leather products, lamps, miniatures, different varieties of honey, papier machie, ceramic/terracotta art wares, computers, tablets, frame painting, handmade paper products, incensed sticks, perfumes, sandal wood oil and products, bell metals etc.last_img read more

Read More

pisusuwe

Signing On Made Simple

first_img Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global 2 min read If you have more user names and passwords than you can possibly remember, you will appreciate the appeal of the OpenID initiative. OpenID lets users access multiple sites from multiple providers with a single ID. Some of the major players that support issuing or accepting OpenIDs include AOL, Flickr, WordPress and Yahoo. Growing businesses are in a good position to become early adopters of OpenID by offering it as a login option for their site visitors. The open standard has seen steady gains in adoption and makes sense particularly for Web 2.0 startups that want to show support for the movement and provide convenience for their customers.69%of small-business owners feel held back by the cost of professional-grade software when it comes to designing and creating their own marketing materials. (Source: Serif)OpenID-enabled websites fall into three groups: OpenID providers; relying parties, which are able to accept those OpenIDs; and “full implementation websites,” which both provide OpenIDs and accept them. Smaller web businesses tend to fall into the second group. Adapting your existing site to accept OpenIDs can be a job for your web developer, or you can look to a solution like that offered by OpenID services provider JanRain. Its myOpenID Affiliate Program and OpenID Website Enablement are two options that can get a website up and running quickly with OpenID. Market Research Firm In-Stat forecasts the global mobile gaming market will exceed $6.8 billion by 2013. Register Now » This story appears in the January 2009 issue of Entrepreneur. Subscribe » December 18, 2008 Growing a business sometimes requires thinking outside the box.last_img read more

Read More

pisusuwe

Firefox WebExtensions may be used to identify you on the Internet

first_imgFirefox WebExtensions may be used to identify you on the Internet by Martin Brinkmann on August 30, 2017 in Firefox – Last Update: August 30, 2017 – 63 commentsAll modern web browsers leak extension information to sites if the sites run scripts to pull the information. We talked about the findings of a research term that published its findings recently in a paper.Unless scripts are blocked, sites may run scripts that check the response time of the browser as it is different when checks are made for fake extensions and fake resources, and existing extensions and fake resources.Firefox’s situation is special, as it supports the legacy add-on system and the new WebExtensions system. The researcher tested the browser’s legacy add-on system only, but suggested that Firefox’s new system would also be vulnerable.An anonymous reader pointed out that Firefox’s WebExtensions system uses random IDs, and that this meant that the method to enumerate extensions would not work in that case (unlike in Chrome and other Chromium based browsers).While that is correct, Mozilla’s implementation introduces a new issue that allows sites to identify users if WebExtensions expose content to sites as the random IDs are permanent.”… in particular, they [Mozilla] changed the initial scheme (moz-extension://[extID]/[path]) to moz-extension://[random-UUID]/[path]. Unfortunately, while this change makes indeed more difficult to enumerate user extensions, it introduces a far more dangerous problem. In fact, the random-UUID token can now be used to precisely fingerprint users if it is leaked by an extensions. A website can retrieve this UUID and use it to uniquely identify the user, as once it is generated the random ID never changes. We reported this design-related bug to Firefox developers as well.”If a site manages to get hold of the ID, it may track the Firefox installation as that ID never changes.This is not just theoretical either; Earthling, one of the maintainers of the Ghacks Firefox user.js file, has created a proof of concept that highlights a leak in Firefox’s native Screenshot tool.While this particular example requires that users click on the screenshot button in the Firefox interface to make the unique ID available to the site, other extensions may expose content without user interaction.Apple’s Safari uses a random UUID system as well, and the researchers discovered that they could enumerate about 40% of all extensions as its implementation is flawed.If the WebExtension exposes content to sites because they have implementation flaws, sites may fingerprint users based on the unique ID that gets exposed in the process.Closing WordsMozilla needs to rework the implementation to protect users of the browser from this. Even if you don’t use WebExtensions at all, you may be vulnerable to this as Firefox ships with several system add-ons that may expose the ID to sites. (Thanks Pants and Earthling)SummaryArticle NameFirefox WebExtensions may identify you on the InternetDescriptionMozilla Firefox WebExtensions may expose a random but unique ID to sites which websites and services may use to fingerprint and track users.Author Martin BrinkmannPublisher Ghacks Technology NewsLogo Advertisementlast_img read more

Read More

pisusuwe

Design a RESTful web API with Java Tutorial

first_imgIn today’s tutorial, you will learn to design REST services. We will break down the key design considerations you need to make when building RESTful web APIs. In particular, we will focus on the core elements of the REST architecture style: Resources and their identifiers Interaction semantics for RESTful APIs (HTTP methods) Representation of resources Hypermedia controls This article is an excerpt from a book written by Balachandar Bogunuva Mohanram, titled RESTful Java Web Services, Second Edition. This book will help you build robust, scalable and secure RESTful web services, making use of the JAX-RS and Jersey framework extensions. Let’s start by discussing the guidelines for identifying resources in a problem domain. Richardson Maturity Model—Leonardo Richardson has developed a model to help with assessing the compliance of a service to REST architecture style. The model defines four levels of maturity, starting from level-0 to level-3 as the highest maturity level. The maturity levels are decided considering the aforementioned principle elements of the REST architecture. Identifying resources in the problem domain The basic steps that yoneed to take while building a RESTful web API for a specific problem domain are: Identify all possible objects in the problem domain. This can be done by identifying all the key nouns in the problem domain. For example, if you are building an application to manage employees in a department, the obvious nouns are department and employee. The next step is to identify the objects that can be manipulated using CRUD operations. These objects can be classified as resources. Note that you should be careful while choosing resources. Based on the usage pattern, you can classify resources as top-level and nested resources (which are the children of a top-level resource). Also, there is no need to expose all resources for use by the client; expose only those resources that are required for implementing the business use case. Transforming operations to HTTP methods Once you have identified all resources, as the next step, you may want to map the operations defined on the resources to the appropriate HTTP methods. The most commonly used HTTP methods (verbs) in RESTful web APIs are POST, GET, PUT, and DELETE. Note that there is no one-to-one mapping between the CRUD operations defined on the resources and the HTTP methods. Understanding of idempotent and safe operation concepts will help with using the correct HTTP method. An operation is called idempotent if multiple identical requests produce the same result. Similarly, an idempotent RESTful web API will always produce the same result on the server irrespective of how many times the request is executed with the same parameters; however, the response may change between requests. An operation is called safe if it does not modify the state of the resources. Check out the following table: MethodIdempotentSafeGETYESYESOPTIONSYESYESHEADYESYESPOSTNONOPATCHNONOPUTYESNODELETEYESNO Here are some tips for identifying the most appropriate HTTP method for the operations that you want to perform on the resources: GET: You can use this method for reading a representation of a resource from the server. According to the HTTP specification, GET is a safe operation, which means that it is only intended for retrieving data, not for making any state changes. As this is an idempotent operation, multiple identical GET requests will behave in the same manner. A GET method can return the 200 OK HTTP response code on the successful retrieval of resources. If there is any error, it can return an appropriate status code such as 404 NOT FOUND or 400 BAD REQUEST. DELETE: You can use this method for deleting resources. On successful deletion, DELETE can return the 200 OK status code. According to the HTTP specification, DELETE is an idempotent operation. Note that when you call DELETE on the same resource for the second time, the server may return the 404 NOT FOUND status code since it was already deleted, which is different from the response for the first request. The change in response for the second call is perfectly valid here. However, multiple DELETE calls on the same resource produce the same result (state) on the server. PUT: According to the HTTP specification, this method is idempotent. When a client invokes the PUT method on a resource, the resource available at the given URL is completely replaced with the resource representation sent by the client. When a client uses the PUT request on a resource, it has to send all the available properties of the resource to the server, not just the partial data that was modified within the request. You can use PUT to create or update a resource if all attributes of the resource are available with the client. This makes sure that the server state does not change with multiple PUT requests. On the other hand, if you send partial resource content in a PUT request multiple times, there is a chance that some other clients might have updated some attributes that are not present in your request. In such cases, the server cannot guarantee that the state of the resource on the server will remain identical when the same request is repeated, which breaks the idempotency rule. POST: This method is not idempotent. This method enables you to use the POST method to create or update resources when you do not know all the available attributes of a resource. For example, consider a scenario where the identifier field for an entity resource is generated at the server when the entity is persisted in the data store. You can use the POST method for creating such resources as the client does not have an identifier attribute while issuing the request. Here is a simplified example that illustrates this scenario. In this example, the employeeID attribute is generated on the server: POST hrapp/api/employees HTTP/1.1 Host: packtpub.com {employee entity resource in JSON} On the successful creation of a resource, it is recommended to return the status of 201 Created and the location of the newly created resource. This allows the client to access the newly created resource later (with server-generated attributes). The sample response for the preceding example will look as follows: 201 Created Location: hrapp/api/employees/1001 Best practice Use caching only for idempotent and safe HTTP methods, as others have an impact on the state of the resources. Understanding the difference between PUT and POST A common question that you will encounter while designing a RESTful web API is when you should use the PUT and POST methods? Here’s the simplified answer: You can use PUT for creating or updating a resource, when the client has the full resource content available. In this case, all values are with the client and the server does not generate a value for any of the fields. You will use POST for creating or updating a resource if the client has only partial resource content available. Note that you are losing the idempotency support with POST. An idempotent method means that you can call the same API multiple times without changing the state. This is not true for the POST method; each POST method call may result in a server state change. PUT is idempotent, and POST is not. If you have strong customer demands, you can support both methods and let the client choose the suitable one on the basis of the use case. Naming RESTful web resources Resources are a fundamental concept in RESTful web services. A resource represents an entity that is accessible via the URI that you provide. The URI, which refers to a resource (which is known as a RESTful web API), should have a logically meaningful name. Having meaningful names improves the intuitiveness of the APIs and, thereby, their usability. Some of the widely followed recommendations for naming resources are shown here: It is recommended you use nouns to name both resources and path segments that will appear in the resource URI. You should avoid using verbs for naming resources and resource path segments. Using nouns to name a resource improves the readability of the corresponding RESTful web API, particularly when you are planning to release the API over the internet for the general public. You should always use plural nouns to refer to a collection of resources. Make sure that you are not mixing up singular and plural nouns while forming the REST URIs. For instance, to get all departments, the resource URI must look like /departments. If you want to read a specific department from the collection, the URI becomes /departments/{id}. Following the convention, the URI for reading the details of the HR department identified by id=10 should look like /departments/10. The following table illustrates how you can map the HTTP methods (verbs) to the operations defined for the departments’ resources: ResourceGETPOSTPUTDELETE/departmentsGet all departmentsCreate a new departmentBulk update on departmentsDelete all departments/departments/10Get the HR department with id=10Not allowedUpdate the HR departmentDelete the HR department While naming resources, use specific names over generic names. For instance, to read all programmers’ details of a software firm, it is preferable to have a resource URI of the form /programmers (which tells about the type of resource), over the much generic form /employees. This improves the intuitiveness of the APIs by clearly communicating the type of resources that it deals with. Keep the resource names that appear in the URI in lowercase to improve the readability of the resulting resource URI. Resource names may include hyphens; avoid using underscores and other punctuation. If the entity resource is represented in the JSON format, field names used in the resource must conform to the following guidelines: Use meaningful names for the properties Follow the camel case naming convention: The first letter of the name is in lowercase, for example, departmentName The first character must be a letter, an underscore (_), or a dollar sign ($), and the subsequent characters can be letters, digits, underscores, and/or dollar signs Avoid using the reserved JavaScript keywords If a resource is related to another resource(s), use a subresource to refer to the child resource. You can use the path parameter in the URI to connect a subresource to its base resource. For instance, the resource URI path to get all employees belonging to the HR department (with id=10) will look like /departments/10/employees. To get the details of employee with id=200 in the HR department, you can use the following URI: /departments/10/employees/200. The resource path URI may contain plural nouns representing a collection of resources, followed by a singular resource identifier to return a specific resource item from the collection. This pattern can repeat in the URI, allowing you to drill down a collection for reading a specific item. For instance, the following URI represents an employee resource identified by id=200 within the HR department: /departments/hr/employees/200. Although the HTTP protocol does not place any limit on the length of the resource URI, it is recommended not to exceed 2,000 characters because of the restriction set by many popular browsers. Best practice: Avoid using actions or verbs in the URI as it refers to a resource. Using HATEOAS in response representation Hypertext as the Engine of Application State (HATEOAS) refers to the use of hypermedia links in the resource representations. This architectural style lets the clients dynamically navigate to the desired resource by traversing the hypermedia links present in the response body. There is no universally accepted single format for representing links between two resources in JSON. Hypertext Application Language The Hypertext API Language (HAL) is a promising proposal that sets the conventions for expressing hypermedia controls (such as links) with JSON or XML. Currently, this proposal is in the draft stage. It mainly describes two concepts for linking resources: Embedded resources: This concept provides a way to embed another resource within the current one. In the JSON format, you will use the _embedded attribute to indicate the embedded resource. Links: This concept provides links to associated resources. In the JSON format, you will use the _links attribute to link resources. Here is the link to this proposal: http://tools.ietf.org/html/draft-kelly-json-hal-06. It defines the following properties for each resource link: href: This property indicates the URI to the target resource representation template: This property would be true if the URI value for href has any PATH variable inside it (template) title: This property is used for labeling the URI hreflang: This property specifies the language for the target resource title: This property is used for documentation purposes name: This property is used for uniquely identifying a link The following example demonstrates how you can use the HAL format for describing the department resource containing hyperlinks to the associated employee resources. This example uses the JSON HAL for representing resources, which is represented using the application/hal+json media type: GET /departments/10 HTTP/1.1 Host: packtpub.com Accept: application/hal+json } }, “departmentId”: 10, “departmentName”: “Administration” } To summarize, we discussed the details of designing RESTful web APIs including identifying the resources, using HTTP methods, and naming the web resources. Additionally we got introduced to Hypertext application language. Read More: Getting started with Django RESTful Web Services Testing RESTful Web Services with Postman Documenting RESTful Java web services using Swagger HTTP/1.1 200 OK Content-Type: application/hal+json center_img { “_links”: { “self”: { “href”: “/departments/10” }, “employees”: { “href”: “/departments/10/employees” }, “employee”: { “href”: “/employees/{id}”, “templated”: true } }, “_embedded”: { “manager”: { “_links”: { “self”: { “href”: “/employees/1700” } }, “firstName”: “Chinmay”, “lastName”: “Jobinesh”, “employeeId”: “1700”, last_img read more

Read More