zeroHouse Speaks To The Conservationist And The Romanticist

first_imgAs if designing an energy-neutral, self-sustaining home for four was not enough for Scott Specht and Louise Harpman, of the NYC/Austin-based architectural firm Specht Harpman, the zeroHouse™ has even more appealing features… zeroHouse is prefabricated! Upper floor of zeroHouse, graphic. © Specht Harpman via Bēhance Network Upper floor of zeroHouse, graphic. © Specht Harpman via Bēhance Network Design of living room, zeroHouse graphic. © Specht Harpman via Bēhance Network Lower floor of zeroHouse, graphic. © Specht Harpman via Bēhance Network zeroHouse graphic. © Specht Harpman via Bēhance Network Lower floor of zeroHouse, graphic. © Specht Harpman via Bēhance Network Design of kitchen, zeroHouse graphic. © Specht Harpman via Bēhance Network Design of living room, zeroHouse graphic. © Specht Harpman via Bēhance Network Energy, water, and waste? No problem for the zeroHouse. The solar panels generate all the power, which is stored in a battery for a week, just in case the sun does not wish to shine. The beautiful bay windows are heat-mirror glass that is triple-paned to provide extra insulation, and the zeroHouse collects its own rain water and filters it in four 550-gallon cisterns. Waste is collected in an automated composting unit and used to feed the garden once a year.Automated? The whole house is automated and programmable to minimize electricity use. zeroHouse is even wired with sensors to communicate with your PC. zeroHouse is only 650 square feet but, as designed, every inch of the space is utilized. It does look to be quite comfortable inside. “People think they need a bigger house, but they may just need a better designed one,” Louise Harpman told the Austin Statesman. Below is the layout of the two-story zeroHouse: zeroHouse graphic. © Specht Harpman via Bēhance Network You say that prefab is not your style? Then perhaps you might be just a little tempted by these visions of where you can take zeroHouse by literally packing it up in an extra-large suitcase! zeroHouse graphic. © Specht Harpman via Bēhance Network Indeed the zeroHouse can be placed virtually anywhere, including in 10 feet of water and on hillsides with slopes up to 35 degrees, all due to its helical-anchor foundation that requires no excavation. And when you’re ready to move, you can literally pick up your stakes and go. Solar Home Built by Students zeroHouse graphic. © Specht Harpman via Bēhance Network This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. zeroHouse graphic. © Specht Harpman via TreeHugger.com More information: Specht Harpman — www.spechtharpman.com/Specht Harpman Portfolio, Bēhance Network — www.behance.net/Gallery/zeroHouse/302499Statesman.com — www.statesman.com/business/rea … enest-of-182527.htmlzeroHouse.net — www.zerohouse.net/ Explore further Design of kitchen, zeroHouse graphic. © Specht Harpman via Bēhance Network Citation: zeroHouse Speaks To The Conservationist And The Romanticist (2010, January 26) retrieved 18 August 2019 from https://phys.org/news/2010-01-zerohouse-conservationist-romanticist.html All of the zeroHouse electronics, construction materials, and fabrics are chosen for their durability as well as design appeal. Below are the living room and kitchen designs; color choice is wide. zeroHouse graphic. © Specht Harpman via Bēhance Network © 2010 PhysOrg.com zeroHouse graphic. © Specht Harpman via Bēhance Network zeroHouse will sell for approximately $350,000. Any takers besides me?___last_img read more

Read More


Elephant bird probably wiped out by nest raiders and habitat loss

first_img Citation: Elephant bird probably wiped out by nest raiders and habitat loss (2010, December 21) retrieved 18 August 2019 from https://phys.org/news/2010-12-elephant-bird-raiders-habitat-loss.html Fifty years ago Sir David collected a giant fossilized egg over 25 cm long and has kept it in his cellar ever since. The bird that laid the egg was around three meters tall, weighed over 450 kg and roamed the island until perhaps as late as a few centuries ago. It is not known what caused the extinction of the elephant bird, but theories include the effects of climate change, human hunting, and the diseases that came with the domesticated fowls that accompanied the humans.Madagascar is an island of the east coast of Africa, which Sir David first visited in 1960 to film an episode of Zoo Quest, a popular TV series. After finding fragments of a fossilized shell, he offered the locals a reward if they could find him more pieces, and a little boy presented him with a complete set of fragments Attenborough later had professionally stuck together.Humans are believed to have arrived in Madagascar about 2,000 years ago, but the elephant bird and humans coexisted for many centuries. Sailors visiting Madagascar in the 17th century returned to Europe with reports of seeing the giant birds, and with samples of the eggs. It is thought that the birds were fully extinct by the early 18th century. Explore further Researchers now believe that most of elephant bird populations had disappeared by about 1,000 years ago and only those in remote parts of the island survived. Dr. Tom Higham of the research laboratory for archaeology at Oxford University said they had dated “quite a few” elephant bird eggs and the youngest they had found was dated at about 900 AD, a time at which the human population was expanding. Sir David had his own fossil egg dated and found it was about 1,300 years old, much older than he had thought.Sir David says there is now compelling evidence the human inhabitants of the island stole the eggs for food, even though they revered the birds themselves, and the nest raiding plus destruction of the native forest habitats led gradually to their extinction. Restoration of Aepyornis maximus. Image credit: Wikipedia. © 2010 PhysOrg.com Elephant Bird Egg, Hungarian Natural History Museum. Scientists tease DNA from eggshell of extinct birds (PhysOrg.com) — Sir David Attenborough has returned to the island of Madagascar to discover the fate of the elephant bird, the largest bird ever to live on Earth, and to make a BBC documentary about it: “Attenborough and the Giant Egg.” Evidence for the theory comes from recent archaeological findings of shells of elephant bird eggs among the remains of ancient camp fires, which suggest the eggs were used for food. At around 150 times the volume of a hen’s egg, one egg would easily feed a number of families.It is unlikely that the giant bird, which was much bigger than today’s ostrich, was hunted to extinction, according to Sir David, who thinks stealing the eggs and loss of habitat were much more likely cause of their demise. In the new documentary Sir David examines the latest evidence and returns to some of the sites he visited 50 years ago, the first time he has deliberately returned to a place he had previously visited. He said 50 years ago the forest in the area was extensive, and now all that is left is an abandoned saw mill. The human population on the island has tripled, and all the previously wild places are being replaced with villages and rice fields. The changes leave many other species, including the rare Lemur, now critically endangered. This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.last_img read more

Read More


The Meka Robotics M1 A customizable humanlike bot at 340000

first_img The Meka Robotics’ M1 has a human like appearance. It has a head with two eyes and an adjustable torso that allows it to go between the height of an average sitting human and an average standing human. The M1 does not, however know how to walk like a man. It has bypassed the idea of bipedal locomotion in favor of a motorized wheel base. That does limit its mobility, but unlike walking robots, like Asimo, it does not spend a lot of time and processing power on walking that can be better used on tasks. Explore further © 2010 PhysOrg.com The choice of using modified Microsoft Kinect sensors allows the robot to see the world in some semblance of 3D, which is important if the robot wants to be able to act in the real world, which is the goal of these bots, human-like action.These robots are expected to retail for about $340,000 for a user-customizable design, which means that you will not likely see them at the corner store, but when they are ordered the customer will get exactly what they need from the bot. The market for these bots in expected to be universities and in-house research facilities. Scientists study robot-human interactions More information: mekabot.com/products/m1-mobile-manipulator/ (PhysOrg.com) — San Francisco-based company Meka has introduced the Meka Robotics’ M1. The Meka Robotics’ M1 is a mobile robot that features a pair of dextrous arms with what is known as compliant force-control (a set of sensors that measure how much force is being used for each task, in order to keep the robot from breaking items or hurting humans) and some modified Microsoft Kinect sensors. Citation: The Meka Robotics’ M1: A customizable human-like bot at $340,000 (2011, February 25) retrieved 18 August 2019 from https://phys.org/news/2011-02-meka-robotics-m1-customizable-human-like.html This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.last_img read more

Read More


One third of those surveyed said they will buy iPhone 5

first_imgAccording to Pricegrabber, of 2,852 online shoppers recently polled, thirty five percent of them plan to buy an Apple iPhone when it’s released sometime this fall. Furthermore, a full sixty nine percent of them, when asked which kind of smart phone they’d most like to receive as a gift, chose the iPhone 5, a smart phone that consumers have yet to even see. Pricegrabber says the results are from a poll of online consumers, but doesn’t indicate if that only includes customers who visited the Pricegrabber website, which if true, would obviously offer skewed results. It might also be noted, that online consumers, as opposed to those that shop mainly via other methods (or aren’t shopping at all) are likely to be those oriented to buying a smart phone in general. Finally, according to a recent Pew report only 35% of all Americans own a smart phone of any kind, so unless they are going to all be replaced with the new iPhone, the figures quoted by Pricegrabber should be taken in a very narrow context. Still, no matter how you look at it, the results are impressive evidence of the loyalty many current iPhone owners have for the Apple brand.Other data garnered from the study shows that of the consumers surveyed, fully fifty one percent plan to buy the iPhone 5 within the first year of its debut; thirty percent by the end of the first month, and seven percent sometime in the first week. Taking things a step further, Pricegrabber also asked those surveyed which phone OS they prefer and once again Apple won big. Forty eight percent of them chose Apple iOS, while only nineteen mentioned the Android OS. Next in line was Microsoft Windows with seven percent followed by six percent for RIM Blackberry.Not bad for a phone line that has only been around since June of 2007.In addition to asking consumers about which phone they want, they also asked which features they’d most like to see Apple incorporate in the next iteration of their smart phone. Most (59%) said better battery life, after that, consumers wanted to see lower cost (55%), 4G compatibility (46%), a larger display (45%) and a better camera (42%). When asked how they use their smart phones in general, the majority (88%) said for talking.Though Apple has not said when the iPhone 5 will hit the market, most experts seem to believe it will be sometime in the fall, likely to take advantage of the holiday shopping crush. But since its Apple, no one really knows, and that’s most certainly the way the company likes it. Explore further © 2010 PhysOrg.com Survey: Smart phone market up 96 percent in Q3 Citation: One third of those surveyed said they will buy iPhone 5 (2011, July 28) retrieved 18 August 2019 from https://phys.org/news/2011-07-surveyed-iphone.html This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.last_img read more

Read More


Rhesus monkeys found to see faces in inanimate objects too

first_imgCredit: Current Biology (2017). DOI: 10.1016/j.cub.2017.06.075 A team of researchers at the U.S. National Institute of Mental Health has found that rhesus monkeys, like humans, recognize face-like traits in inanimate objects. In their study published in the journal Current Biology, the researchers describe experiments they carried out with monkeys looking at photographs and what they learned from them. More information: Jessica Taubert et al. Face Pareidolia in the Rhesus Monkey, Current Biology (2017). DOI: 10.1016/j.cub.2017.06.075 Humans are notorious for seeing face-like characteristics in inanimate objects—the likeness of an old woman in a sliced tomato, Jesus in a potato chip, etc. Such recognition is known as pareidolia, and has been studied extensively in humans. But does it also happen with animals? That is what the researchers with this new effort sought to learn. They chose a relatively obvious animal for a subject, rhesus monkeys. Not only are they more human-like than most other animals, but they are also very social, which prior work with humans has suggested is very strongly tied to pareidolia.The team worked with five of the monkeys, showing them pairs of pictures on a computer screen while timing how long they looked at them. Prior research has shown that rhesus monkeys, like humans, tend to stare longer at faces than at other objects. The monkeys were shown pictures of objects that a group of humans had already approved as having face-like characteristics. They were also shown pictures of similar objects without face-like characteristics. And for comparison, they were also shown pictures of the faces of other rhesus monkeys.The researchers found that the monkeys did, indeed, fixate on those images with face-like characteristics longer than similar objects without such characteristics—and strangely, longer even than they looked at the faces of other monkeys. They also fixated on features resembling eyes and mouths. The researchers discovered this by also using a camera with face-tracking software to note where the monkeys were focusing their attention.The results of their experiments, the researchers note, suggest that rhesus monkeys do, indeed, recognize faces in objects, which makes sense, the team further notes, because face recognition for them is important for maintaining social contact in their natural environment. © 2017 Phys.org How the brain recognizes familiar facescenter_img Citation: Rhesus monkeys found to see faces in inanimate objects too (2017, August 28) retrieved 18 August 2019 from https://phys.org/news/2017-08-rhesus-monkeys-inanimate.html This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. Journal information: Current Biology Explore furtherlast_img read more

Read More


Social networks that lead to leadership positions found to differ by gender

first_img © 2019 Science X Network Journal information: Proceedings of the National Academy of Sciences Explore further For students working toward an MBA, connections are extremely important. Who you know can mean the difference between landing a leadership position upon graduation or instead, working your way up. In this new effort, the researchers sought to learn more about this process and the ways social networks influence job prospects.The study consisted of analyzing 4.5 million emails exchanged between students at a prestigious business school. The emails were sent by 542 male students and 186 female students over the years 2006 and 2007 (when email was still the main form of online communication). The anonymized emails provided knowledge about the students’ social networks and how such networks impacted their job prospects after graduation. The team combined data from the emails with data from school records to build networking maps that correlated with success after graduation.The data and maps revealed that male students who were part of the “right” networks were 1.5 times more likely to step directly into a leadership position as soon as they graduated, as opposed to men who belonged to less useful networks. Sadly, women did not fare as well. Even if they were in the so-called “right” network, they did not see much of an improvement in their chances for landing a leadership position. But if they belonged to a social network made up of mostly women who did very well at school, they were 2.5 times more likely to step into a leadership position after they graduated.The researchers were not able to explain why female-centric networks offered female job seekers better opportunities, but suggest it might have to do with related social connections with women already in the workforce. Citation: Social networks that lead to leadership positions found to differ by gender for business students (2019, January 22) retrieved 18 August 2019 from https://phys.org/news/2019-01-social-networks-leadership-positions-differ.html Credit: CC0 Public Domaincenter_img A combined team of researchers from Northwestern University and the University of Notre Dame has found that when it comes to the usefulness of social networks in finding good positions after graduation, gender matters. In their paper published in Proceedings of the National Academy of Sciences, the group describes their study involving analysis of student emails and what it revealed. Women build less effective professional networks than men as they underestimate self-worth More information: “A network’s gender composition and communication pattern predict women’s leadership success,” Proceedings of the National Academy of Sciences (2019). www.pnas.org/cgi/doi/10.1073/pnas.1721438116 This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.last_img read more

Read More


CM announces additional 18 DA from January 1

first_imgKolkata: Chief Minister Mamata Banerjee on Tuesday announced an additional 18 percent Dearness Allowance (DA) to the state government employees from January 2019.The Chief Minister further said that the state government has also decided to merge the 10 percent interim relief into the DA and the total DA of the state government employees will be 125 percent. “Because I had made a commitment towards the state government employees, we are announcing it a bit early because we have to follow some planning. Also Read – Heavy rain hits traffic, flights”We have decided to release additional 18 percent DA to the state government employees including teachers and non-teaching staff of educational institutions and employees of rural and urban local bodies. This will be effective from next January,” Banerjee told reporters at the state Secretariat. The state government will have to bear an annual additional expenditure of Rs 5,000 crore, she said. It is 90 percent more than what it was till the end of the Left Front regime. Also Read – Speeding Jaguar crashes into Merc, 2 B’deshi bystanders killedThis comes when the state government is passing through “financial constraints” and needs to clear a huge debt that it inherited from the erstwhile Left Front government. After the announcement, Banerjee said in the same breath: “There are financial constraints. But the decision to release the DA has been taken as I had given my word to the employees and with it, we are clearing whatever would be left till January 2019.” Stating that the release of the DA will cost Rs 5,000 crore more to the state’s exchequer every year, she added: “It has been done even after clearing a loan of Rs 2.30 lakh crore and this year we have to clear Rs 46,000 crore. At the same time, we also need to run several social security schemes including Khadya Sathi and Kanyashree.” Banerjee further added that state Parliamentary Affairs minister Partha Chatterjee also played a crucial role in ensuring the release of the DA. It may be mentioned that the Chief Minister had addressed a programme of the Paschim Banga Rajya Sarkar Karmachari Federation in September 2017 at Nazrul Manch where she had assured that the demand of the state government employees will be looked into before 2019.last_img read more

Read More


Asha Bhosle named the best Bollywood playback singer

first_imgVeteran singer Asha Bhosle has been declared the greatest Bollywood playback artist of all times by the UK based Eastern Eye newspaper.The 81-year-old singer beat off her elder sister Lata Mangeshkar in a first of its kind list that takes into account factors including number of songs, honours, international impact, versatility, fan base and popularity amongst fellow music industry professionals.The singer was surprised with the news of her topping the list.  Also Read – ‘Playing Jojo was emotionally exhausting'”I thought being called the greatest was the prerogative of boxer Muhammad Ali. I thank Eastern Eye and everyone for tolerating me all these years,” Asha said.Whilst Lata Mangeshkar came second in the list of talented singers, Mohd Rafi came third and Kishore Kumar was fourth. Other names who featured in the top 20 included Mukesh (5), current Bollywood music queen Shreya Ghoshal (7), Geeta Dutt (10), Sonu Nigam (14), Kumar Sanu (17) and Kavita Krishnamurthy (19).Apart from being the most prolific singer the world has ever known, Asha’s versatility has given her the widest body of work. The full list of the greatest 20 Bollywood playback singers is published in Eastern Eye newspaper.last_img read more

Read More


Praising kids may Promote cheating

first_imgParents and teachers must learn to give kids the right kind of praise as researchers have found that the wrong kind of praise can backfire. Children who are praised for being smart, or who are told they have a reputation for being smart, are more likely to be dishonest and cheat, say two studies. “Giving children wrong kind of praise makes them dishonest,” said co-author of both the studies, Kang Lee, Professor at the University of Toronto. Also Read – Add new books to your shelfThe first study, published in the journal Psychological Science, showed that pre-schoolers who were praised for being smart were more likely to cheat subsequently than those who were praised for doing “great” in a particular task. Similarly, the second study, published in the journal Developmental Science, found that pre-schoolers who were told that they had a reputation for being smart were also more likely to cheat.In the first study, researchers asked three and five-year-olds to play a guessing game. When children did well on one occasion they were praised in one of two ways: one-half of the children were praised for being smart, while the other half were praised for their performance. After receiving either type of praise, the children continued to play the guessing games. Also Read – Over 2 hours screen time daily will make your kids impulsiveResearchers then left the room after asking children to promise not to cheat by peeking at the answers. Their behavior was then monitored by a hidden camera.Results showed that despite the subtle difference between the two forms of praise, the children who were praised for being smart were more likely to act dishonestly than the children who had been praised for their behavior in a specific game. The results were the same for both ages.In the second study, researchers told each child that he or she had a reputation for being smart. Hearing this, similarly to receiving direct “smartness” praise, also had the effect of increasing children’s tendency to cheat. “Praise is more complex than it seems,” Lee said. Overall, for adults, the studies show the importance of learning to praise in a way that does not prompt or promote dishonest behavior. But what could be more affirming than telling your child, “Good job!” “I’m proud of you” or “You are smart.” The correct choice of words also play an important role. As already mentioned, instead of focusing on the achievements of the child, it would be suggested to appreciate their character. Also, it was found that school-aged kids praised for their intelligence became less likely to attempt new challenges. But when praised for their efforts, they worked longer and harder. Overemphasizing intellect or talent – and then believing such traits are innate and fixed – make kids more vulnerable to failure, fearful of challenges and less motivated to learn.It’s very obvious that children will follow what they see. So don’t just praise or lecture kids about good character, compassion, and charity, but model these attributes. Apart from aforementioned tricks, praising the inner qualities of the child will also help. We are a materialistic society that puts far too much emphasis on outside appearances. Giving teen-aged kids well-deserved compliments that focuses on their inner qualities, such as telling them that they’re “kind,” “helpful” or “fun,” instead of focusing on what they wore or owned, reduced their materialistic tendencies and build self-esteem in them.last_img read more

Read More


Aggressive tone can reflect your size strength to others

first_imgThe aggression in your tone can help the listener determine how strong or weak, tall or short you are than them, with a high degree of accuracy, a study has found.While many animals – including sea lions, red deer, and dogs – have the ability to judge their competitor through hearing their vocalisations, researchers found that humans can also use nonverbal vocal cues, including aggressive roars, to judge one another’s size and physical formidability. Also Read – Add new books to your shelf”When other animals produce vocalisations, they’re doing so for a reason – they’re communicating information about themselves, be it physical condition or internal state,” said Jordan Raine from Britain’s University of Sussex. “The information is often ‘honest’ but as our study shows, vocalisations can also serve to exaggerate traits such as physical formidability,” Raine added. For the study, the team measured the upper-body strength and height of men and women and recorded them producing aggressive roars and aggressive speech sentences. Also Read – Over 2 hours screen time daily will make your kids impulsiveThe findings, reported in the journal iScience, showed that men could correctly determine whether a stranger was physically stronger than themselves 88 per cent of the time when listening to a clip of someone roaring.On the other hand, women tended to overestimate the strength of a man in a recording, compared to audio clips of female speakers with a similar level of strength.”Previous investigations have found that humans can estimate height and strength from the voice, but that they don’t do it very well,” Raine said. “However, no one has ever investigated to what extent people can judge whether someone is stronger or weaker than themselves – a judgment that may be more relevant to the survival of our ancestors than judging someone’s absolute strength or body size,” Raine noted.last_img read more

Read More


Having more kids may make womens cells age faster

first_imgWomen with many children, especially more than four or five, may look older as multiple pregnancies may accelerate the ageing of cells, claimed a new study.According to the researchers, there is a good evidence to show that having more children can increase the risk of certain diseases and shorten lifespan. Cellular ageing was accelerated by six months to two years for each additional pregnancy.”Our study points to cellular changes during pregnancy, possibly related to adaptive changes in the mother’s immune system as a possible explanation,” said Christopher Kuzawa from the Northwestern University in the US. Also Read – Add new books to your shelfFor the study, published in the journal Scientific Reports, the team collected data from around 3,200 women aged between 20 to 22 years, looking at two separate markers of cellular aging, that is, telomere length – protective caps at the end of DNA strands and epigenetic age.”Telomere length and epigenetic age are cellular markers that independently predict mortality, and both appeared ‘older’ in women who had more pregnancies in their reproductive histories,” added Calen Ryan from the varsity.”Even after accounting for other factors that affect cellular aging, the number of pregnancies still came out on top,” Ryan added.Interestingly, the team also found that women who were currently pregnant had cells that looked younger thanpredicted.last_img read more

Read More


Eight flyovers to be repaired by Durga Puja

first_imgKolkata: The Kolkata Metropolitan Development Authority (KMDA) and other government agencies will repair eight flyovers in the city before Durga Puja, officials said on Saturday.The busy Chingrighata, Kalighat and Sealdah flyovers are among the eight flyovers. Chingrighata and Kalighat flyovers have been shut for heavy vehicles. A second round of inspection will decide the extent of repairs of the eight bridges. The decision comes after the Bridge Inspection and Monitoring Cell recently submitted a report on these bridges. The panel, which includes experts from state Public Works Department, Irrigation Department and KMDA, was formed in the wake of the Majerhat Bridge collapse in Kolkata, killing three people and injuring several others in September in 2018. Also Read – Rs 13,000 crore investment to provide 2 lakh jobs: Mamata Chingrighata and Kalighat flyovers will soon be completely shut for repairs and KMDA will request police to draw up traffic diversions, said a KMDA source. The condition of a pillar of Chingrighata flyover, which connects south Kolkata’s EM Bypass to Salt Lake, needs immediate repairs, the source said. The Chingrighata flyover suffers from design defects, the source added. Last year, structural engineers of KMDA were asked to rectify the defects. The repair work for both the flyovers are likely to take place this month. Also Read – Lightning kills 8, injures 16 in state Experts found that pillars of Kalighat flyover had corroded. Last month, it was shut for two days for health assessment. At the time, they had raised questioned over its internal structure. KMDA has also planned to install height bars on both sides to restrict heavy vehicles from using the flyover.”The process of health audit of these flyovers are already in place. In the first phase, eight flyovers will be examined and after conducting health audit necessary repair work will be done before Puja. A few flyovers will also go through load capacity test,” said a KMDA official, who didn’t want to be named. Sealdah flyover, which was earlier identified as vulnerable, will also go through a similar test. As per officials, it will be shut for three days from August 15. Experts will also examine the load capacity of Aurobindo Setu and Bijon Setu. In the second phase, Dhakuria bridge, Chetla Lock Gate bridge, Karunamoyee bridge over Tolly’s Nullah, Chitpur bridge over the railway yard, Canal bridge near RG Kar Hospital, etc will undergo similar health audits. Three weeks ago, part of Ultadanga flyover was shut for three days after the panel found that it had developed cracks for repairs. The other flank (EM Bypass bound) of the bridge is still shut for traffic. “There are several flyovers and bridges in and near Kolkata that have aged. All these need to undergo audits and repair work. The safety of commuters is of utmost importance. We don’t want to take any chance. After a thorough repair and load-bearing-capacity check of flyovers which are damaged will be marked safe,” said an official from the monitoring cell. Before the September tragedy, no study was undertaken to check the structural stability of bridges in Kolkata.(With inputs from Indian Express)last_img read more

Read More


One of the Worlds Most Powerful Computers is Located Inside a Church

first_imgWhen we talk about facilities designed to store scientific supercomputers, we usually imagine high-tech structures of concrete and glass, with a sense of futuristic vision. Buildings suitable for housing such devices usually need to fulfill certain conditions and are therefore built for this occasion.However, in Barcelona, heads of the Polytechnic University of Catalonia (UPC) decided to combine history with the future of computer science, creating one of the most beautiful settings for its MareNostrum supercomputer.MareNostrum 4 supercomputer at Barcelona Supercomputing Center. Photo by Gemmaribasmaspoch CC BY-SA 4.0Inside the chapel. Photo by David Abián CC BY-SA 4.0The Barcelona Supercomputing Center which houses the machine is actually a 1940s chapel, that was deconsecrated in the 1970s.The estate on which the chapel was built was once a privately owned residence of the Girona family, whose patriarch was Manuel Girona, a 19th century banker and Mayor of Barcelona.MareNostrum 2 – Refrigerated racks. Photo by Vcarceler CC BY SA 3.0The estate was built in the 1860s and belonged to the Girona family for more than 100 years. It became the property of the Polytechnic University in the 1970s, together with the famous Torre Girona chapel.The chapel was used as a boardroom and even an aula magna for UPC lectures up until 2005, when the university decided it would be the perfect location for the headquarters of the Barcelona Supercomputing Center.MareNostrum 2 – Refrigerated cells. Photo by Vcarceler CC BY SA 3.0Gemma Maspoch, head of communications for Barcelona Supercomputing Center, gave an interview in January 2019 for Motherboard, explaining the origins of this idea:“We were in need of hundreds of square meters without columns and the capacity to support 44.5 tons of weight. At the time there was not much available space at the university and the only room that satisfied our requirements was the Torre Girona chapel. We did not doubt it for a moment and we installed a supercomputer in it.”MareNostrum – Entrance. Photo by Vcarceler CC BY SA 3.0Adjustments were made in order to reinforce the ground around the chapel, as it had to sustain the weight of hardware and the glass box specially designed to house MareNostrum and help cool it.As for the exterior of the church, its most recognizable elements remained untouched. The Torre Girona still possesses its original pillars, the arched gallery, and the stained glass windows. On the other hand, the interior infrastructure was redesigned so that it could fit a 120 square meters glass box (that’s an area a little less than half a basketball court) in which MareNostrum is stored.Viewing area. Photo by David Abián CC BY-SA 4.0While the sight alone leaves people breathless, the operational capacity of MareNostrum is even more eye-popping for the programmers and scientists who work with it.Back in 2005, when it first came online, the supercomputer was capable of computing between 42.35 and 63.8 trillion operations per second. Since 2017, its performance was enhanced to up to 11 thousand trillion operations per second.MareNostrum 2 – Looking down through the glass floor onto CPU racks. Photo by Vcarceler CC BY SA 3.0The current MareNostrum is the fourth incarnation of the supercomputer, which spreads over 48 server racks and is considered to be the 25th most powerful computer in the world.Translated as “Our Sea,” MareNostrum refers to the Roman name for the Mediterranean, adding yet another layer of historical meaning to the project, reaching back through time in order to envision a continuity in scientific research dating from the times of Ancient Rome to this day.Inside Chapel Torre Girona. David Abián CC BY-SA 4.0Although it operates with $40 million worth of equipment, the Barcelona Supercomputing Center allows researchers the benefit of using MareNostrum in their studies free of charge.From its inception in 2005, the UPC supercomputer has participated in research revolving around a variety of fields, including astrophysics, climate modeling, and genome research, and has been known for achieving remarkable results.Mateo Valero with the supercomputer MareNostrum of the Barcelona Supercomputing Center in 2013. Photo by Barcelona Supercomputing Center-National Supercomputer Center CC BY-SA 4.0For example, in 2012, researchers assigned to MareNostrum conducted a study which managed to simulate the structure of triple helix DNA in a vacuum.This groundbreaking project shed further light on the use of antigen therapy, which currently constitutes a cutting-edge approach to a disease by switching off activity in the relevant genes.Read another story from us: Missing Piece of the World’s Oldest Analog Computer Found on Aegean SeabedEven though aesthetics were never a top priority for the UPC, the Barcelona Supercomputing Center was awarded the prize for Most Beautiful Data Center in the World, in January 2018. The competition is held annually by Datacenter Dynamics (DCD), a respected London-based IT media publisher.last_img read more

Read More


VIDEO Struggling Jason Witten says Aaron Rodgers pulled a rabbit out of

first_img Advertisement Jason Witten is probably headed to the Hall of Fame for his work on the gridiron, but he’s still got a long way to go in the Monday Night Football booth.  Unlike Tony Romo, who took the broadcasting world by storm with his youthful energy and dazzling play predictions, Witten specializes in dead air and butchering commonly used phrases like Tommy Callahan.During last night’s Packers/Niners MNF showdown, Witten eloquently said Aaron Rodgers pulled ‘a rabbit out of his head’ after his game-tying 4th quarter TD pass. You can get a good look at a t-bone by sticking your head up a butcher’s…. oh wait, how does that go?“You saw Aaron Rodgers there, blood on his elbow big old knee brace on, hit on his wrist, it doesn’t matter, he pulls another rabbit out of his head.” Witten also came down hard on San Francisco, saying they ‘ can’t kick themselves in the foot’ with mistakes down the stretch. Can’t do that. Paging Peyton Manning, blank check. Name your price.pic.twitter.com/qLcY3tXbuB— Big Cat (@BarstoolBigCat) October 16, 2018last_img read more

Read More


first_img This story appears in the October 2006 issue of Entrepreneur. Subscribe » 2 min read October 1, 2006 Problem Solvers with Jason Feifer Don’t want it? Swap it. Or so says a growing number of entrepreneurs running sites that let people swap all kinds of stuff. Bartering is the oldest business practice around, and a handful of swap sites arose during the dotcom era. Most didn’t survive. Now the sector is re-energized, thanks to better technology and shrewder online shoppers who have accumulated stuff they no longer want or need. “The model was around a long time ago-it’s just re-emerged now because of the flood of DVDs, CDs and media,” says Bob Alvin, 48, founder of Los Gatos, California-based BarterBee, a six-employee site launched in 2005 that specializes in online trades of CDs, DVDs and video games.Numbers revealing the size and potential of the swap sector are hard to find. Talk to “swapreneurs,” however, and they’ll tell you they’re on a mission to change the world of buying and selling. “In the way eBay changed the fabric of society, we have the same opportunity to do that,” says Jessica Hardwick, 39, co-founder and CEO of Sili-con Valley-based SwapThing, a year-old swap site whose sales-which are earned through transaction fees-will approach $1 million this year. SwapThing’s membership base is growing 40 percent a month, and the company boasts a growing list of professional services up for swap, from haircuts to innovation consulting.Still, swap sites face challenges. Shipping and geography can prohibit some trades. Users must also spend time matching up trades that aren’t equal in value. But the hurdles aren’t stopping swapreneurs, who are in a fast and furious race to become the eBay of barter. It’s anyone’s guess who will take the lead, but swap sites are betting that people’s love of stuff will drive them toward the online swap marketplace. “I think everyone at heart is a bargain shopper,” Alvin says. “[Swapping] is a valid [business] model.” Hear from business owners and CEOs who went through a crippling business problem and came out the other side bigger and stronger. Listen Nowlast_img read more

Read More


first_imgSeptember 26, 2013 3 min read Register Now » Target launched a free service on Wednesday that allows customers to have baby-care basics automatically delivered to them on a schedule of their choosing. By saving time for flustered parents, the store is attempting to compete with Amazon, Wal-mart and other retailers that have already entered the subscription service marketplace.The retailer plans to have roughly 150 products available for subscription, including diapers, wipes and formula. Customers can choose delivery options for every four to every 12 weeks, with free shipping.Amazon and Diapers.com are two well-known sites that offer similar services. Amazon’s Subscribe and Save offers products to be regularly delivered in a range of categories, including hair care, food and household supplies. Subscription orders are offered in monthly intervals from one-month to six-months, with customers paying when items are shipped. Diapers.com, which is operated under the Amazon-owned Quidsi, focuses more strongly on baby care and calls its service “auto-ship.”Target isn’t the only big-box retailer utilizing subscription services to grow online sales. Wal-mart recently launched Goodies Co., a service that ships five to eight snacks monthly to customers for $7 a month. While the service does not allow for customer choice like Amazon or Target, it represents the growing power of the subscription model for both online and brick and mortar businesses.Related: Google’s New Secure Search Means More Work for Online Business OwnersStartups have also made waves in the e-commerce subscription market. Birchbox is one of the most frequently cited success stories. The company, founded in 2010, sends monthly samples of beauty, grooming and lifestyle products. Socked, another subscription-based startup, rackets to men, with four pairs of basic black socks to be delivered monthly, quarterly or biannually. Hello Flo, a monthly tampon subscription service, launched earlier this year and went viral last month with its ‘Camp Gyno’ Youtube ad.Target currently operates over 1,800 stores worldwide, while Wal-mart owns over 10,800. However, with growing numbers of online shoppers, both are astronomically outpaced by Amazon online, with The Wall Street Journal reporting that Amazon.com sells more online than its next 12 biggest competitors. In addition to launching its subscription baby-goods service, Target also launched Target Ticket on Wednesday. Target Ticket is a digital video store aimed at families, competing with Wal-mart’s Vulu and Amazon’s Instant Video, as well as digital media kings iTunes and Netflix. Target boasts titles such as HBO’s Game of Thrones and True Blood, as well as movies such as “World War Z” and “Iron Man 3” in a press release.Related: Richard Branson Invests in a Startup That No One Understands Yetcenter_img Free Webinar | Sept 5: Tips and Tools for Making Progress Toward Important Goals Attend this free webinar and learn how you can maximize efficiency while getting the most critical things done right.last_img read more

Read More


first_img At Austin’s SXSW today, PayPal announced an expansion to the Startup Blueprint Program it launched last October, the initiative that waives the first $50,000 in PayPal processing fees for selected U.S.-based startups.The expansion will add 14 new incubators and accelerators, including TechStars, Entrepreneurs Roundtable Accelerator and Kima Ventures, among others. Thanks to PayPal’s acquisition of payments gateway Braintree last fall, the program will also waive Braintree fees, such as those from credit cards, up to $100,000 in payment volume.Additionally, startups in the program will gain a group of advisors who will be at the ready to help new businesses best utilize the PayPal platform and get through the crucial ramp-up period. The assistance will go beyond how to integrate the API and delve into nuts-and-bolts issues that can create huge obstacles for new entrepreneurs. “If you’re struggling with what CRM to use, they’ll be able to say, ‘This is what we do,’” says John Lunn, head of developer relations.The short-term goal, according to Lunn, is to bring up to 2,000 startups to this program by the end of the year, up from the 100 currently signed on. The long-term objective, of course, is to capture the latest startups as they are hitting it big, ensuring they use the PayPal platform.Lunn said that as recently as 18 months ago, PayPal would reach out to new businesses only once they’d hit a certain amount of revenue. “That was a mistake because what’s happening with startups now is that they’re going from zero to the hottest thing around in 6 to 8 months,” Lunn says. He says unless you have a relationship with that startup, before they hit it big, it can be too late to capture them for your platform.The expansion highlights the intense competition to serve new companies in an ever-shifting landscape. “With this program, we’re able to spot the startups that are earning revenue very, very quickly and make sure we are looking after them at an early stage,” says Lunn. Those businesses will be comfortable with the PayPal platform, familiar with the service’s customer support and hopefully won’t go elsewhere, he says.Getting ahead of the latest thing is critical for businesses like PayPal, says Lunn. Without such moves, he says, “in a couple of years every hot startup that’s out there, every app on your phone isn’t using PayPal and we become irrelevant.”  3 min read Problem Solvers with Jason Feifer March 8, 2014center_img Hear from business owners and CEOs who went through a crippling business problem and came out the other side bigger and stronger. Listen Nowlast_img read more

Read More


first_img Hear from Polar Explorers, ultra marathoners, authors, artists and a range of other unique personalities to better understand the traits that make excellence possible. Listen Now How Success Happens Entrepreneur has affiliate partnership with TechBargains so we may get a share of the revenue from your purchase.Thanks to our friends at TechBargains, we’ve rounded up three can’t-miss deals. Check it out:Lowest price on the Xbox One Console for $219.99 (Orig. $300)This is the lowest price we’ve seen on the Xbox One and a great way to blow off some steam by playing games. You can play your old Xbox 360 games and this looks to be a clearance price to make room for the newest Xbox One S. If you don’t need a 4K Blu-Ray player, then you can save yourself $80 just by getting on this deal. You even get your choice of free game: Gears of War, Rise of the Tombraider, Forza 3 or Rare Replay.Sony XBR-43X830C 4K UltraHD 120Hz HDTV + $300 Dell Gift Card for $698This matches the price elsewhere but includes a massive $300 Dell gift card. You are basically paying $400 for a fairly high-end Sony 4K TV. It includes a native 120Hz price range, which is a premium feature. Many reviews agree that many other TVs cannot compete in the same price range and is part of Sony’s renaissance in TVs.$50 off the Anova Sous Vide Immmersion Circulator for $149 (Orig. $200)This is one of the lowest prices we’ve seen on the newest generation Sous Vide water circulator from Anova. This slowly and precisely cooks at a constant temperature so that you get perfectly cooked meats, vegetables and fish every time. To finish it off, simply sear off whatever you are cooking to give it that great brown color and you will have results as good as any restaurant. This newest version introduces Wi-Fi control.For more great deals, check out our TechBargains Small Business page.Disclosure: This is brought to you by the Entrepreneur Partner Studio. Our goal is to feature products and services that we think you’ll find interesting and useful. If you purchase them, we may get a small share of the revenue from the sale from our commerce partners.Have a deal you want to promote? Contact us here. August 12, 2016 Opinions expressed by Entrepreneur contributors are their own. 2 min readlast_img read more

Read More


first_imgJanuary 6, 2017 7 min read Old habits die hard. And as a consequence, trusted employees are putting organizations at risk every day by performing seemingly innocent acts on their computers.A recent Intermedia report found 93 percent of employees engage in at least one form of poor data security. And 23 percent of respondents admitted they would take data from their company if it would benefit them. Equally alarming is the fact that IT teams, tenured employees and C-level executives all exhibit bad habits and expose organizations to security threats. The CEO of Austrian aerospace parts manufacturer FACC is all too familiar with this scenario. He was fired after a fake CEO email scam cost the company $47 million.Before investing in new security tools and technology to protect against external threats, companies should place higher priority on identifying and fixing internal risks. Here are a few of the most common employee traits that expose businesses to potential harm.1. They lack education and training.When a new employee joins an organization, he or she typically gets a computer, a company email address and access to a suite of applications to carry out daily duties. But training on how best to use these resources often falls by the wayside. Businesses must provide upfront education to safeguard against sophisticated threats that prey on unsuspecting employees.Company leaders who are serious about keeping cyber threats at bay understand that a single training session during onboarding isn’t enough. Regular IT and security updates are essential. These important measures help establish good habits from the start and supplement that baseline with periodic information and training sessions. Related: 4 Cybersecurity Best Practices for Your Organization2. They choose weak passwords.According to SplashData, the most common passwords used in 2016 are still “123456” and “password.” It’s easy to be lured by convenience rather than opt for security. Creating and remembering new passwords undeniably is a pain, which is why so many employees stick with the same password across multiple accounts. But this, of course, makes for a wide-open target. In one fell swoop, all of an employee’s accounts can be compromised.Related: 4 Foolish Cybersecurity Mistakes Robert Herjavec Is Shocked People Still MakePeople working in the tech industry typically have access to more applications and services than might people working in other industries. Without a Single Sign-On (SSO) service, there are too many passwords for a normal human to remember. SSO provides users with a single portal to access all their web applications. The employee logs in to the portal, and SSO logs him or her in to all apps for which that user has permission — no need to rely on sticky notes and Excel spreadsheets to manage all those usernames and passwords. Because users have to remember only one password, it typically can be longer and stronger than they’d normally select.3. They share login credentials.Here, too, employees fall victim to convenience. When colleagues want to quickly and easily access certain information, businesses often rely on sharing credentials instead of creating a unique personal login for each user. Nearly 50 percent of respondents in a recent survey of office workers have shared credentials with multiple users. This leaves the company vulnerable to a data breach.Ideally, each employee joining the company should receive a checklist of the services and applications needed for her or his daily duties. Human Resources and IT departments should work together during onboarding to create a separate account for that user and software set.But this is the real world, and shared accounts are almost impossible to avoid. For example, multiple people are likely to have access to the company Facebook or Twitter account. Some SSO services support secure sharing of credentials, linking the use of a shared account to an individual but hiding the actual password from these same users. In most cases, only the IT administrator knows the password. This makes it easy to revoke access as people join, move around and leave the organization.4. They install web applications without consulting IT.“Shadow IT” is a persistent issue in today’s workforce. It happens when employees download unauthorized applications to their work computers or mobile devices. It also can occur when they subscribe to Software as a Service (SaaS) applications without IT approval.Many employees are glued to their work computers eight hours or more a day and start to think of that workstation as their own personal device. Their intentions may be harmless — perhaps they want to download a popular music-streaming application or a consumer file-sharing tool to store and coordinate information. But doing so without first consulting IT contributes to the problem and puts the company at risk.Related: The Good, the Bad and the Careless: Insider Behaviors That Cause Data BreachesThere are good reasons why businesses should allow certain applications and not others. These include keeping up productivity, ensuring consistency across the office and its departments, protecting against malware or other security threats and keeping risk at an acceptable and understood level. Ultimately, people want to work the way they want to work. IT’s role has changed such that teams now advise the business rather than act as technology gatekeepers. If IT decides that consumer-grade products are not secure enough, they must offer an alternative — or a choice of alternatives — that work across the range of devices people want to use.5. They upload company files to personal cloud storage.Mixing business with pleasure always has been risky. Technology issues are no different. Saving company files to personal file-sharing applications highlights a more recent concern in the age of cloud computing. While file-sharing applications such as Dropbox and Google Drive have helped streamline communication and version-control of shared documents, these services often lack security protocols or audit and compliance features. In short, they were created with consumer convenience front and center.A dedicated employee might upload work files to a personal file-sharing application so he or she can work remotely after hours or over the weekend. Despite the individual’s commendable motives, this is a high-risk behavior. Making a spur-of-the-moment choice to use a consumer-centered solution might save them a few extra seconds but could cost the business much more. Employees must keep the company’s best interests in mind and be cognizant of potential consequences. Related: 3 Reasons Why You Should Install Your Own Private Cloud6. They access company data after changing jobs.When an employee resigns or is terminated, the very first step the business should take to protect itself is identifying and immediately revoking the employee’s access to all platforms and web applications. Research has shown that after leaving a company, 89 percent of employees still have access to at least one application or to proprietary corporate data.People also will need access to different applications as they move around within organizations and fill different roles. Companies must develop a strong Joiners, Movers & Leavers (JML) process to ensure company data is safe from unauthorized access.Related: Nokia Sues Apple for Allegedly Violating 32 Technology Patents7. They’re not careful enough with email.Most people have experienced a close call or a heart-stopping “reply all” horror story, even if they don’t want to admit it. One wrong click of a mouse can share information with an undesired receiver and — even worse — jeopardize an entire organization by putting highly confidential information in the wrong person’s hands. This type of mistake now extends to file sharing services as well. The modern faux pas is granting access or accidentally sharing files with the wrong people through services such as Dropbox and Google Drive.Related: Be Careful, Next Week It Could Be Your Email on WikileaksNot all data breaches or cyber threats are preventable. But a business that arms its workforce with the education and resources to break bad computer habits can operate with greater confidence that the company and its data are safer. This hands-on workshop will give you the tools to authentically connect with an increasingly skeptical online audience. Opinions expressed by Entrepreneur contributors are their own. Free Workshop | August 28: Get Better Engagement and Build Trust With Customers Now Enroll Now for Freelast_img read more

Read More


first_img Free Workshop | August 28: Get Better Engagement and Build Trust With Customers Now Enough with fake news: a startup launching this week called Authenticated Reality wants to be the ultimate source for finding out what’s real and what’s fake online.The company’s product, which it calls “The New Internet,” is launching in a closed beta this week. It’s essentially a sandboxed layer that lives on top of every webpage its users visit, allowing them to authenticate stories they believe are real by placing their digital signature on them for other users to see.Users will access the New Internet layer through a browser plugin or via an app for iOS (Android is coming soon). In addition to labeling web pages as authentic, users will also be able to rate and comment on them.”Our company has created a place where every user is personally responsible for their actions through a system of checks and balances in order to put an end to unreliable information and false identities online,” Authenticated Reality CEO Darin Andersen said in a statement.It’s a lofty goal, and one whose accomplishment depends almost exclusively on the character of the customers that the company is able to attract. To weed out people who themselves might be inclined to write fake news or incendiary comments, Authenticated Reality has come up with a verification system that requires users to submit their driver’s license information to prove that they are who they say they are.Addressing fake news with a closed network of verified commenters might make the web a more trustworthy place for Authenticated Reality’s users, but it is a markedly different approach from the recent high-profile efforts in the media and tech world to combat the problem.One of those efforts is a collaboration between Facebook, Google and major news outlets to verify news coverage of the 2017 French presidential election. Instead of the public verifying the news themselves, they’ll send suspicious stories, photos and other content to real journalists who will use an arsenal of analytics tools to validate them. This story originally appeared on PCMag February 14, 2017 Enroll Now for Free This hands-on workshop will give you the tools to authentically connect with an increasingly skeptical online audience. 2 min readlast_img read more

Read More