The regulatory hurdle, however, to go with all this good news is aerial traffic. In Europe, he said that his team needs special permission since kites fly at heights that could interfere with flight routes. The University of Delft meanwhile is looking to Africa, and its rural electricity needs. Whether from the Netherlands or elsewhere, wind technologies other than turbines are likely to stay in the news, According to a July blog posting from the American Association of Petroleum Geologists, numerous private companies and government labs are working on airborne wind technologies. Makani Power, acquired by Google, has attracted attention in this regard. The company site says the Makani Airborne Wind Turbine is a tethered wing that generates power by flying in large circles where the wind is stronger and more consistent. It eliminates 90 percent of the material used in conventional wind turbines and can access winds at higher altitudes and above deep waters offshore. The company goal is “utility-scale deployment of airborne turbines in offshore wind farms.” As for cost, he said in The Guardian that wind-generated energy goes at eight cents per kilowatt hour but his team’s projections for large-scale production, with kites of several hundred square meters, would set the price at around two cents. (Phys.org) —The word “kite” at the Delft University of Technology hardly means summertime fun and recreation. Rather, scientists see “kite” as an important airborne wind technology, with advantages lacking in wind turbines. The university’s kite team are encouraged by recent tests in a field near the aerospace engineering department at the university. That is where Roland Schmehl, associate professor, who has a background in computational fluid dynamics, continues to explore kite power. In terms of project scope, such kite trials are dwarfed by impressive wind turbines, but that is just the point. Schmehl believes that conventional turbines only scratch the layer of what can be available in wind as an energy resource, if kite power investigations lead to larger-scale developments. A kite can fly higher and may harness steady winds beyond the limit of conventional turbines. This is how the team describes the process:”The system is operated in periodic pumping cycles, alternating between reel-out and reel-in of the tether. During reel-out, the kite is flying figure-eight maneuvers at high speed (70 to 90 km/h). This creates a high traction force (3.1 kN at 7 m/s wind speed) which is converted into electricity by the drum and the connected 20 kW generator. When reaching the maximum tether length, the kite is de-powered by releasing the rear (steering) lines such that the whole wing rotates and aligns with the apparent wind. Using the drum/generator module as a winch, the kite is now pulled back to the initial position to start the next pumping cycle. De-powering reduces the traction force during reel-in by 80 percent and for this reason the energy consumed during reel-in is only a fraction of the energy generated during reel-out.” Credit: TU Delft Citation: Delft professor puts kites high on list for renewable energy (2013, July 13) retrieved 18 August 2019 from https://phys.org/news/2013-07-delft-professor-kites-high-renewable.html Explore further This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. More information: kitepowerafrica.weblog.tudelft.nl/www.kitepower.eu/home.htmlvia Guardian © 2013 Phys.org Energy from the windy heights “The first time I came in contact with this technology in 2009 when I took the position at this university, it was amazing for me to see the prototype system that was built by this group, to see how this 25 square meter kite in action on the airfield would fly 70 to 90 kilometers per hour,” he said. Seeing the force being generated was for him “an amazing experience.” He was convinced then as now that kite technology can make a difference in renewable energy.Wind turbines are not an entirely stable path, whereas intermittent power is not a problem with kites: the higher you go, the more constantly the wind blows. Added advantages to kites are that they cause less environmental impact and with lower costs.A 25 square meter sail can produce enough energy to cover the needs of 40 households, he said, in a report this week in The Guardian. The technology involves the device tethered to a generator unit on the ground. The key in getting it all to work is the automatic control and synchronization of the drum/generator module and the flight dynamics of the kite. There is a traction and a retraction phase, a reel-out and reel-in of the tether. Once the cable has completely unwound it is reeled in again. “We rotate the kite into the wind as we pull it back, so essentially the airstream does part of the work for us,” he added. They need less energy to reel in the cable.
Heat maps for the six selected temporal units, using an equal-area grid of 100-km cell size in Behrmann projection. Colors are based on the ordinary Kriging algorithm with 100-km cell size and 200-km interpolation radius performed on grid-specific species richness. Coloration is equal in all maps, scaled to the maximum grid richness of 218 species (Late Miocene, Lake Pannon). Credit: PNAS 2015 ; published ahead of print August 24, 2015, doi:10.1073/pnas.1503992112 Explore further Journal information: Proceedings of the National Academy of Sciences Land animals proliferate faster than aquatic counterparts The researchers, from the Natural History Museum of Vienna, offer examples of such geodynamics-driven evolution as the development of the Indian monsoon, which was triggered by the collision of the Indian subcontinent with Eurasia causing the uplift of the Himalayas. This paleogeographic-climatic event over 20 million years ago now profoundly affects half of the world’s population. The paper regards hotspots as areas of species richness and their evolution over geologic time. The initiation and demise of continental basins leads to the development and persistence of freshwater and brackish environments, and strongly influences the dispersal, radiation and evolution of marine and nonmarine life. The paper attempts to track the geologic, climatic and physiographic parameters through an examination and regression analysis of marine species diversity in the fossil record.Early Miocene: Around 21 million years ago, there were only three known, fairly small hotspots of species richness. The authors find an increase in diversity that coincides with the rising temperatures after the comparatively cool Oligocene.Middle Miocene: During this period, species richness in Europe increased to a maximum—this occurred at what climatologists refer to as the Middle Miocene Climate Optimum. The changes in speciation were driven by the rise and dissipation of freshwater lake basins; although most declined, a new hotspot on the Balkan Peninsula resulted from the folding of the Dinaride Mountains, accommodating new lakes and species. After the decline, species richness rebounded about 5 million years ago.Late Miocene: All previous European hotspots disappeared, and a very large new one emerged in the Pannonian Basin. A peak in diversity was followed by another major Miocene turnover, with a rise in rates of extinction.Pliocene: The total number of species reached a temporary maximum; this is followed by the extinction of more than 300 species that corresponded with a mid-Pliocene warm period.Pleistocene: Global and regional cooling during this period resulted in a decline in species richness. A number of major long-lived lakes declined, along with the maximum number of species per lake.Recent: The Ice Ages brought glaciation of much of Northern Europe and the Alpine region, and many major lakes and their faunas vanished. Most of the existing lakes emerged after the Last Glacial Maximum, along with their faunas.The researchers demonstrate that the shifts of species richness hotspots throughout time are linked to the development of geologic basins that accommodate long-lived freshwater and brackish environments. They write that “the availability of a persisting, stable geologic basin providing continual freshwater or brackish environments is a prerequisite for hotspot evolution for aquatic gastropods… The rise and demise of species richness hotspots throughout time is tightly related to regional and tectonic phases.” © 2015 Phys.org (Phys.org)—Biology often uses the word “hotspot” to characterize a region that gives rise to an abundance of species over a particular time period. A new paper in the Proceedings of the National Academy of Sciences suggests that the development of continental aquatic species hotspots is tightly linked to the climatic and geodynamic history of the European continent. More information: “Tectonics, climate, and the rise and demise of continental aquatic species richness hotspots.” PNAS 2015 ; published ahead of print August 24, 2015, DOI: 10.1073/pnas.1503992112AbstractContinental aquatic species richness hotspots are unevenly distributed across the planet. In present-day Europe, only two centers of biodiversity exist (Lake Ohrid on the Balkans and the Caspian Sea). During the Neogene, a wide variety of hotspots developed in a series of long-lived lakes. The mechanisms underlying the presence of richness hotspots in different geological periods have not been properly examined thus far. Based on Miocene to Recent gastropod distributions, we show that the existence and evolution of such hotspots in inland-water systems are tightly linked to the geodynamic history of the European continent. Both past and present hotspots are related to the formation and persistence of long-lived lake systems in geological basins or to isolation of existing inland basins and embayments from the marine realm. The faunal evolution within hotspots highly depends on warm climates and surface area. During the Quaternary icehouse climate and extensive glaciations, limnic biodiversity sustained a severe decline across the continent and most former hotspots disappeared. The Recent gastropod distribution is mainly a geologically young pattern formed after the Last Glacial Maximum (19 ky) and subsequent formation of postglacial lakes. The major hotspots today are related to long-lived lakes in preglacially formed, permanently subsiding geological basins. Citation: Analysis finds species diversity driven by tectonics and climate (2015, September 1) retrieved 18 August 2019 from https://phys.org/news/2015-09-analysis-species-diversity-driven-tectonics.html This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.
Two possible explanations for the quantum measurement process: (a) A binary measurement that generates the final outcome in two steps (first ruling out one of the three outcomes, then selecting between the two remaining outcomes), or (b) a ternary measurement that selects among all three outcomes at once. Credit: Hu et al. ©2018 American Physical Society Journal information: Physical Review Letters Explore further Illustration of the experimental setup for demonstrating ternary correlations. Credit: Hu et al. ©2018 American Physical Society Citation: Stronger-than-binary correlations experimentally demonstrated for the first time (2018, May 21) retrieved 18 August 2019 from https://phys.org/news/2018-05-stronger-than-binary-experimentally.html If the quantum measurement process were binary, then measurements could be described as a two-step process in which first one of the three possible measurement outcomes is ruled out by a classical mechanism, and then a quantum binary measurement selects between the two remaining outcomes. In this binary measurement process, the maximum correlation between two entangled objects cannot exceed a certain value.In their experiments, the researchers demonstrated that the strength of the correlations between the entangled qutrits exceed this maximum value. To do this, they performed a Bell-type experiment in which they showed that the observed correlations violate the maximum inequality for nonsignalling binary correlations with a very high statistical significance, corresponding to 9.3 standard deviations. The results imply that the measurement process in quantum theory cannot be explained by the two-step process with binary measurements. Instead, the measurement process here is genuinely ternary, where the quantum ternary measurement selects between all three of the possible states at once.Overall, the researchers explain that the observations of stronger-than-binary correlations don’t contradict previous experimental evidence of binary correlations, but add new possibilities for how the quantum measurement process works at the most fundamental level.”Now that we have established the theoretical tools and the experimental methods to understand and create ternary correlations, we aim to proceed in two directions,” Kleinmann said. “First, we hope for technological applications (for example, in randomness extraction) and second, we are now using our results as a new basis for a deeper understanding of quantum theory.” For the first time, physicists have experimentally demonstrated ternary—rather than binary—quantum correlations between entangled objects. The results show that the quantum measurement process cannot be described as a binary process (having two possible outcomes), but rather stronger-than-binary ternary measurements (which have three possible outcomes) should be considered in order to fully understand how the quantum measurement process works. More information: More information: Xiao-Min Hu et al. “Observation of Stronger-than-Binary Correlations with Entangled Photonic Qutrits.” Physical Review Letters. DOI: 10.1103/PhysRevLett.120.180402 , Also at arXiv:1712.06557 [quant-ph] © 2018 Phys.org The physicists, Xiao-Min Hu and coauthors from China, Germany, Spain, and Hungary, have published a paper on the stronger-than-binary correlations in a recent issue of Physical Review Letters.”We discovered and experimentally verified the existence of genuine ternary measurements,” coauthor Matthias Kleinmann at the University of Siegen in Siegen, Germany, and the University of the Basque Country in Bilbao, Spain, told Phys.org. “The experimental conclusions are independent of any underlying theory (here: quantum theory) and establish that ternary measurements are a generic feature of nature.”Before now, stronger-than-binary correlations have been theoretically predicted to exist, but this is the first time that they have been experimentally observed. In their experiments, the researchers entangled two photonic qutrits, each of which has three possible states (0, 1, and 2), instead of just two (0 and 1) as for qubits. They then sent the qutrits to different laboratories where they measured the state of each qutrit, enabling them to determine the strength of the correlations between the two qutrits. New quantum probability rule offers novel perspective of wave function collapse This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. Journal information: Physical Review Letters Researchers break record for atoms positioned individually in a trap to create defect-free arrays “Finally, we realized that the combination of these scientific developments with advanced optical technologies such as microfabrication of large-scale arrays of microlenses generates an ideal platform for the advancement of scalable quantum technologies,” Birkl said. “Central to our work is that we apply a novel experimental architecture in which we generate a 2-D pattern of optical traps for neutral atoms based on 2-D arrays of microlenses.”Using a large laser beam that illuminates many lenses, the researchers were able to generate several laser traps simultaneously. They generated up to 400 of these traps in parallel and were then able to address them individually.Their experiment had several steps. Birkl and his colleagues started by creating a cloud of rubidium atoms in a room-temperature vacuum system, using a magneto-optical trap (MOT). This allowed them to generate several million rubidium atoms at a temperature of about 100 microKelvin. Subsequently, they turned on the pattern of laser traps and transferred atoms into these traps, with a maximum of 1 atom per trap. Central part of the experimental apparatus for the arrangement of rubidium atoms in defect-free 2D target patterns. The blue laser light is used to initiate coherent quantum operations. Credit: Gerhard Birkl Explore further Citation: The defect-free assembly of 2-D clusters with over 100 single-atom quantum systems (2019, May 31) retrieved 18 August 2019 from https://phys.org/news/2019-05-defect-free-d-clusters-single-atom-quantum.html “Our research is driven by the observation that physical sciences are right in the middle of a paradigm shift in which the application of quantum physics, i.e. quantum technologies, are becoming the leading technologies in the near future,” Gerhard Birkl, one of the researchers who carried out the study, told Phys.org. “A vast list of applications are already foreseeable but I am convinced that of most applications we are not even aware of.”The next step for the field of quantum science and technology is the development of experimental platforms that offer extensive scalability, multisite quantum correlations and efficient quantum error correction. Over the past century or so, researchers have carried out a substantial amount of work on single quantum systems, laying the foundations for current developments. Atomic quantum systems have played a key role in these studies, particularly neutral atoms trapped by light, as they provide well-isolated quantum systems with favorable scaling. “For the upcoming generations of quantum technologies, going to multiple quantum systems, i.e. scaling up the system size is pivotal,” Birkl said. “For that reason we gave ourselves the directive to develop a novel platform that provides highly scalable architectures for atomic quantum systems with full control of all relevant parameters for advancing state-of-the art quantum technologies.”When developing the technological basis for their experiment, Birkl and his students who were involved in the study focused on laser cooled neutral atoms with in optical traps, as these benefit from scientific breakthroughs of the past 25 years. These breakthroughs include laser cooling and trapping, Bose-Einstein condensation, the manipulation of individual quantum systems, and optical tweezers. Researchers at Technische Universität Darmstadt have recently demonstrated the defect-free assembly of versatile target patterns of up to 111 single-atom quantum systems. Their findings, outlined in a paper published in Physical Review Letters, could drive assembled-atom architectures beyond the threshold of quantum advantage, paving the way for new breakthroughs in quantum science and technology. © 2019 Science X Network “We generated patterns that are consisting of trap sites with exactly one or zero atoms,” Birkl explained. “Next, we took an image of the pattern and this allowed us to identify the occupied sites (which required no further action) and empty sites.”Once they determined which sites were occupied and which vacant, the researchers filled all empty sites; picking up a single atom out of a filled site outside the target pattern and transporting it to an empty site in the target pattern. This transport process was carried out using a single focus laser beam that could move in 2-D throughout the whole trap array.”This works like tweezers made out of light, for which reason they are referred to as ‘Optical Tweezers’ and are the invention of Dr. Arthur Ashkin who received part of the 2018 Nobel Prize in Physics for this invention,” Birkl said. “After applying the tweezers for all empty sites, we take another image of the atom distribution and determine success of the process of generating defect-free atom patterns. In case we still have empty sites, we repeat the assembly process one more time. We can do this up to 80 times in one experimental run, which is another reason for our success in generating large defect-free patterns with high probability.”In their study, the researchers operated on a large number of traps (361), placed in a square grid of 19×19, which corresponded to a substantial number of single atoms (approximately 200) and this allowed them to repeat the assembly process numerous times. All these factors ultimately assisted them in breaking the previous record for the assembly of single-atom quantum systems. “The scalability of the physical systems used is pivotal to further progress in this field,” Birkl said. “We were able to significantly increase the pattern size and the success probability of systems based on neutral atoms. No related experiment has demonstrated more than 72 qubits before, needless to say more than 100, or even 111. Our platform has the explicit prospect of being scalable even far beyond that numbers.”Quantum supremacy typically requires over 50 qubits, yet so far only a few quantum technology experiments were able to surpass this threshold. In their experiment, the researchers reached a total of 111 qubits with a clear plan of how to further exceed this number. This is evidence of the scalability of their experimental platform. “In addition, we could get into the regime of quantum supremacy with high success rates, as we demonstrated a success rate of more than 60% for a pattern with 8×8 = 64 qubits,” Birkl added. “With the duration of one experimental run of 1 second, this gives a new defect-free configurations for quantum processing in the regime of quantum supremacy every two seconds.”The study carried out by Birkl and his team could have important implications for several subfields of quantum technology research, including quantum simulation and quantum computing. The researchers are now planning to scale up their platform to 1000 quantum systems, also adding the ability to initiate two-qubit quantum gates between atoms to build a 2-D quantum processor based on Rydberg interactions. In this way, they are also hoping to implement large-scale quantum computing and quantum simulations using their experimental platform. More information: Daniel Ohl de Mello et al. Defect-Free Assembly of 2D Clusters of More Than 100 Single-Atom Quantum Systems, Physical Review Letters (2019). DOI: 10.1103/PhysRevLett.122.203601 Atom pattern assembly: an initial atom distribution with defects is transferred into a defect-free 100 atom target cluster via single-atom transport. Credit: Gerhard Birkl
When I saw my mother’s finger hovering over “play” on her phone, my daughter leaning over her shoulder, I stopped her: “You know what … let’s just let her enjoy the moment.” I wanted to keep her experience sacred for at least a little bit longer. I wanted to keep it her experience. I’ve seen the way my daughter’s facial expression changes, her eyes squint slightly, and her neck pulls her head back just a little when she watches videos of herself. I knew that in my daughter’s mind she’d felt like a rock star up there, and that seeing the video might surprise her and change the way she remembered the experience. It’s not that her performance wasn’t good — just that it might be slightly different on video than the way she experienced it, the way we all feel when we hear ourselves on a recording and say “Wait — that’s what I sound like?” It turns out that my hesitancy has a genuine scientific basis. Daniel Schacter, a psychology professor at Harvard whose books include “The Seven Sins of Memory: How the Mind Forgets and Remembers,” told me, “We know from research that reactivating an experience after it occurs can have large effects on subsequent memory for that experience, and depending on what elements of an experience are reactivated, can even change the original memory.” Many studies have been done on how a person taking a photograph reinforces or reshapes their memory, but what about our children — the subject of our constant documentation? Does seeing themselves in the third person change or even falsify their memories? Instead of remembering the experience of singing up there on the stage looking out at the audience from her own eyes, my daughter’s memory becomes entangled with the videographer’s perspective from the audience looking up at the stage. The night of the elementary school talent show, we came home to celebrate with ice cream when my mother took out her iPhone to show a video she’d taken of my 10-year-old daughter’s performance. My daughter had played Ed Sheeran’s “Perfect” on the piano by ear and sang along. Despite her nerves, she got out there in the middle of the stage in a new dress with scattered sequins and sang her best, bowing to an audience of clapping parents before she walked off stage — an expression of relief and pride on her face. Elizabeth Loftus, a professor at the University of California, Irvine, who studies memory, explained: “Experiencing gives you a ‘first’ person perspective. You see others while you act. Watching gives you a ‘third’ person perspective. You learn something about how others see you. I’d say this would ‘add’ to the memory … which in a sense is a kind of reshaping.” Read the whole story: The New York Times
A play depicting one such story of a girl will be soon staged in the Capital.Play titled, Safar is a social drama presented by Dhruv Arts and Cultural Society. It’s a story about a girl who comes from a small town to a metro city with a specific purpose. Here, unfortunately she has to share an accommodation with two me. Where unpredictable events create many comic situations in the house.As the play progresses, the story begins to unfold and reveals the purpose of the girl coming to the city, various facts, myths are confronted by different characters thus taking the story to a different level. The message of the play is as long as you live, you live under the protective eyes of the almighty. The play is scripted and directed by Pradeep Singh.When: 1 December, 4 and 7 pmWhere: Alliance Francaise
An ensemble of 20 of Singh’s acrylic and oil on canvas, the works reflect the artists’ observations of the three years spent in Dwarka in Delhi.Says Singh, ‘In 2007, we shifted base to a suburb of Delhi, where we spent three years. It was only then that the city life started impacting the canvas of my life. I often used the rickshaw ride till the metro line while on my way to my studio back then at Triveni Kala Sangam. On the way, the beauty of the sweeping movements of the shadows, the little conversations with the rickshawallah about their migration, their daily struggle, collectively evoked in me a strong desire to express their emotions.’ The first culmination of these visions was the Also Read – ‘Playing Jojo was emotionally exhausting’Chalchalacha series.The second series Euphoria also showcased the hustle and bustle of the city where birds were the metaphors for people. Chalat Musafir combines the experiences of both the exhibitions and brings a beautiful amalgamation of the artists’ experiences. The wistful canvasses perhaps emerge from her colorful real-life encounters.Her daily rickshaw ride seems to serve as the metaphor for her canvas which beautifully shows the rickshaw in the circle of life. There are undercurrents of urban angst, street life and familiar objects in the gender sensitive ethos of her work. The tea pot flying above the civilization perhaps shows the constant yearning of the urbane civilization to fly away from reality. Also Read – Leslie doing new comedy special with NetflixThe process of producing these oils on canvas is a tedious one. Singh initially captures images on camera for study, deconstructs using computer graphics and finally re-creates them as paintings, diligently composed in layers of oil paints that also endow the work with a distinct and subtle texture. The show will stay continued at – Gallery Artspeaks India, New Delhi from 11 January to 23 January 2014.WHEN: 27 December 2013 – 8 January, 2014, 11 pm to 8 Pm WHERE: Azad Bhawan Art Gallery, ICCR, Azad Bahwan, IP Estate
Bihar Industrial Area Development Authority (BIADA) and the government of Bihar is organising this event in Delhi and Dara Project’s MD, Sarabjeet Dara taken the charge of event manager of this event.The event includes the showcasing of handicraft, handloom and art that showcases the culture and heritage of Bihar. There will also be cultural programmes being staged everyday by renowned artistes from the region. The theme of ‘Tourism, tradition, art, culture and ambience of Bihar’ is expected to take over the Capital with their myriad hues. And of course as we talk about Bihar, we cannot ignore the incredible food that comes from there. The event will have stalls that will be dishing out the delectable fare for all to taste.The main attraction for the visitors include around 20 stalls of handloom and handicrafts. Bhagalpuri silk, Mithila paintings, Siki products, jute products like jewellry, Tikuli Art, Nepura silk of Nalanda and famous handloom bed sheets of Biharsharif. Head over to get a taste of Bihar right in the heart of Delhi.WHEN: 22 to 27 MarchWHERE: Dilli Haat, INA
Four persons lost their lives in rain-related incidents in Jalore district of Rajasthan in the past 24 hours. The torrential rains have raised fear of a flood-like situation, officials said.Four bodies – two in Nainol, and one each in Data and Jaulasara villages of Jalore – have been recovered amid heavy downpour since Tuesday, said a senior district official.He added the body that was recovered from
The nation-wide theatre extravaganza which started off at the majestic Red Fort on February 17, is now in its last phase, which makes these last few weeks extremely important for theatre aficionados to grab the tickets and watch some unique drama by national and international groups. Online tickets for this phase of the 8th Theatre Olympics are either available on insider.in or on the official website of the festival. Offline tickets could be bought two hours prior at the respective venue or from National School of Drama, New Delhi’s premises from 10 am every day. Also Read – Add new books to your shelfCOURT MARTIAL Wri. Swadesh Deepak Dir.: Jyotish M.G. Group: Abhinya Theatre Research Centre, KeralaLanguage: MalayalamDuration: 1 hr 20 min.Time: 5:30 pmLocation: Shri ram CentreRUDDHASANGEET Writer and Dir: Bratya BasuGroup: Kalindi Bratyajon, KolkataLanguage: BengaliDuration: 2 hrs. 30 min.Time: 6:30 pmLocation: KamaniKINUKAHARERTHETARWri.: Manoj MishraDir: KaziToufikul Islam Emon Group: Prachyanat, BangladeshLanguage: BengaliDuration: 1 hr 30 mins.Time: 8:30 pmLocation: Abhimanch
Kolkata: Popular Bengali actor and Trinamool Congress MP Dev, alias Deepak Adhikari, who is contesting to retain his Ghatal Lok Sabha seat, said on Thursday that his party did not need to indulge in mudslinging as the state government has undertaken numerous development works.Dev, contesting the polls for the second time, also said that he was more experienced this time. “I have worked whole heartedly for the people of Ghatal. The first two years were spent in learning. This time I am more experienced and if I win, you will see a new ‘Dev’. We don’t need to indulge in mudslinging as our Chief Minister has done enough for the state,” Dev said after kicking off his election campaign by offering puja at a temple. Also Read – Rs 13,000 crore investment to provide 2 lakh jobs: MamataAddressing the people of Keshpur, which is part of his Lok Sabha constituency, the actor elaborated the development works undertaken by the state government and the various schemes that have benefited the people. For Dev, the priority is “to reach out to the people with the development works done by him and the party.” Asked to rate himself as a parliamentarian, he said: “The number keeps changing. As I belong to the film industry, I am used to the fact that if one film is successful, it is not necessary that the next one will do well too.” Also Read – Lightning kills 8, injures 16 in state”I am a very practical person,” he said. Dev mentioned that he read somewhere that in terms of the funds released under the Members of Parliament Local Area Development Scheme (MPLADS), he occupied the third position, but he never thought about all this while working. “I had spoken about the Ghatal Masterplan in the parliament. It had been sanctioned, but the funds have not been released till date. I also spoke about the railways. In this way, I have learnt how to work,” he said. Appealing to the people to repose their trust in him, Dev said that given a chance, he would do more things that he could not accomplish in his first tenure as the MP. Ghatal goes to the polls on May 12 in the sixth round of the seven-phase Lok Sabha elections. With agency inputs
Sanjay Bhattacharya is a renowned name in art world who is known for his uniqueness and exclusivity. For a Bengal born painter, who has travelled extensively in India – like his fellow folk, Sanjay has been imbibing and storing many striking images that make up his and our India.Works of the artist are open for display at the Visual Art Gallery, IHC, New Delhi from September 19 – 29.The Indian circus has changed in the years of the artist’s maturity, but the essential elements remain the same, especially in the places of pilgrimage. The new journey which is mirrored in this show was meant to take the viewers in all the four directions of the compass, In the East, Bhattacharya picked Bengal Kalighat temple and Kamakhya, Assam. Also Read – Add new books to your shelfIn the North, Bhattacharya chose the most-visited site in India – the sacred place of the Sikhs – where the allure of God and gold are equated in some religious reasoning much as other religions do when they put the precious in their places of worship. Here again, the literal is broken with the Akali symbol which stands midway in the canvas as a contemporary art installation.The West remains a canvas-to-be, where the Sai Baba of Shirdi will expand a new vision of the faqir of miracles. But how does one conceptualise or dare to describe an unpainted image. Also Read – Over 2 hours screen time daily will make your kids impulsiveTirupati represents the South, with its Vaishnav symbol atop a brass lamp flaunted against the hills and sky. Another Vishnu symbols in the conch, as well as Lord Rama, most ardent devotees find a place in the collage to demonstrate Sanjay’s painterly skills. His Bengal work dares the daring goddess. His art breaks this barrier and updates the norms of egalitarianism even with the gods, who in any case are fashioned in India after human beings.
Researchers have found that implementing a nutrition care plan at home for patients at risk for malnutrition had a dramatic impact on helping keep them out of the hospital. “Our goal as a home healthcare provider is to help patients get back on their feet as quickly as possible and to keep them out of the hospital,” said study lead author Katie Riley from Advocate Aurora Health in the US. Paying attention to nutrition care helps promote patients’ strength and prevents them from going back to the hospital, which ultimately reduces healthcare costs, she said. Also Read – Add new books to your shelfFor the study, more than 1,500 home health patients were followed for 90 days. The research found that when patients at risk for malnutrition received a comprehensive nutrition care program to aid in their recovery, risk of being hospitalised was significantly reduced by 24 per cent in the first 30 days, nearly 23 per cent after 60 days and 18 per cent after 90 days. It was also found that healthcare costs were reduced by more than $2.3 million or about $1,500 per patient at risk for malnutrition. “Healthcare systems are driven to improve patient care while reducing costs. Our research shows that prioritising nutrition across different settings of care – from hospital to home – can significantly cut costs while improving patients’ health,” said study co-author Suela Sulo.
On April 22, 2019, the wreck of the SS Iron Crown, an Australian freight ship, was finally located after 77 years. The ship had been sunk by a Japanese submarine during World War II. The Iron Crown was hit by a torpedo on June 4, 1942, while sailing through Bass Strait, off the coast of the Australian state of Victoria. The cargo ship, which was carrying manganese ore, sank within only 60 seconds, killing 38 of its 43 crew members.Following the bombing of Pearl Harbor on December 7, 1941, the Imperial Japanese Navy targeted other Allied objectives, including Australian ports that would harbor allied warships. In May and June of 1942, the Japanese operated in Sydney harbor using midget submarines, as reported by Robert Nichols for Wartime.The SS Iron Crown, a bulk ore carrier which was torpedoed by a Japanese submarine on June 4, 1942 off the coast of Victoria, AustraliaAccording to Nichols, the Japanese specifically targeted two cruisers: the American USS Chicago and Australian HMAS Canberra. After failing to sink them during their missions in the New South Wales ports of Sydney and Newcastle, and losing two submarines in the process, the Japanese expanded their theatre of operations to the whole Australian East coast.It is during one of these mission that the Iron Crown was sunk. David Stevens wrote “A Critical Vulnerability” for the Australian Sea Power Center, in which he analyzes the Japanese submarine attacks during World War II. Stevens explains that while the Japanese sank five ships and damaged a few others, they missed their most important military objectives. However, these operations were successful in disturbing Australian supply routes.The SS Iron Crown was hit by a torpedo on June 4, 1942 while carting ore in waters off Australia’s southern coastline. pic.twitter.com/RZHPBVqtUP— DW News (@dwnews) April 24, 2019The wreck of the Iron Crown was located by the scientists aboard research ship Investigator thanks to multi-beam sonar equipment and a special drop camera, according to Maritime Executive. It lies more than 700 meters deep underwater, about 100 kilometers away (about 62 miles) from the Australian coast. The ship was found almost intact, but is too deep in the ocean to be reached by divers, according to The Guardian. It has already been subject to exploration however, as scientists have used deep water cameras to capture footage of the wreck.Related Video:“The fact that so many lives were lost … hit home with all scientists, staff and ship crew working on [the project],” said Emily Jateff, chief scientist from the Australian National Maritime museum. Peter Harvey is a maritime archaeologist for the Heritage Victoria foundation. Harvey said this event was significant for Victorians and how they remember this episode of World War II, and how it touched their state.It took only 60 seconds for Australia’s SS Iron Crown to sink after being torpedoed on June 4, 1942. Thirty-eight of its 43 crew were killed. Seventy-seven years later, their final resting place has been found at the bottom of Bass Strait https://t.co/SOnkRjnuxU— The Age (@theage) April 23, 2019“Locating the wreck after 77 years of not knowing its final resting place will bring closure for relatives and family of those that were lost at sea,” Harvey said.Harvey pointed out that the Iron Crown is the only World War II wreck lie in Victorian waters. The Iron Crown’s oldest survivor, George Fisher, died in 2012. He was only 18-years-old when the Iron Crown was sunk, where he was serving as a deck boy. According to the Australian Broadcasting Company, Fisher said that he did not feel haunted by the sinking of the Iron Crown, but still felt that great sorrow about it.“That’s a very sad part of my life,” Fisher said. “One of the saddest.”Fisher was dedicated to the remembrance of his companions who died in the sinking of the ship. Lorraine Silvester, his partner at the time of his death, said Fisher had been working towards establishing a plaque in remembrance of his shipmates at the War Memorial in the city of Mallacoota, Australia.Read another story from us: 3,600-yr-old Shipwreck Uncovered Could be Oldest Ever Found in the MediterraneanSilvester said that the story of the Iron Crown remained always important for Fisher, even after many years had passed.“George was so passionate about having his shipmates remembered,” she said.With the finding of the Iron Crown’s wreck on Monday, Fisher’s work of establishing a memorial has been advanced further, as Australians can now pinpoint where his shipmates lie.
Promoted Stories The 2019 Ford F-150 Is Here and We’re Obsessed Edmunds The Herd Saturday Podcast available every Saturday through the end of the football season. Download and subscribe to it exclusively at TheHerdNow.com, iHeart Radio, Google Play, or iTunes. Odell Sheds Positive Light On Everything He’s Dealt With In NFL theGrio 25 NFL Records That Will Never Be Broken Stadium Talk Married Rich: Matthew McConaughey’s Wife is One of the Richest Spouses in… Investing.com The CourtRoom Sharks Of Los Angeles Top Attorney | Search Ads Recommended by,The Herd Saturday Podcast available every Saturday through the end of the football season. Download and subscribe to it exclusively at TheHerdNow.com, iHeart Radio, Google Play, or iTunes. [Gallery] The NFL’s Richest Quarterback Ever Is Not Who You Thought – Based On Net… thevirport.com It’s Oscars weekend, so today Colin is talking with TCM host and film critic Ben Mankiewicz from Turner Classic Movies to discuss the 2019 Oscars, the favorites in the major categories, odds, and who could pull an upset.They also discuss if Hollywood less connected to middle America now than in the past, and the industry pushback against accepting Netflix movies as equal to traditional films.
Register Now » The much-anticipated linkup of LinkedIn on the New York Stock Exchange took place this morning, with the business-focused social network making its debut under the LNKD symbol. Based in Mountain View, Calif., LinkedIn operates the largest online professional networking service on the planet with more than 100 million members in more than 200 countries and territories.LinkedIn (NYSE: LNKD) priced its initial public offering of 7.8 million shares at $45 a share, which gives the company a valuation of approximately $4 billion, or nearly 17 times its net revenues of $243 million for 2010. As of press time, the company’s now publicly-traded stock surged to an astounding $88.17 per share. It had traded as high as $92.99. Not bad for a business that got its start nine years ago in co-founder Reid Hoffman’s living room. Opinions expressed by Entrepreneur contributors are their own. May 19, 2011 Growing a business sometimes requires thinking outside the box. Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global min read In case you’re wondering how exactly LinkedIn makes money: The company draws most of its income from selling recruiting and marketing services to businesses as well as premium services that are paid for by subscribers.Nearly 2 billion people searched its platform last year when the company had roughly 500 employees around the globe, according to LinkedIn. At the beginning of 2011, the employee base doubled to 1,000 employees. And, as of January of this year, the company counts executives from all Fortune 500 companies as subscribers, and it claims its hiring solutions were used by 73 of the Fortune 100 companies as of March of this year.Without a doubt, LinkedIn’s status as the newest NYSE member is being watched very closely by other high-profile social media-related companies who are themselves rumored to be contemplating a dive into IPO waters, including Facebook, Groupon, Zynga and Twitter.In its 142-page registration statement filed with the Securities and Exchange Commission, LinkedIn lists some of the advantages of investing with the company, saying the company’s offerings already transforms the way people work by connecting talent with opportunity on a giant scale. It claims its mission is to increase viral member growth beyond the existing 100 million members and serve as the professional profile of record online.As for potential risks of the enterprise, LinkedIn’s statement admits that the company has a “short operating history in a new and unproven market,” and if security is compromised, members and customers may opt out of the service. In addition, the company said it doesn’t expect to be profitable any time soon. And it fully expects to face increasing competition from online professional networks in the future.LinkedIn also said it expects that its 7.8 million-share offering will generate roughly $146 million, which would be used for general corporate purposes such as working capital, sales and marketing activities. The company said it also might use a portion of the net proceeds to invest in or acquire technologies, solutions or businesses that can complement the goal of boosting its online professional network enterprise.Would you snap up shares in LinkedIn? Tell us why or why not in the comments section below.
Enroll Now for Free 2 min read Target acknowledged early this morning that it is investigating a security breach that may have compromised over 40 million credit and debit cards used by customers shopping at the discount retail chain from November 27 to December 15, a period that included Black Friday.This wasn’t your run-of-the mill hack. The thieves targeted physical store locations (online was not affected) on a national scope. The hackers were able to access credit and debit-card data found on the magnetic strips by comprising approximately 40,000 card devices at store registers, the Wall Street Journal reportedWho carried out the hack remains unclear. Stolen data included customer names, credit, debit and Target store brand card numbers, expiration dates and CVV codes.”You should remain vigilant for incidents of fraud and identity theft by regularly reviewing your account statements and monitoring free credit reports,” the company said in a letter to its customers.Related: How to Avoid Getting Hacked (Infographic)This is far from the first major retailer breaches. Back in 2007, TJX — the company behind T.J. Maxx and Marshalls – acknowledged its systems had been compromised when hackers used the store’s wireless networks to access information connected to payment card, check and return transactions at TJX locations nationwide. Data from over 45 million credit and debit cards was stolen.And in July, credit card numbers from over 160 accounts were stolen from companies including J.C. Penny and 7-Eleven.But the timing of this particular attack was, unfortunately, impeccable. Black Friday is America’s biggest shopping weekend of the year, when store traffic is at its highest.At least Target doesn’t have to sit alone with its “hacked” status. Yesterday, news broke that hackers had breached the Washington Post’s servers (for the third time this year), making off with employee usernames and passwords.Related: New York Times Hacked: 3 Tips for Avoiding Email Scams Free Workshop | August 28: Get Better Engagement and Build Trust With Customers Now December 19, 2013 This hands-on workshop will give you the tools to authentically connect with an increasingly skeptical online audience. Opinions expressed by Entrepreneur contributors are their own.
September 28, 2015 Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global Growing a business sometimes requires thinking outside the box. Register Now » I was attacked. I was violated. Last week, my wife and I discovered that our Discover account had been compromised and used for a number of fraudulent transactions. Luckily, we caught it early and notified Discover immediately. The issue was rectified swiftly and amenably.Related: 5 Growing Cyber-Security Epicenters Around the WorldOf course, as anyone who has been a victim of a robbery can tell you, even when all the stolen items are returned in their original state, the psychological effect of having had your privacy violated leaves a bitter taste that takes a longer time to wash away.Fortunately — if that is the appropriate word — I was well prepared. As it happens, I had fallen prey to hackers in the past, so this time I knew what to do and how to react. The previous incident, which froze my business banking accounts for days, made me understand and embrace the dogma that it is not a matter of “if” but “when” you, me, anyone will get hacked.For this reason, entrepreneurs should prepare for rather than simply avoid cyber threats. Here are the few tips I have learned over the years to help that preparedness happen:1. Take the threat seriously.We are inundated almost daily by news about criminals hacking and stealing data from movie studios, major retailers, and even our most secure — or perceived as secure — government agencies. While these incidents may lead us to believe that big companies are the targets for hackers, the harsh reality is that small businesses are at as much risk as large corporations. McAfee, a leading provider of security software, recently reported that it had found that 90 percent of small- and medium-sized U.S. businesses do not sufficiently protect their electronic company and customer information. This is a sobering statistic, especially when you consider that PwC (formerly PriceWaterhouse Coopers) estimates that breaches can cost small firms up to $100,000 to remedy and, larger firms, well into the millions.And there’s more: Beyond data, how secure is your business’s banking and credit card information? Having your credit or bank account compromised can be a significant inconvenience and disruption to your business when the bank suspends your accounts as it investigates over the course of several days.2. Avoid public wi-fi.One of the easiest ways for hackers to collect your information occurs when you use unsecured wi-fi networks. Any official business, especially the kind that requires a login and password, should be done only through secure networks that you have set up. Mobile phone data networks are also secure — at least for now.Related: 4 Ways Your Small Business Can Better Prevent Cyber Crime3. Set up (and pay attention to) alerts.All banks and credit cards have alerts that you can set from a text when a transaction has exceeded a stated amount; or you can receive an email when your bank or credit card balance hits a certain level. This was actually how we caught the fraudulent activity on our Discover card.Ironically, I know many business owners who receive notifications for sports scores, news and social media, but will not take the time to set up important business financial notifications.4. Check your banking activity often.Over the years, I have learned to consolidate my banking activities, both business and personal, so that I can easily check transactions once every few days and even daily when I have the time. Services such as Mint or Quicken can also help you monitor transactions across all of your accounts and have great mobile apps you can use on the go.5. Subscribe to an identity-theft service.For a long time, I hated the idea that identify theft companies existed. I had always believed these companies used scare tactics to manipulate customer sentiment, which encouraged customers to sign up.But it takes only one violation of your privacy to demonstrate the value these services have.Because I was a party to the large Target hack and the security breach that affected all South Carolina residents, I was provided identity-theft services at no charge. Since getting these services, I have found the accompanying monitoring and alerts invaluable and upon renewal will certainly entertain continued service.6. Tighten your password security.Having a strong and unique password for each of your accounts is crucial, as well as a major pain. Consider instead a password “algorithm,” or a common password theme, that makes remembering all of your complicated passwords much easier.Also, many apps for financial institutions now have fingerprint and facial recognition features, so take the time to set them up. And, when available, take advantage of more secure login protocols, such as two-step authentication, when accounts permit them.All of these processes require more time and can be inconvenient, but no more inconvenient than spending hours on the phone remedying your accounts once you’ve been scammed.7. Get your employees and vendors on board.According to Cyrus Walker, CEO of Chicago-based Data Defenders, research demonstrates that approximately 80 percent of security-related incidents are a result of employee behavior. For this reason, your employees need to be well trained about and aware of the threats to your company’s cyber security. Policies should be clearly stated within and throughout the organization.Additionally, your vendors and other business partners, especially those with which you conduct financial transactions or share sensitive information, should be vetted and required to uphold stringent Internet security protocols. Of course, not every vendor will be able to comply, but demonstrating your willingness to make cyber protections a priority will help lead and drive home its importance.8. Consider insurance.If your business transacts a significant amount of business through the Internet, stores sensitive information online or communicates electronically, it is probably worth discussing with your insurance agent the potential loss that could result from a major data breach in your company. Unfortunately, protection for the unforeseen cyber security threats is becoming as standard as liability insurance for company vehicles.The message here is not to scare entrepreneurs into action. Rather it is to emphasize that while businesses probably can’t avoid breaches, they can certainly take great strides in preparing for the worst.What other ways do you and your business prepare for cyber threats? Please share your comments below.Related: Meet the Cybersecurity Startup That’s Caught the Eye of Google’s Eric Schmidt Opinions expressed by Entrepreneur contributors are their own. 6 min read
We all have morning rituals, and these habits can shape how the rest of our day goes. For Marie Claire fashion director, TV personality and Project Runway judge Nina Garcia, it starts with her shoes.“Shoes set [the] tone for what kind of day I’m going to have,” Garcia told Entrepreneur.Related: 4 Marketing Ideas From the Fashion Industry Every Business Can UseBut for some women, fashion is so important that they’re willing to give up comfort for style, wearing shoes so uncomfortable it can be hard to focus. However, they shouldn’t have to. “Technology is moving very fast and it’s facilitating all aspects of our lives, so the next step is how to deliver on the fashion and the practical,” Garcia says. That’s why she’s serving as an advisor to True Gault, a tech infused shoe company.True Gault has customers scanning their feet to create a custom pair of shoes. The process is simple: the scanning is done via the True Gault app, which uses 3D imaging to create virtual models of a user’s feet, and users can then create and order a custom pair of shoes that will be handmade and delivered to their door in less than four weeks.And while nearly every industry — from food to education to automotive — has been getting its own tech makeover in the past decade, Garcia thinks fashion is next on the horizon. “We’re in a world where we get our groceries delivered, where we Uber everywhere — everything is in a streamlined process and the next [industry] is fashion,” she says.We spoke to Garcia to learn further insights on fashion and dressing for success.Shoes determine the type of day you’re going to have.Whether you’re running from meeting to meeting or have a day of running errands — choose your shoes accordingly. Because your shoes are not only an indicator of your personality or style, they can determine how you’re going to feel and what you’re going to achieve that day.Related: Why You Still Have to Dress for SuccessAt least that’s what Garcia believes. “The first thing I do in the morning is look at what my day is like and choose shoes first,” she says.And no, having a slew of back-up shoes under your desk doesn’t cut it. Focus on your presentation from when you wake up, and make sure your outfit caters to everything you have to do that day.“I think it’s very archaic to have a slew of shoes, or to be carrying your sneakers,” Garcia says. “I don’t think we’re living in that kind of world.”Comfort breeds confidence.The term “dress for success” isn’t far-fetched — many studies have found that when you like what you’re wearing, your confidence gets a boost. But that doesn’t mean you should slip into any old shoes just because they’re comfortable, or cram your feet into a pair of too-small pumps.Feeling confident starts with being comfortable. Not only is your confidence lifted when you’re comfortable, but research shows that productivity and efficiency are affected too. You won’t be productive all day if you’re worrying about your outfit or taking your shoes on and off.Related: 6 Ways to Immediately Boost Your Self-Confidence“I’ve always said comfort is confidence,” Garcia says. “When you are comfortable in what you’re wearing, you immediately emanate that confidence. It’s very much reflective in the way you handle yourself, and shoes are a big part of it.” 4 min read Listen Now Problem Solvers with Jason Feifer August 2, 2017 Hear from business owners and CEOs who went through a crippling business problem and came out the other side bigger and stronger.
Sync Dropbox automatically on Android by Martin Brinkmann on July 18, 2016 in Google Android – 4 commentsDropbox’s Android client is limited when it comes to the automatic synchronization of files between Dropbox and the Android device.It did support automatic photo syncing up until now, but a recent change required that you either connect a computer to Dropbox as well, or upgrade to Dropbox Pro to retain the functionality.While you may sync files manually at any time, you sometimes may want files to be synced automatically. This way, you will never forget to hit the sync button and end up with outdated or missing files.Since Dropbox for Android does not support the feature, you will have to look elsewhere for it.Sync Dropbox automatically on AndroidAutosync Dropbox – Dropsync is a free, limited, application for Android devices that adds automatic synchronization with Dropbox on Android devices.The free version of the application is limited in that it can only keep one folder pair in sync at all times. Additionally, ads are displayed in the interface when you are using the free version, and uploads are limited to files of 10MB and smaller.The application requires that you link a Dropbox account on first start. It redirects to the Dropbox website where you authorize the app to access your Dropbox stuff.Once that is out of the way, you may have it create a folder pair for you, or create one of your own. You may alter the local or remote folder at any time to make adjustments.Basically, what Autosync Dropbox – Dropsync does is sync files automatically. It supports two-way file synchronization which copies files either way, but also others including “upload and delete”, “download only”, or “download mirror”.If you just want to push your photos to the Dropbox cloud for instance, you’d select upload, or upload and delete instead of two-way sync.You find plenty of options in the apps’ settings. You may change the sync interval there, set up when files get synced (network connections, battery), set up allowed WiFi networks to only sync files when connected to those, or exclude files or folders from being synced in first place using basic filters.VerdictThe free version of Autosync Dropbox – Dropsync is quite limited. It may be enough if you just want to keep a single folder on Android in sync with Dropbox, or push files from the device to Dropbox.The app displays full screen ads sometimes. I thought at first that I tapped on an ad without noticing it but that was not the case.Several pro packages are offered for the app. You may buy the remove ads package for €1.99 to remove ads, or the Dropsync Pro package for €5.99 to remove ads and get all Pro version features. There is also an Ultimate package for €9.99 that guarantees you that you get all future features as well.The Pro version adds other features to the app besides syncing multiple folders and removing the upload limit. It ships with an option to sync the whole Dropbox folder, and passcodes that protect the application’s settings.All in all, this is not a bad application, especially if you just need to sync a single folder with Dropbox automatically, or if you don’t mind paying for the Pro version to lift all feature restrictions.Summary12345 Author Ratingno rating based on 0 votes Software Name Autosync Dropbox – DropsyncOperating System AndroidSoftware Category AppsLanding Page https://play.google.com/store/apps/details?id=com.ttxapps.dropsync Advertisement