Superelastic iron alloy could be used for heart and brain surgery

first_img Citation: Superelastic iron alloy could be used for heart and brain surgery (2010, March 23) retrieved 18 August 2019 from More information: Ferrous Polycrystalline Shape-Memory Alloy Showing Huge Superelasticity, Science 19 March 2010: Vol. 327. no. 5972, pp. 1488 – 1490; DOI:10.1126/science.1183169 The researchers, from Tohoku University, said the ferrous polycrystalline shape memory alloy was as strong as high-strength industry alloys, but it is also superelastic, which means it can return to its original form when strain is removed and the material is heated, an important property of all shape memory alloys. The iron alloy even returns to its former shape when under almost twice the strain levels endured by current shape memory alloys. The alloy also exhibits changes in ductility and a large reversible change in magnetization during shape transitions. The alloy’s stress level is around double that of the shape memory alloy nickel-titanium, which means it can be formed into extremely thin wire. At present the nickel-titanium alloy is the only superelastic alloy available for practical use. Superelastic properties make a shape memory alloy ideal for delivering stents to parts of the body such as the heart since they can expand to a wider diameter when warmed by the body. Stents are tubes that are surgically implanted into blood vessels to prevent them collapsing. One of the engineers, T. Omori, said stents are currently delivered to the heart using nickel titanium wire, but its diameter is too thick to allow it to be used in the brain. The new iron alloy could be made thin enough to be used for brain stents.Omori said the elastic iron alloy may have other uses, such as in buildings in earthquake zones where a material that is both strong and flexible is needed. The buildings are deformed during the earthquake, but the iron alloy’s property of remembering and returning to its original form means the super-elastic alloy could return the building to its former shape. Other potential uses of superelastic alloys include blast protection, noise reduction, and vibration isolation.The paper was published in the journal Science last Friday. Explore further NC State breakthrough results in super-hard nanocrystalline iron that can take the heat Shape memory alloys developed by the research group. ( — Scientists in Japan have designed an elastic iron-based shape metal alloy for use in applications as diverse as heart and brain surgery and buildings in earthquake-prone areas. This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. © 2010 PhysOrg.comlast_img read more

Mpemba effect Why hot water can freeze faster than cold

first_img Freezing point of supercooled water varies with electric charge © 2010 Theories for the Mpemba effect have included:faster evaporation of hot water, which reduces the volume left to freeze formation of a frost layer on cold water, insulating it different concentrations of solutes such as carbon dioxide, which is driven off when the water is heatedThe problem is that the effect does not always appear, and cold water often freezes faster than hot water.Radiation safety officer with the State University of New York, James Brownridge, has been studying the effect in his spare time for the last decade, carrying out hundreds of experiments, and now says he has evidence that supercooling is involved. Brownridge said he found water usually supercools at 0°C and only begins freezing below this temperature. The freezing point is governed by impurities in the water that seed ice crystal formation. Impurities such as dust, bacteria, and dissolved salts all have a characteristic nucleation temperature, and when several are present the freezing point is determined by the one with the highest nucleation temperature.In his experiments, Brownridge took two water samples at the same temperature and placed them in a freezer. He found that one would usually freeze before the other, presumably because of a slightly different mix of impurities. He then removed the samples from the freezer, warmed one to room temperature and the other to 80°C and then froze them again. The results were that if the difference in freezing point was at least 5°C, the one with the highest freezing point always froze before the other if it was heated to 80°C and then re-frozen.Brownridge said the hot water cools faster because of the bigger difference in temperature between the water and the freezer, and this helps it reach its freezing point before the cold water reaches its natural freezing point, which is at least 5°C lower. He also said all the conditions must be controlled, such as the location of the samples in the freezer, and the type of container, which he said other researchers had not done.The effect now known as the Mpemba effect was first noted in the 4th century BC by Aristotle, and many scientists have noted the same phenomenon in the centuries since Aristotle’s time. It was dubbed the Mpemba effect in the 1960s when schoolboy Erasto Mpemba from Tanzania claimed in his science class that ice cream would freeze faster if it was heated first before being put in the freezer. The laughter ended only when a school inspector tried the experiment himself and vindicated him. Mpemba Effect. Image: James Brownridge ( — Scientists have known for generations that hot water can sometimes freeze faster than cold, an effect known as the Mpemba effect, but until now have not understood why. Several theories have been proposed, but one scientist believes he has the answer. This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. Explore further Citation: Mpemba effect: Why hot water can freeze faster than cold (2010, March 26) retrieved 18 August 2019 from More information: Mpemba effect – Wiki article;James D. Brownridge web page;Mpemba Effect scientific paper, March 2010, by James D. Brownridge;via Newscientistlast_img read more

FlyNano electric sea plane takes first test flight

first_img“When the FlyNano concept was presented last year at the Aero 2011 trade fair in Friedrichshafen, Germany, it was envisioned to be primarily powered with a combustion engine,” said the Finnish aeronautics firm by the same name, FlyNano.“ However, the development of electric motors and batteries has been immense during the past year and the demand for electric powerlines has been increasing continuously.”The cruising speed is around 140 km/h (87 miles per hour). The rudder is controlled by pedals. “Elevons” (ailerons + elevators) and throttle are controlled intuitively by a stick with the right hand. The designers say their electric sea plane is quiet, and power-train vibration is reduced.FlyNano’s goal is to start production and deliver the first 35 planes to dealers by the end of 2013. The FlyNano plane has an ex-factory price listed on the company site as 32,000 euro ($40,000). Transport and storage trailer charges are extra.A promotional portion of text on the site tells prospective customers that, “If you’ve ever had a pilot’s licence you’ll fly Nano right out of the box.” For the rest, knowledge of simple rules of the air will be required, says the team. The FlyNano FAQ page, however, directly answers the question of whether customers need a pilot’s license to fly the plane. According to the European Aviation Safety Association regulation. FlyNano is below the necessary weight of 70kg, which means that national authorities decide on the classification. “Nevertheless a good understanding of water plane operation, rules and aviation safety is requested.” The company adds that “We will clear the situation in several countries around the world within the following months.”FlyNano does not have a windshield, but in keeping with the company’s philosophy of “feel the wind,” the recommended gear includes helmet or at least goggles and drysuit/wetsuit or similar clothing. FlyNano has stated that due to advances in batteries and electric motors, they ditched combustion models. The carbon fiber-bodied aircraft is now electric. Citation: FlyNano electric sea plane takes first test flight (2012, June 18) retrieved 18 August 2019 from The 70 kilo single person plane ( — A single-seat carbon-fiber airplane designed for water operations and proposed as a “fun flyer” has taken its first test flight at Finland’s Lake Hepari. The June test flight comes after more than a year since its introduction at an air show in Germany in 2011. The earlier FlyNano was showcased as a single-occupant petrol/electric microlight amphibious aircraft. The new FlyNano has undergone key changes to advance its readiness for takeoff. Gone are the petrol-engine models. The new engine, propeller, controller and batteries combine to produce a stronger model than the earlier structure. center_img This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. Explore further © 2012 Phys.Orglast_img read more

Physics team suggests possible way to make quantum cryptography available in handheld

first_img Being able to encrypt data and the key that allows for unlocking it has become important in modern life. Companies spend millions attempting to protect sensitive information while hackers work non-stop trying to overcome such hurdles to access that information. The current system (RSA) is believed to be, at least for now, just ahead of the hackers. It relies on public key encryption of plain text and privately encrypted keys. This system has two weak points. The first is that it assumes that a hacker has not been able to gain access to a private key through nonconventional means and the second is that it’s based on mathematical algorithms that can be cracked given fast enough computers. To gain the upper hand, cryptologists have turned to quantum key distribution (QKD), where quantum bits are used to represent private keys. The main advantage here is that according to the laws of physics, it should be impossible for a hacker to use the key without their interception being detected, which would prevent the sensitive data from being sent.Up till now, the main hindrance to using QKD has been that it requires a lot of heavy duty equipment and a straight line mode of transport between the sender and receiver due to its sensitivity to noise. In their paper, the team from Bristol claim to have come up with a scheme that should allow a way to overcome such restrictions, at least on the receiver side. It’s based on what they call a reference frame independent QKD protocol for polarization of qubits in polarization maintaining fiber—which in essence means they use math (based on measurements made in random directions) to describe a way for moving photons through fiber cables without disturbing their polarizationThe team has not yet built such a device of course, that will need to be done by applied physicists, engineers and computer professionals—thus it’s not yet a certainty that such a device will work as imagined. One sticking point in particular might be whether the real-world system is actually able to overcome the inherent noise sensitivity. ( —A team of physicists at Bristol University in the U.K. has proposed a possible way to allow for quantum cryptography between a large station and a small hand held device. They describe such a technique in a paper they have uploaded to the preprint server arXiv. © 2013 Experimental set-up for client-server rfiQKD. The server side holds a telecom wavelength (1550 nm) laser with a 1 MHz pulse generator (PG) and fixed polariser, to send light pulses to the client through a polarisation maintaining fibre (PMF). At the client side, an integrated polarisation controller (PC) encodes qubits into the polarisation of the attenuated (Att.) light. A fibre beam splitter (FBS) and photodetector (PD) continuously monitor power for malicious attacks. Qubits received back at the server side are measured with a similar PC, fibre polarising beamsplitter (FPBS), and superconducting single photon detectors (SSPDs), all controlled by an electronic board synchronisation (Sync.), function programmable gate array (FPGA), and processor. The Bloch sphere illustrates the effects of an unstable environment on polarisation. Credit: arXiv:1308.3436 [quant-ph] Explore further More information: Reference frame independent quantum key distribution server with telecom tether for on-chip client, arXiv:1308.3436 [quant-ph] demonstrate a client-server quantum key distribution (QKD) scheme, with large resources such as laser and detectors situated at the server-side, which is accessible via telecom-fibre, to a client requiring only an on-chip polarisation rotator, that may be integrated into a handheld device. The detrimental effects of unstable fibre birefringence are overcome by employing the reference frame independent QKD protocol for polarisation qubits in polarisation maintaining fibre, where standard QKD protocols fail, as we show for comparison. This opens the way for quantum enhanced secure communications between companies and members of the general public equipped with handheld mobile devices, via telecom-fibre tethering.via Arxiv Blogcenter_img Citation: Physics team suggests possible way to make quantum cryptography available in handheld machines (2013, August 30) retrieved 18 August 2019 from Journal information: arXiv This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. Engineers achieve first airplane to ground quantum key distribution exchangelast_img read more

Scientists uncover universal features of first passage under restart

first_img Japan court gives go-ahead for restart of two nuke reactors This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. Sample applications of first passage under restart: (Top) During a search and rescue mission, a team of searchers might need to temporarily stop searching, return to base, and start again. (Middle) A computer algorithm performing a random search may start down the wrong path, but programmed restart could give it a second chance. (Bottom) A molecule prepared in an excited state may decay to a low-energy state without forming a desired product, but the molecule could be excited again by a laser pulse. This time, a different chemical reaction could occur in which the desired product is formed. Credit: Pal et al. ©2017 American Physical Society While first passage under restart has been used to describe a wide variety of processes, part of the problem with this variety is that currently there is no general, unifying approach that could be applied regardless of the particular details of the process or restart mechanism.By developing a general framework for first passage processes under restart, Pal and Reuveni have addressed this problem. Using this framework, they then identified an optimal strategy, called sharp restart, that outperforms all possible restart strategies in terms of attaining the shortest average first passage time. As the researchers explain, sharp restart is very simple in essence: simply stop the process and start it anew after some fixed amount of time, with the exact amount of time depending on the problem. The results have a wide variety of potential applications.”In foraging theory, one studies the movement of animals searching for food, mates and shelter in the wild, and it’s quite fascinating to see how animals try to optimize their foraging activities,” Pal said. “First passage under restart can then be used as an idealized description for some of these activities. One possible, yet unexplored, direction in which this could be taken is the study of prehistoric migration patterns of human groups searching for new and more accommodating territories. “Another application is in the development of more efficient search strategies that may aid in finding lost objects, or help construct rescue operations for crashed airplanes or lost submarines. Search processes also naturally appear in the context of biochemical reactions when one molecule searches for a reactive target site, and first passage under restart could also be used to describe enzymatic reactions.”Currently, one drawback of the sharp restart strategy is that it may be hard to implement using molecules due to the high energetic cost. In the future, the researchers plan to further analyze this problem to come up with nearly optimal restart strategies that perform almost as well but consume less energy. These strategies could become especially important in living cells or in man-made molecular devices.”Restart is routinely used to expedite the completion of randomized computer algorithms, but its importance in physical, chemical, and biological processes is just starting to be realized,” Pal said. “We intend to explore restart in these contexts and are particularly interested to find out if biological systems have found a way to also take advantage of restart and the benefits it can offer.” © 2017 Journal information: Physical Review Letters (—Discovering the ways in which many seemingly diverse phenomena are related is one of the overarching goals of scientific inquiry, since universality often allows an insight in one area to be extended to many other areas. Citation: Scientists uncover universal features of ‘first passage under restart’ (2017, February 1) retrieved 18 August 2019 from Working along these lines, researchers in a new study have developed a general framework for the “first passage under restart” model, which describes a wide range of statistical phenomena in physics, chemistry, biology, finance, and other fields. By identifying an optimal strategy and showing that it cannot be outperformed by any other strategy, the researchers have taken steps toward improving the performance of many diverse processes with a wide range of applications, such as efficient computer coding, biochemical reactions in cells, and wildlife foraging.The researchers, Arnab Pal at Technion-Israel Institute of Technology and Shlomi Reuveni at Harvard Medical School, have published a paper on their development of a general theoretical framework for first passage under restart in a recent issue of Physical Review Letters.”We have developed a theoretical framework for first passage under restart,” Pal told “The framework is extremely general and offers applications to a wide and diverse class of problems in computer science, computational physics, biophysics, non-equilibrium statistical physics, and more.”First passage under restart is a variation of the “first passage time” framework, which was originally developed in the context of non-equilibrium systems and used, for instance, to study the time it takes for a particle with random motion to reach a certain location. More generally, the first passage time is the time taken for any random variable to reach a certain threshold value. It is especially useful for accounting for the inherently probabilistic nature of statistical processes, such as neuron firing, fluorescence quenching, or stock market activity.More recently, researchers have investigated what happens when a process is stopped and started again from its initial starting point. Studies have shown that restart can have advantages for certain problems that “get off to a bad start”—for example, a search algorithm that randomly scans for a solution to a problem, but starts off searching along a path that goes in the wrong direction. Restart could then help rescue a futile search by starting it anew. More generally, restart could help in a situation when it is unclear if the process will end quickly or only after a long period of time. Explore further More information: Arnab Pal and Shlomi Reuveni. “First Passage under Restart.” Physical Review Letters. DOI: 10.1103/PhysRevLett.118.030603last_img read more

Tallness in Herzegovinian men linked to gene passed down from ancient big

first_img(—A team of researchers with members from Montenegro, the Czech Republic and Croatia has found a possible genetic link between early big-game hunters of the Upper Paleolithic Gravettian culture and modern Herzegovinian men. In their paper published in the journal Royal Society Open Science, the group describes how they surveyed a large number of Bosnian and Herzegovinian men and compared what they found with a gene believed to be at least partly responsible for causing people to grow taller than average. More information: Pavel Grasgruber et al. The mountains of giants: an anthropometric survey of male youths in Bosnia and Herzegovina, Royal Society Open Science (2017). DOI: 10.1098/rsos.161054AbstractThe aim of this anthropometric survey, conducted between 2015 and 2016 in Bosnia and Herzegovina (BiH), was to map local geographical differences in male stature and some other anthropometric characteristics (sitting height, arm span). In addition, to investigate the main environmental factors influencing physical growth, the documented values of height would be compared with available nutritional and socioeconomic statistics. Anthropometric data were collected in 3192 boys aged approximately 18.3 years (17–20 years), from 97 schools in 37 towns. When corrected for population size in the examined regions, the average height of young males in BiH is 181.2 cm (181.4 cm in the Bosniak-Croat Federation, 180.9 cm in Republika Srpska). The regional variation is considerable—from 179.7 cm in the region of Doboj to 184.5 cm in the region of Trebinje. These results fill a long-term gap in the anthropological research of the Western Balkans and confirm older reports that the population of the Dinaric Alps is distinguished by extraordinary physical stature. Together with the Dutch, Montenegrins and Dalmatians, men from Herzegovina (183.4 cm) can be regarded as the tallest in the world. Because both nutritional standards and socioeconomic conditions are still deeply suboptimal, the most likely explanation of this exceptional height lies in specific genetic factors associated with the spread of Y haplogroup I-M170. The genetic potential for height in this region could then be the greatest in the world. Future studies should further elucidate the roots of this intriguing phenomenon, which touches an important aspect of human biodiversity. Human chromosomes during metaphase. Credit: Steffen Dietzel/Wikipedia Explore further A tall story: Why do the Dutch tower over us? © 2017 Phys.orgcenter_img This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. It has been noted that men from Herzegovina are taller on average than men in other places—the average male height is just over six feet. But why the men there are so tall has been a mystery, especially considering the relative poverty of the area for very long periods of time. The region, in the Dinaric Alps, actually boasts the tallest average male height, though the Netherlands, a country that has enjoyed a high standard of living and thus a strong diet for a very long time, holds the record for tallest average for an entire nation. To understand why men in Herzegovina are so tall, the researchers started by looking at the I-M170 chromosome, which prior research has shown is highly prevalent in Herzegovinian people—approximately 70 percent have it.The new research entailed surveying 3,207 Herzegovinian men between the ages of 17 and 20 regarding details on height and other body measurements—they found the average male height to be 181.2 cm. They then noted that prior research has shown that people of the Gravettian culture were exceptionally tall, as well, many of them averaging over six feet. They also noted that people in Herzegovina tend to ingest more calcium than people elsewhere due to minerals in the limestone bedrock in the area making their way into food sources. Putting all the data together, the researchers concluded that the most likely cause of larger-than-average height of Herzegovinian men is lifestyle during the Paleolithic—men hunted large animals such as mammoth for survival—such a diet, heavy in protein, combined with small population densities, would have provided ideal conditions for height selection, resulting in increasingly taller men who passed the trait down through their I-M170 chromosome to future generations. Journal information: Royal Society Open Science Citation: Tallness in Herzegovinian men linked to gene passed down from ancient big game hunters (2017, April 12) retrieved 18 August 2019 from read more

Central govt employees complain of language barrier over Panchayat election duty

first_imgKolkata: With notices having started reaching different Central government offices for engaging its employees to conduct the forthcoming Panchayat polls, the issue of “language-barrier” has started cropping up, with most employees having a “non-Bengali” background.According to the sources in the State Election Commission (SEC), directives have been given to engage Central government employees to conduct the Panchayat polls. The Central government employees of all ranks would be required to get involved in the election process, apart from the state government employees. Also Read – Heavy rain hits traffic, flightsThe issue related to the “language barrier” has cropped up as most officials in the Central government offices are from non-Bengali backgrounds and hence, they would face trouble in communicating properly with people in the grassroot level, in the rural parts of the state.In a bid to conduct the Panchayat polls, the officials need to visit different villages of the state, where they would have no other option apart from speaking in the local language. Communicating in local language will also be essential to make the people from the area understand what they actually have to convey. Also Read – Speeding Jaguar crashes into Merc, 2 B’deshi bystanders killedAt the same time, according to a section of the Central government officials, their routine activities will also get hampered, if they are made to go to conduct the forthcoming Panchayat polls.An official of the SEC, however, stated that it is a regular process as both state and Central government employees were earlier involved to conduct Panchayat elections. Accordingly, orders have been issued in this connection as usual and there is no such exemption in the set norms for the Central government employees. The district magistrates play a major role in preparing the list of the manpower needed to conduct the polls. The SEC has held meetings with district magistrates and superintendents of police of all the districts in March, in connection with the Panchayat polls.It may be mentioned that the elections will be held on May 1, 3 and 5. The process of filing nomination has already started from April 2 and it will continue till April 9. The last date of withdrawal of candidature is April 16. The districts where the election will be held in the first phase, include all the South Bengal districts, apart from Murshidabad and Birbhum. Polls in these two districts will be held on May 3, while the same in the North Bengal districts, starting from Malda to Cooch Behar, will be held on May 5.last_img read more

CPIM suspends two secretariat members of Kolkata district committee

first_imgKolkata: The CPI(M) has suspended two secretariat members of the Kolkata district committee for not maintaining discipline of the party. The matter will be taken up by the party on November 15 and the matter is likely to be referred to the party’s Control Commission.It may be mentioned that CPI(M) had dropped Ritabrata Bandyopadhyay, party’s Rajya Sabha MP for flouting party discipline. Kaustab Chattopadhyay and Soumyajit Rajak are both secretariat members of the Kolkata district committee of the party. Also Read – Rain batters Kolkata, cripples normal lifeThere have been allegations of sexual harassment, expenditure disproportionate to the income and luxurious living against both of them. About six months ago, a video about the incident of alleged sexual harassment involving both of them went viral on social media. The matter had created a flutter in the party. Many of the victims had written to the senior party members demanding action against them. The party leaders also did not approve their style of living and both were cautioned. But they refused to obey and went ahead with their lifestyle. Finding no other option, the party suspended them for three months. Senior party leaders said action would be taken against them if found guilty.last_img read more

Super of Panskura Hospital attends to patients amid ceasework by junior docs

first_imgKolkata: On a day when patients were denied treatment in most of the medical college hospitals across the state, the Panskura Superspeciality Hospital has set an example where the hospital superintendent attended to the patients at his chamber. The gesture shown by the medical superintendent has been appreciated by the patients and their relatives who visited the hospital. They said that it was not possible for a single doctor to attend to the large number of patients visiting various outpatient departments, but the attempt initiated by the top official of the hospital is commendable. Also Read – Rs 13,000 crore investment to provide 2 lakh jobs: MamataIt was learnt that the hospital super Sachindranath Rajak found many patients standing in queue in the morning, while many of them had started returning home, after which he picked up his stethoscope and sat at his chamber to attend to the patients. “As the junior doctors decided to observe ceasework, I decided to attend to the patients. Many of the patients were leaving the hospital in the morning as there were no doctors in the OPDs,” Rajak said. Sundarlal Das, a patient who went to the hospital said: “We do not support the attack on doctors. Those who were involved in the incident must be punished. But the doctors should not deny the patients visiting the hospitals. We welcome the gesture by the hospital super.”last_img read more

153yrold Shipwreck Successfully Removed Remarkably Intact

first_imgIt took five days — and it reportedly cost more than $1 million — to remove a 153-year-old shipwreck from a beach in West Auckland, New Zealand, but miraculously it was lifted almost fully intact. The 55-foot schooner Daring was driven ashore by gale force winds in March 1865. It was uncovered by the shifting sands at Muriwai Beach in May 2018, and removed by the “Daring Rescue Team” in mid-December.Photo by Daring Rescue Team“The shipwreck is a significant find, and provides archaeologists with a rare opportunity to record and gather information toward analysis of colonial ship construction and adaptations. The Daring is a great example of this,” says Heritage New Zealand’s Mid Northern Manager, Bev Parslow.Larry Paul, from the Classic Yacht Charitable Trust, told media that volunteers slept on the beach between tides as the ship was excavated.“It’s a beautiful piece of work,” Paul said. “The Daring was made in an earlier era of boat building, and it is the only kind probably in the world that is still fully intact.”Photo by Daring Rescue TeamA shoe, coins, a cup, clay pipes, and multiple wine bottle caps dating to the 19th century were found on the ship.The Daring belonged to Onehunga storekeeper David Kirkwood, according to Recon, commissioned by Heritage New Zealand to laser scan the ship.In its 18 months of service it proved to be a solid, reliable “workhorse,” said Recon. Its final journey was transporting a cargo of grass seed from Taranaki up to the Manukau.Paul said it took months of paperwork to get the necessary approvals to remove it. On December 10th, the removal of the Daring from the sand began when artifacts were taken out of the vessel.Photo by Daring Rescue TeamThe next day, two big excavators on each side of the vessel managed to wiggle out sand from inside the ship.On day three, the Daring was successfully lifted from the sand and placed above the water level mark.“It was a huge challenge, mainly because we had to get it ready and work with the tide,” Paul said. “We had four hours to work on each day and some of the crew slept on the beach waiting for the tides.”Photo by Daring Rescue TeamThe Daring was moved 25 miles (40 kilometres) across Muriwai Beach with a big loader truck.“It took 45 minutes to move it to hard sand, and another two and half hours more after that using road track maps,” he said in the interview with Stuff.Recon reported the events that sent the ship to its resting place of more than 100 years. “Things were going to plan but as the Daring hove off the entrance to the Manukau a strong south-west gale developed and blew the ship off course until the crew found themselves off the Kaipara,” says Parslow.Photo by Daring Rescue TeamDespite all their efforts, Captain Phipps – who was at the helm of the Daring – realized that the ship was being driven onto land. With no chart of the Kaipara on board, Phipps decided to put the ship ashore in as controlled a manner as they could by dropping the anchor just prior to the ship striking the sand in order to ease its landing.Phipps’ decision saved his own life, the lives of his crew, the ship and its cargo.Photo by Daring Rescue Team“The Daring was undamaged, and the crew escaped safely and sheltered on the beach,” said Parslow. “Phipps, two passengers and a seaman set off for Onehunga the next day to get help.”After the ship re-emerged in May 2018, it attracted media attention. Unfortunately, part of the wreck was damaged by scavengers – “one of whom used a chainsaw to cut part of the structure off and take it away.” One of the reasons for the aggressive plan for removal was to protect it from more criminal acts.After being excavated, the Daring was taken to the edge of Muriwai forest and hosed down by the Muriwai Volunteer Fire Brigade.Read another story from us:  Barbra Streisand and Elvis Presley Almost Starred and Sang TogetherIt was then moved to a location in Hobsonville, where it will remain until plans for its preservation and final destination were finalized.last_img read more

Authorities Warn Against Thousands Planning to Storm Loch Ness

first_imgThousands of people have signed up to storm Loch Ness to see if the monster is real. A week after nearly 1 million people signed up for a tongue-in-cheek event storming of Area 51 in Nevada to find proof of alien life, an initiative has sprung up to storm Loch Ness in Scotland in search of its famously elusive monster. As of July 22, 2019, over 60,000 people had signed up to go to Loch Ness on September 21st. The Nessie event details are summed up by a single sentence: “The time is now for us to find dat big boi.”The Royal National Lifeboat Institution (RNLI) is cautioning that the lake is 745 feet deep and even in September people risk cold water shock and hypothermia if they fall into the water.Loch Ness with Urquhart Castle. Photo by Sam Fentress CC BY-SA 2.0“Concerned that hundreds, or even thousands, of people head out on to the loch for Storm Loch Ness on 21 September, the volunteer crew said it could not match the resources being used by the US military to deal with Storm Area 51,” said the BBC.Area 51 has baffled and intrigued people for more than 50 years. The U.S. Air Force warned on July 19, 2019, against visiting the secretive base, saying that “any attempt to illegally access the area is highly discouraged.”The Facebook page encouraging people to go said, “We will all meet up at the Area 51 Alien Center tourist attraction and coordinate our entry. If we naruto run, we can move faster than their bullets. Lets see them aliens.”Officially an outpost of Edwards Air Force Base in California, the site became known as Area 51, which was its designation on maps of the Atomic Energy Commission, in the 1950s. The base covers a total of 2.9 million acres and 5,000 square miles of restricted airspace. It is the largest combined air and ground space for peacetime military operations. Conspiracy theorists are convinced that at Area 51 alien spacecraft have been analyzed and visitors from other worlds confined. Check out a history of Area 51 with the video below:Loch Ness has been a tourist attraction since the 1930s. The Loch Ness monster has attracted more visitors to the Scottish Highlands than many other natural attractions or museums.  The lake draws tourists who are willing to wait around the lake with cameras for hours, all hoping to capture a shot of the famous water monster.The Arthur Grant sighting. Hoaxed photo of the Loch Ness Monster from 21 April 1934.The legend of “Nessy” dates to the 7th Century, but it wasn’t a worldwide attraction until the 20th century, when a London man claimed to have seen the water beast.  Debatable video footage soon followed. There have been many investigations in the latter part of the 20th century, including 24 sonar-equipped boats that scanned the lake’s bottom, but there has never been any evidence announced to the public.However, people persist in believing in the incredible story of a dinosaur-type water monster that hides in the waters of Loch Ness.Sketch of the 1934 Arthur Grant sightingLoch Ness authorities are less than pleased with the planned storming. A spokeswoman said to the BBC: “With no US Army involved, Loch Ness looks a little less hazardous than storming Area 51, but here we have our own set of problems. Our Atlantic 85 lifeboat has an impressive survivor-carrying capacity, but even that will be stretched by the ‘attendees’ of this event.”The Loch Ness statement said that, “joking aside,” there were some facts to share about the water mass: “The water temperature is cold. In fact, an average of six degrees centigrade all year round, meaning cold water shock and hypothermia are real dangers.”In 2015, a kayaker developed hypothermia so quickly after his boat capsized at Loch Ness that he was unable to swim just 15m to the shore, said The Telegraph. He survived the ordeal after being rescued by Loch Ness RNLI.Related Article: The first recorded story about the Loch Ness Monster is of St. Columba in the 6th century trying to protect a swimming monk“Weather conditions and water state can deteriorate rapidly, going from flat calm to a large swell in minutes. There are very few areas on the shoreline where it is possible to make it up to a road,” the RNLI said to The Telegraph.  It also pointed out that the waves in the loch are generated by wind, not a tide and that it was more difficult to swim in than sea water.“Waves are wind generated rather than tidal, so they behave differently to how users might expect. Its fresh water is less buoyant than salt, meaning more effort is required to float/swim.”last_img read more

Is Andrew Luck under the most pressure in the NFL this season

first_img$140 Million over 6 Years… Biggest Contract in NFL History… Congrats to #12!!!— Jim Irsay (@JimIrsay) June 29, 2016 Andrew Luck can finally afford his hospital bills from playing behind the Colts offensive line. Earlier this afternoon Colts Owner Jim Irsay tweeted that the Colts had agreed to a 6 – year extension with franchise quarterback Andrew Luck worth $140 million. The contract makes him the highest paid player in NFL history.Andrew has signed through 2021— Jim Irsay (@JimIrsay) June 29, 2016 Adam Schefter reported the guaranteed base compensation is around $63 million.Andrew Luck’s base salaries during each year of his contract:— Adam Schefter (@AdamSchefter) June 29, 2016Today on Speak for Yourself, Colin and Whitlock debated whether Luck is under the most pressure in the NFL after signing his massive deal. Luck missed 7 games last year after suffering a lacerated kidney, and struggled when he was on the field. With his new contract in hand, the fans and media will expect results regardless of what the Colts put around him.Colin sees Luck as an undervalued stock who’s unfairly taken heat for playing hurt while being surrounded by an awful roster, courtesy of GM Ryan Grigson.“The best player they’ve given him is T.Y. Hilton though the draft. That’s the best  player they’ve given him.” Colin added, “Last year, he plays with a lacerated kidney, I could not host this show with a lacerated kidney.  So we look at last year and go, ‘I’m not sure I buy Andrew Luck.’ Okay, then you sell the stock to me. I’ll buy all of it. This guy has been underwhelmed by the people around him. He’s carrying the franchise,” Whitlock thinks Luck shouldn’t get a break for not having weapons around him when Cam Newton made a Super Bowl while missing his top receiver.“Here’s how Andrew Luck is going to be judged. There’s a guy over in Carolina, who’s about the same age as him. Who lost Kelvin Benjamin, their top wide receiver. Carried his team to 15 victories in the regular season, all the way to the Super Bowl, got the MVP of the league. Whether fair or not, he’s going to be compared to that guy.”Even if Luck is under the most pressure in the league this year, it’s not like the former #1 pick, who was drafted to replace Peyton Manning, isn’t used to it. Advertisement “This guy has been underwhelmed by people around him. He’s carrying the franchise!” –@ColinCowherd on Andrew Luck— Speak For Yourself (@SFY) June 29, 2016last_img read more

NBA players are walking all over Commissioner Adam Silver

first_imgAdam Silver is too close to the players, and they’re eating him aliveThe Cavs sat their starters again, and the epidemic of healthy scratches is making the NBA look bad to the consumer and its television partners. Unlike David Stern, who was a friend to the owners and a hardliner with players, Adam Silver has become too close to the players and now they’re taking advantage of him.Silver wants to be the good guy, but pro sports commissioners need to be able to take unpopular stances and look like the “bad guy.” This problem is of Silver’s own making, and to fix it he needs to start being more like David Stern and Roger Goodell, and less like a substitute teacher.Russell Westbrook shouldn’t come close to winning MVPRussell Westbrook had another substandard national TV game against the Warriors last night, but people will still apologize for him. People who value triple doubles as the be-all-end-all of player value love Westbrook, but Colin sees it differently.He thinks Westbrook is a delusional volume chucker who is shooting more than ever and with a lower shooting percentage than ever. That won’t make him any less popular, but Colin sees through act. Westbrook is all about Westbrook, he’s not making anyoone else better.“He’s a delusional ball hog, and he’s bad in television games.”Guests:Sam Farmer – L.A Times NFL reporter is in-studio to discuss the Tom Brady jersey video; why Marshawn Lynch to the Raiders should happen; if Colin Kaepernick will get signed; if Romo to the Texans is a possibility; and the top stories from next week’s league meetings.“Cousin Sal” Iacono – Actor and comedian is in-studio to break down the NCAA Tournament so far; if he would avoid hiring Wichita State’s Gregg Marshall because of his wife’s antics; and why Duke is so easy to hate.Jay Glazer – Fox Sports NFL Insider to release an extended version of the Tom Brady jersey thief video; why the identity of the thief is shocking; and why there is likely more fallout to come.Jim Jackson – 14-year NBA veteran and FS1 NBA Analyst is in-studio to break down the NCAA tournament to this point; why Coach Cal doesn’t get credit; if Gregg Marshall’s wife’s antics are a problem; and if NBA players are taking advantage of Adam Silver.Peter Schrager – Fox NFL Insider joins the show to discuss the upcoming NFL owner’s meetings; if Marshawn Lynch will end up with the Raiders; and his latest NFL mock draft.last_img read more

Whats Next For IP Networks

first_img Opinions expressed by Entrepreneur contributors are their own. 4 min read Paul KorzeniowskiIP networks are ubiquitous. They move information in corporations, transmit data to mobile executives, and support telecommuters. One of the last bastions of proprietary networks has been intelligent building systems and devices, but it appears that IP is now ready to break into that area as well.While networks have been used to automate many types of devices, their prices have been too high for certain markets, such as sensors for lights, temperature controls, actuators, security systems, and appliances. These devices have been largely controlled by proprietary devices and networks, which have been difficult to deploy and support. A consortium of suppliers, the IP for Smart Objects (IPSO) Alliance, wants to change that.The organization plans to use IP to collect and move information from sensors, actuator-equipped devices, and intelligent appliances. The consortium has been trying to align its work with that done by the Internet Engineering Task Force and the Institute of Electrical and Electronics Engineers (IEEE). Adding more intelligence to industrial devices would enable vendors to develop sophisticated applications, such as end-to-end utility metering, integrated home and building automation, industrial systems, asset tracking, “smart cities,” and “smart grids.”The idea sounds appealing. By going with an IP alternative, companies would be able to move data from industrial networks to corporate networks. Also, maintenance challenges should diminish because network technicians would work with familiar IP-based network management tools rather than be forced to develop new skill sets.Because of the benefits, the IPSO Alliance has gained support from more than two dozen companies. Noteworthy backers include Arch Rock, Cisco, Emerson, Freescale, SAP, and Sun Microsystems. In addition, end users, such as Duke Energy, have decided to lend a hand to the work.While it has appealing attributes, the initiative faces some challenges, starting with a couple of alternate networking options, most notably ZigBee. This networking approach is based on the IEEE’s 802.14.5 standard and supports wireless networks where a network coordinator (or master device) collects information from up to 65,000 remote devices.ZigBee was not built to work with computers but instead with simple home and industrial devices, some so simple that they consist of a network connection, a very unsophisticated CPU, and a pair of AAA batteries. ZigBee’s focus has been on supporting home area network (HAN) functions, such as controlling light switches, smoke detectors, thermostats, appliances, video and audio systems, sprinkler systems, and security products.ZigBee has been a standard since 2002 and is now moving toward large deployments while IPSO is still in the development stage. One area where ZigBee has been gaining traction is advanced metering infrastructure. Energy companies have used wireless technology to push intelligence down to the poles outside of customers’ homes and businesses; ZigBee has the potential to extend their reach into the home.The ZigBee Alliance is an ad hoc association of vendors working together to further that goal. The group developed the Smart Energy public application profile, which outlines a common set of energy management functions and protocols, so different suppliers’ devices can interoperate. In May, the consortium announced that 19 products had been certified as Smart Energy compliant. Also, Southern California Edison announced plans to deploy Itron ZigBee meters to automate energy management for 5.3 million homes and businesses from 2009 through 2012. Dallas utility Oncor Electric Delivery Co. plans to use Landis+Gyr Holdings smart meters to upgrade service for 7 million customers during the next four years. Partly because of such public support, market research firm WTRS expects shipments of ZigBee meters to increase from 500,000 in 2008 to 19 million in 2012 worldwide.At this stage, the IPSO Alliance’s work is more promise than reality. It hopes to have an interoperability program in place by November. The earliest deployments may start is 2009, and large rollouts could be a couple of years away.One other standard has been vying for attention. Nokia has pushed its Wibree technology into the HAN marketplace. Wibree is an extension to the popular Bluetooth technology, one tweaked so it requires less energy and is better able to process data intermittently rather than continuously. It too is in an early stage of development.Now that talk about pushing networking technology down to dumb devices is turning to reality, it raises the question, “Is there anywhere else to drive IP?”Paul Korzeniowski is a Sudbury, Mass.-based freelance writer who has been writing about networking issues for two decades. His work has appeared in Business 2.0, Entrepreneur, Investor’s Business Daily, Newsweek, and InformationWeek.center_img October 14, 2008last_img read more

Hacker Duo Brings Bricked Apple Devices Back to Life

first_img 1 min read Register Now » Growing a business sometimes requires thinking outside the box. May 22, 2014center_img Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global While an antitheft ‘kill switch’ on all mobile devices may be imminent if lawmakers have their way, hackers have already ascertained a way to bring ‘bricked’ Apple devices back to life.A duo dubbed Team DoulCi — a reference to Apple’s iCloud spelled backwards — have created a program in which users can plug bricked iPhones and iPads into their computers, whereupon they emerge entirely resurrected.The hackers, @MerrukTechnolog and @AquaXetine, say the program works by bypassing Apple’s cloud. Though the program was “built with love” and intended for theft victims who managed to recover their stolen devices, they claim, it has inevitably been a boon for criminals as well.For instance, thieves on Twitter have shared pictures of as many as seven resuscitated iPhones and iPads, according to CNN.While the program is available for free, the team — which calls themselves “brothers for life” — are accepting donations on their website via PayPal and Bitcoin.Related: How Thinking Like a Hacker Will Grow Your Businesslast_img read more

The Top 5 Challenges Facing Big Data Startups Today

first_img This hands-on workshop will give you the tools to authentically connect with an increasingly skeptical online audience. Not long ago, big data was a niche topic. But, fast-forward a few years, and today it’s the fuel driving most data-driven businesses. What’s more, big data is informing strategy, boosting operational efficiency and accelerating growth.Related: Watch Out! Here Comes Big Data 2.0Financial investment has meanwhile kept pace with the data boom. Some 75 percent of organizations say they’ve spent on advanced big data infrastructure or plan to in the next couple of years. And a flood of new and exciting big data-focused startups have arrived to satisfy the growing appetites of enterprise customers.But as attractive as the big data space is, it can be a tricky sector for new entrepreneurs. Consider that 66 percent of all startups fail within the first 12 months. Though big data businesses may feel confident that they’re entering a hot space, stumbling blocks await. They need to be anticipated and considered.Here are five of these critical challenges facing big data startups today.1. The lack of talentBig data is the definition of a growth market: Six out of ten IT decision-makers expect their organizations to spend more on big data initiatives this year, with only 5 percent anticipating any type of budget decrease. But, while the category has ballooned, the biggest question is whether this growth will outpace the talent needed to implement it and scale its adoption. And the answer is yes, that problem is real.According to the McKinsey Global Institute, the market will be short 1.7 million capable big data professionals in the United States by 2018 — about the same time that the U.S. data market is set to be worth $41.5 billion. As the category expands, the skills gap will widen. Startup staffing and personnel — the key to competitive advantage in an aggressively growing space — will become even more challenging. There is no easy solution, as the only true fix is years away, when the talent pool will have naturally deepened to meet the market demand. (There’s also a hint of irony here because many big data startups, trying to help mitigate the lack of talent in the market via their own software, still face the same problem.) 2. The cost of talentSome 71 percent of businesses and IT organizations consider themselves either average or lagging when it comes to leveraging data. There’s clearly a need to improve overall talent capabilities and education for the existing workforce. However, when staff training is paired with the shallow talent pool that currently exists, to keep up with newly developed products and approaches entails a significant cost.Collectively, such operational expenses ran companies over $130 billion worldwide in 2013; and, given the fast-paced nature of the data business and the subsequent need for more personnel and continuous training, these costs will only skyrocket for entrepreneurs hoping to plant a flag.Related: Why Your Startup Needs to Be Data Mature From the Beginning3. Fighting mis-educationIn a recent piece about Hadoop, the Wall Street Journal’s Deborah Gage said, “Few buzz phrases are freighted with higher expectations than big data.” The rising “hype” and anticipation of big data’s potential that Gage described have pushed many organizations into blind adoption: They’re eagerly embracing tools that often don’t meet their needs, simply because those tools seem to be the most popular (Hadoop being an example).Further complicating matters is the fact that big data platforms are inherently thick. This makes it challenging for vendors to articulate functionality and benefits and even more difficult for adoptees to understand the platform. This is why, according to Gartner, “Through 2017, 60 percent of big-data projects will fail to go beyond piloting and experimentation and will be abandoned.” Mis-education is ultimately stalling true scale and success.4. Funding obstaclesThe data world is blessed with VC attention and eye-popping funding, as proven by Hortonworks and Dataminr’s recent $100 million rounds. But in many ways, the race for cash is becoming detrimental to new players.As the sector has grown crowded, it’s more challenging for the typical entrepreneur to separate his or her company from the rest of the pack, because so many companies like Palantir, MongoDB and Mu Sigma (all of which have at least $200 million in funding) are already well known by the investor community. And, because funding has increased, at some point we can expect investors to become more tentative in their commitments to earlier-stage ventures and instead invest in more established up-and-comers.5. Big competitionWith global spending on big data predicted to hit $125 billion in 2015, startups aren’t alone; they face brutal competition from billion-dollar legacy companies like SAP, Microsoft and IBM. These giants can release feature updates to products that cannibalize entire startups. Their capital is infinite, while startups have to focus their efforts more narrowly simply to maintain their cash-burn rate.And this is actually a good thing. The best way for startups to find success and maintain leads over massive competitors is to focus on a niche and do it well. Larger companies are always on the prowl for ways to gain the competitive edge. So when startups prove themselves to be a standout in a particular niche, across storage, preparation or analytics, bigger players that may be considering entering that area will typically find acquisition a more attractive alternative than building those capabilities in-house from the ground up. The lesson here: Building a successful big data business isn’t for the fainthearted. But if you anticipate and prepare for the five challenges described, you can play a major part in the category’s continued and impressive growth.Related: Madison Ave.’s New Kids On The Block: How Big Data Is Shifting Advertising’s Landscape  May 7, 2015 6 min read Opinions expressed by Entrepreneur contributors are their own. Free Workshop | August 28: Get Better Engagement and Build Trust With Customers Now Enroll Now for Freelast_img read more

Is Paying up the Only Response to Ransomware

first_img Opinions expressed by Entrepreneur contributors are their own. May 19, 2016 5 min read Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global Register Now » Growing a business sometimes requires thinking outside the box. Imagine walking into your office one morning to find a padlock on your computer. Sitting at your desk is a masked criminal demanding $5,000 for the key. Naturally, you hesitate, to weigh the options. Do you pay this criminal, hoping the key works and he or she vanishes forever? Or, do you ignore the criminal and spend days trying to recover your locked files?Related: Is ‘Ransomware’ Terrorizing Your Site Visitors?This is what ransomware is like. It’s a type of malicious software that blocks access to computer systems until money is paid. Ransomware is one of the most pervasive threats to businesses today, especially with the emergence of crypto-ransomware, which encrypts files on victims’ computers and holds them hostage until a payment is received.The impact is huge: CrytpoWall reportedly infected hundreds of computers between April 2014 and June 2015, racking in approximately $18 million from victims who chose to pay.Contrary to popular belief, the worst part of ransomware isn’t even the ransom. The true damages occur due to employee down time, which can last for days, halting business operations and jeopardizing sales.Ransomware attacks are growing in frequency, largely due to the increasing processing power of computers, which enables criminals to encrypt files in only a few hours, and the rise of anonymous payment systems such as Bitcoin, which makes it easy for criminals to accept payments with less fear of being traced.Hollywood Presbyterian Medical Center understands this well after losing access to its PCs during a ransomware outbreak. The hospital forfeited $17,000 to hackers after employees spent 10 days relying on outdated fax machines and paper charts. And there are many other such stories out there: Each new attack serves as a stark reminder that prevention, containment and business continuity techniques are crucial to keeping companies up and running in today’s threat landscape. This especially holds true when advanced ransomware, like TeslaCrypt, adds features that are “impossible” to crack.It’s clear, then, that ransomware doesn’t discriminate. A recent report revealed that 48 percent of IT consultants surveyed across 22 different industries said they’d witnessed an increase in ransomware-related support inquiries in the previous 12 months from small businesses and enterprises alike.So, no business or employee is safe. What can businesses do to prepare for what seems an inevitable ransomware attack? And, how can they avoid paying the ransom which will only serve to encourage criminals to repeat their wrongdoing? Here are three strategies:1. Implement email defense software.First and foremost, companies need to ensure that their email defense can recognize and block malicious web pages, or infected USB drives and zip files. For this reason, email defense solutions adopted need to go beyond anti-spam and virus-scanning; they should be sophisticated enough to recognize and block phishing attempts, which can spread ransomware.2. Educate employees.Email is the most common infection vector for ransomware, making it imperative that businesses create strong education programs to train employees to spot suspicious activity. Ransomware is hard to pinpoint, so it’s important for employees to know what to look for.Additionally, these education programs should notify employees of the appropriate steps to take once a device exhibits the behavior of an infection. For example, do employees know to close their computers immediately in the event of a suspected ransomware attack? Do they know to take their computers directly to IT, so IT can isolate the device from the corporate network?Related: How Network Segmentation Can Help Entrepreneurs Manage Ransomware Risks3. Set up real-time backup systems.During a ransomware attack, what matters most is how quickly a business can get its employees back to work. Businesses are finding traditional back-up and file-sharing solutions inadequate because they don’t operate in real time.Employees should be able to instantly roll back their file archives to a point immediately before the infection hit and access their files from alternate devices. Modern business continuity solutions that combine real-time backup, mass file restores and remote access can combat threats by minimizing the crippling effects of down time.Infected users can stay productive, and businesses can dodge the need to pay a ransom — which may or may not actually release the locked files. According to a recent study, 19 percent of companies that paid ransom didn’t end up getting their files back.While businesses can’t control when they are attacked, they can control how well they are prepared. Many businesses have plans in place for natural disasters, power outages and other disruptions. Few have “e-crisis” response plans for threats like ransomware. It’s one of the reasons why ransomware is so disruptive for businesses and so profitable for criminals.Related: How Network Segmentation Can Help Entrepreneurs Manage Ransomware RisksSo, don’t give into cyber criminals by offering up Bitcoin payments, and shedding tears and suffering lost business. Instead, build out a continuity plan that keeps your business running as usual even during a ransomware outbreak.last_img read more

How to Back Up an iPhone iPad or iPod Touch Using iTunes

first_img Problem Solvers with Jason Feifer Opinions expressed by Entrepreneur contributors are their own. 3 min read If you own an Apple mobile device, you have no excuse for not backing it up, because Apple gives you two very simple and free ways for duplicating and storing a copy of your information: iCloud and iTunes.The benefit of backing up using iCloud is that it’s largely automated and can happen wirelessly. The downside is Apple only gives you 5GB space for free, so if you need more, you have to pay for it.With iTunes, you don’t face quite the same space limitations. It creates backups of your iPhone, iPad or iPod touch right on your computer. Therefore, the amount of space allotted to your backups is fully in your control. It’s a slice of the free space on your PC or Mac. If you back up using iTunes, you can do it by connecting your iO device to your computer or by turning on wireless syncing with iTunes over Wi-Fi. Let’s see how it’s done.How to back up iPhone or iPad using iTunesBefore you make a backup of your iPhone or iPad using iTunes, it’s a good idea to check whether you have the latest latest version of iTunes (go to Help > Check for Updates), but it’s often not necessary.Wireless syncMake sure iCloud is turned off. On your iPhone, go to Settings > [Your Name] > iCloud > iCloud Backup and toggle iCloud Backup to off. Then go to Settings > General > iTunes Wi-Fi Sync, which will prompt you to connect your iPhone to your PC. Sign in to iTunes using your Apple ID and look for the small iPhone icon.In the menu that appears on the left, select Summary and scroll down to Options. Select “Sync with this iPhone over Wi-Fi” and click Apply on the bottom right.Disconnect your iPhone from the PC; if your PC and iPhone are on the same Wi-Fi network, your phone should appear in iTunes and allow for wireless backups.With a CableConnect your iPhone or iPad to your computer and launch iTunes. Your phone will appear as a small icon up top.Click that phone icon, and in the left-hand menu under Summary, click the items you want to back up. If it’s music, for example, click Music and check the box next to Sync Music. Choose whether you want to back up your entire library or select tracks and albums. Click Apply and do the same for movies, TV shows, and whatever else you want to sync. Hear from business owners and CEOs who went through a crippling business problem and came out the other side bigger and stronger. September 20, 2017 Listen Nowlast_img read more

A Comparison of GNULinux Dock Applications

first_imgA Comparison of GNU/Linux Dock Applications by Mike Turcotte-McCusker on May 17, 2017 in Linux – Last Update: May 16, 2017 – 12 commentsOne of the things that many users love about Apple MacOSX is the dock at the bottom of their screen.But docks are not exclusive to Mac users, rather Windows, GNU/Linux, and even BSD users can all have the handy tool on their desktop.GNU/Linux users have quite a few at their disposal, so I thought perhaps a comparison might be in order.I use Arch Linux with Cinnamon as my desktop environment, but all of these docks can be installed on any setup regardless of environment. Although as a note, some docks will require packages from environments that may be outside your current, such as GTK packages even though you run KDE.The docks we will be looking at are:DockyCairo-Dock / Glx-DockPlankDockyI use Docky on my machine daily, it’s become my favourite over the years. It’s lightweight, it’s customizable, it does what I need it to do. Docky is somewhat the halfway point in eye candy between the super flashy Cairo-Dock and the very minimal Plank.Docky has the ability to be hidden, or stay above windows, resized into a full panel mode, zoom on icons adjusted, and multiple backgrounds included.Cairo-DockCairo-Dock (also known as Glx-Dock) is very ‘pretty’, and has the option of utilizing OpenGL for enhanced graphics as well as reducing CPU load. If your hardware can use it (as most modern machines can), it’s quite attractive.Cairo-Dock comes preloaded with many themes, and can even be made to somewhat imitate the Mac theme. The animations are smooth, and it is extremely customizable.Cairo does use slightly more memory than Docky or Plank for example, but still realistically not enough to be of any concern unless you’re running on very old hardware.PlankPlank is designed to be extremely minimalistic. The Plank website says, “Plank is meant to be the simplest dock on the planet. The goal is to provide just what a dock needs and absolutely nothing more.”This is entirely true. Plank is very minimalistic. It hides itself when overlapped by a window by its default behavior, and pops up when your mouse hits the bottom of the screen, or when nothing is obstructing it. There are Plank themes online available, but they are all very minimal as well. If you want a no frills dock, and don’t care for eye candy whatsoever, Plank is definitely the way to go.Other DocksThere are numerous other docks available for GNU/Linux as well, but these are the three most popular. Some others are either outdated / abandoned / deprecated, or are distribution specific such as the Deepin Dock, or Latte Dock which is specific to KDE Plasma.Both offer similar functionality and features to them like the above mentioned docks, but do not run (or at least not easily) outside of their native Desktop Environments. I tried to get both Deepin Dock and Latte to run through my Cinnamon desktop, but was unable.Granted, I didn’t spend longer than five or ten minutes trying, but really; do you want to spend potentially longer just to set up a dock when other solutions are available?Final WordsDocks in my opinion increase productivity and ease of navigation for a graphical interface. Rather than needing to navigate menu screens or application menus, one click on a dock icon will launch whatever you need. Plus, they look fancy!All of the above Docks can be installed through any major distribution package manager that I am aware of; granted I haven’t used every single system out there, so in a worst case scenario and you can’t find it, check out your favourite search engine for how to install the dock you want.What about you? Do you enjoy using a dock, and if so, which one? If not, how come? Let’s hear it in the comments.SummaryArticle NameA Comparison of GNU/Linux Dock ApplicationsDescriptionMike takes a look at several dock applications for GNU/Linux, and here specifically at Cairo Dock, Plank and Docky, plus others.Author Mike TurcottePublisher Ghacks Technology NewsLogo Advertisementlast_img read more

Microsoft Translator integration in Chromiumbased Microsoft Edge

first_imgMicrosoft Translator integration in Chromium-based Microsoft Edge by Martin Brinkmann on April 11, 2019 in Internet Explorer – 9 commentsOne of the things that I missed in current versions of Microsoft’s Chromium-based Edge browser was native translation support.Microsoft released previews of the Chromium-based browser this week; previews are limited to Windows 10 officially (even though there is an option to install the Windows 10 installer on previous versions of Windows) and the Dev and Canary channels.The upcoming web browser is still in a pre-release development phase. While it works just fine as it is, certain features are missing currently. Microsoft revealed some, e.g. Spellchecking support, when it announced the availability of the first public builds of the Chromium-based Microsoft Edge browser.It was not clear up until recently if the new Microsoft Edge would support native translations or if users would have to install the Microsoft Translator extension instead for that.Note: We file this under rumor for the time being as we cannot verify integration of Microsoft’s translate feature in the browser at the time of writing. We will update the article when that happens.Edge with Microsoft TranslatorReports suggest that Microsoft Edge could get native translation support after all. Some users report on Reddit that they get translation options in the latest Microsoft Edge Canary build; others stated that they did not have the translate option in the latest Canary build. It appears that Microsoft is running A-B tests or rolling out the feature gradually over time to the entire population.The classic Microsoft Edge browser did not support translation natively. Users had to install the Translator for Microsoft Edge extension to integrate translation functionality in the browser.Microsoft did add native translate functionality in the Android version of the Edge browser in 2018 however.Microsoft Edge Canary is the cutting edge version of the browser that gets updated daily according to Microsoft.Microsoft Edge displays a translate icon in the address bar when it detects that a web page is not in the system language (maybe also not in any other installed language on the system).image by click on the icon displays options to translate the page into another language similarly to how Google Chrome handles native translations. It is possible to check the “always translate pages from” box to automate translations from that language whenever pages are loaded that are in that language.The main Edge menu lists a “Translate to” option as well, and the settings feature a new preference to enable or disable the translation feature in the Microsoft Edge browser.Closing WordsMicrosoft needs to get the first public release version of the Chromium-based Microsoft Edge browser right, and that includes integrating popular features natively in the browser and offering features that Google Chrome does not offer.Translation is a useful feature, especially when it is integrated in the browser. While not mentioned by users who can use the feature already in Edge Canary, it is Microsoft’s own translation service that Edge uses for these translations.Now You: What does the Chromium-based Edge need to become more successful than the classic Edge?SummaryArticle NameMicrosoft Translator integration in Chromium-based Microsoft EdgeDescriptionOne of the things that I missed in current versions of Microsoft’s Chromium-based Edge browser was native translation support.Author Martin BrinkmannPublisher Ghacks Technology NewsLogo Advertisementlast_img read more