(PhysOrg.com) — Researchers from the Nichia Corporation in Tokushima, Japan, have set an ambitious goal: to develop a white LED that can replace every interior and exterior light bulb currently used in homes and offices. The properties of their latest white LED – a luminous flux of 1913 lumens and a luminous efficacy of 135 lumens per watt at 1 amp – enable it to emit more light than a typical 20-watt fluorescent bulb, as well as more light for a given amount of power. With these improvements, the researchers say that the new LED can replace traditional fluorescent bulbs for all general lighting applications, and also be used for automobile headlights and LCD backlighting. Design improvements All three white LEDs are based on a blue LED die, which is coated with a yellow phosphor to achieve a wider emission spectrum. When blue emission from the LED die mixes with the yellow fluorescence from the phosphor, the device produces white light. Since the red part of the emitted spectrum was initially low, the researchers also added some red phosphor to enhance the red emission and create a more balanced spectra. Overall, the researchers noted that the color reproduction in this design is the highest of all white light sources.To optimize the luminous efficacy, the researchers focused on a key problem of LEDs: the electrodes tend to absorb some of the light that could otherwise exit the device and increase its luminosity. To reduce absorption at the electrode, the researchers used an indium-tin oxide contact as one of the electrodes, and also used a patterned sapphire substrate to scatter the light so that it could more efficiently exit the device. The researchers also optimized the device to reduce the operating voltage from 3.08 to 2.80 V.With these design improvements and the resulting enhancements in luminous efficacy, the new white LEDs provide further evidence that solid-state lighting can meet a wide variety of our future lighting requirements. Narukawa said that, although these LEDs are expensive compared to commercialized LEDs, he predicts that the price will come down in the future. He also plans to further enhance the luminous efficacy of the white LEDs for general lighting applications. Copyright 2010 PhysOrg.com. All rights reserved. This material may not be published, broadcast, rewritten or redistributed in whole or part without the express written permission of PhysOrg.com. The cross-sectional structure of (a) a conventional LED and (b) a new high efficacy LED with the patterned sapphire substrate and ITO contact as p-type electrode, which reduce the optical absorption and improve the extraction efficiency. Credit: Yuko Narukawa, et al. The Nichia researchers, Yukio Narukawa, et al., have published the results in a recent study in the Journal of Physics D: Applied Physics. The team fabricated three types of high-luminous efficacy white LEDs, each of which utilized a variety of improvements in device structure to improve their luminosity, or brightness, and reduce their operating voltage.The researchers focused on two measurement criteria. One was luminous flux (measured in lumens), which measures the light’s luminosity as perceived by the human eye, whose sensitivity varies for different wavelengths. The second criteria was luminous efficacy (measured in lumens per watt), which measures the amount of luminous flux achieved with a given amount of power. By the numbersBriefly looking at the history of a few different types of light sources helps provide some context for the LED’s recent rapid progress. The incandescent bulb, which was developed in 1879, had an initial luminous efficacy of 1.5 lm/W, which improved to 16 lm/W over the next 130 years. Fluorescent bulbs, first developed in 1938, achieved a luminosity increase of 50 to 100 lm/W over the next 60 years. The progress of white LEDs is much more pronounced: since their commercialization in 1996, white LEDs’ luminous efficacy has increased from 5 lm/W to today’s commercial white LED of 150 lm/W, the highest luminous efficacy of all white light sources. The theoretical limit for white LEDs is about 260-300 lm/W.Now, the Nichia researchers have taken the white LED’s luminous efficacy a step further, achieving values as high as 265 lm/W at 5 mA of current, or 249 lm/W at 20 mA, values that nearly reach the theoretical limit. However, the downside of this specific design is that the luminous flux is quite low, about 14.4 lm. By modifying the design, the researchers demonstrated two other white LEDs: one with values of 203 lm and 183 lm/W at 350 mA, and one (as mentioned above) with values of 1913 lm and 135 lm/W at 1 A. This last white LED was fabricated by connecting four high-power blue LED dies in series. More information: Yukio Narukawa, et al. “White light emitting diodes with super-high luminous efficacy.” J. Phys. D: Appl. Phys. 43 (2010) 354002 (6pp). DOI:10.1088/0022-3727/43/35/354002• PhysOrg.com iPhone / iPad Apps• PhysOrg.com Audio Podcasts / iTunes• PhysOrg.com Android apps (new version available)• Join PhysOrg.com on Facebook!• Follow PhysOrg.com on Twitter! Explore further Citation: White LEDs with super-high luminous efficacy could satisfy all general lighting needs (2010, August 31) retrieved 18 August 2019 from https://phys.org/news/2010-08-white-super-high-luminous-efficacy.html The history of luminous efficacy in different types of lighting shows the rapid improvements in white LEDs. The years in which the white light sources were developed are also shown. Credit: Yukio Narukawa, et al. Universal Display First to Achieve 30 Lumens Per Watt White OLED This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.
Citation: JDI develops a 2.3 inch LCD display packed at 651ppi (2012, June 6) retrieved 18 August 2019 from https://phys.org/news/2012-06-jdi-inch-lcd-651ppi.html More information: www.displaybank.com/_eng/resea … _view.html?id=227267 (Phys.org) — Japan Display Inc. has created a small direct-view display that is packed with so many pixels that it features twice the resolution of the current iPhone 4 with its Retina display. And while the number of pixels is the same as what many believe the new MacBook Pro will have, the new display by JDI squeezes them into a much smaller screen, enabling the device to display lines without jagging, resulting in a display that is far sharper than anything else on the market. This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. The resolution format of the new screen is 1280 x 800 pixels, which means that each has to be incredibly tiny to fit on a 2.3 inch screen. While some may argue that the limit for what is discernible by the human eye has already been reached with the iPhone 4, JDI says that after conducting ergonomic visual tests with an unknown group of subjects, they have determined that people can see the difference and report that images appear clearer or are sharper to them than when viewing other high resolution displays and thus the company says the new technology should mark a new milestone in LCD electronic displays. They add that the image produced by the new display is comparable to film based photography equipment.To achieve this new level of clarity, the company used polysilicon TFTs as the driver elements when making the screens at low temperatures and in addition to smoothing out jagged edges, the company says that characters are sharper and that when people look at images on the screen, they experience sensations similar to when looking at objects directly in the real world with the naked eye.The announcement by JDI is likely to spur new sales of cell phones and likely tablet computers as well which some suggest might be the final nail in the coffin for the personal computer. Of course, the user community will have to wait for manufactures to get their hands on the new technology and incorporate it into new devices. JDI says it will be providing more information about their new screen as well as a demonstration of their new technology at the 2012 SID International Symposium, Seminar & Exhibition. The worlds smallest 3D HD display Explore further © 2012 Phys.Org
© 2014 Phys.org (Phys.org) —The KickSat project is getting very close to a launch date. Originally scheduled to go up Sunday March 16th, the Kickstarter project organized by Zachary Manchester, has been postponed. It is now scheduled to be boosted into space by a SpaceX rocket sometime between March 30 and April 2. KickSat co-creator, team launches new ‘Pocket Spacecraft’ project on Kickstarter Explore further This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. The KickSat will be sent into space in a Dragon capsule aboard a SpaceX rocket (the rest of the cargo will go on to the International Space Station). Shortly after liberation from its capsule, KickSat will begin spinning freely in space and turning on its radios. Sometime later the Sprites will be spun off into space where they will begin performing whatever they have been individually programmed to do. Each will have a gyro, a magnometer, solar collectors, radio, sensors and a chip to run preprogrammed code. Data from each Sprite will be broadcast back to Earth on a shared radio frequency—each has been programed to wake-up, perform its work, then go back to sleep, on a random time-table to reduce the number of Sprites talking at the same time. Anyone who wishes to do so can purchase a small amount of equipment (antenna, noise amplifier, software, etc.) to listen in as well. Those on the project will be listening and collecting data from a site in Ithaca, New York. The KickSat project is as much a concept as a physical entity, it consists of a box that looks like a CD jukebox (it’s also about the same size) and holds what are called Sprites—small (about the size of a saltine cracker and weighing just 5 grams) flat satellites. Once in space, the KickSat will spin around and eject the 104 Sprites it will be carrying, where they will operate independently 200 miles above the Earth for a few days to possibly a week before burning up upon reentry. The project is an attempt to give ordinary people access to space science by allowing for launching very tiny, inexpensive satellites, with costs spread across hundreds of others that are nearly identical to it.The KickSat project was first launched in 2011 as a Kickstarter project, and received more than double its goal of $30,000. Backers got their names engraved on one of the KickSat panels (which have been published on the Kickstarter page) and if they donated enough, their own Sprite. Owners were given firmware development kits to allow for programing functionality. Citation: KickSat nearing launch date despite another delay (2014, March 14) retrieved 18 August 2019 from https://phys.org/news/2014-03-kicksat-nearing-date.html More information: www.kickstarter.com/projects/z … craft-in-space/posts
Journal information: Science (Phys.org)—A team of researchers at Princeton University and a Bristol-Myers Squibb associate have developed a means for creating reactive ammonium radical cations using flashes of blue light. In their paper published in the journal Science, the team describes their new technique and the ways they believe it could be used to create substituted amines. Travis Buchanan and Kami Hull with the University of Illinois offer a Perspectives piece on the work done by the team and the expected impact the new technique is likely to have on organic chemistry. As Buchanan and Hull note, amines (which are molecules that have a C—N bond) are very important in the pharmaceutical industry—approximately 84 percent of pharmaceuticals contain amines. But, as they also note, conventional processes that are used to create carbon-nitrogen bonds involve what they describe as energetically unfavorable reactions—they are inefficient. The process typically involves hydroamination which is where a N—H bond is directly added to a C—C molecule, or even to a triple. In this new effort, the researchers report on a new method using a simple blue light from an LED that gets the job done in a more efficient way.The team at Princeton used a photochemical approach that allowed for the creation of reactive ammonium radical cations using a flashing blue light (for 12 hours), which in turn was used to form the desired isomers. They used the blue light to excite an iridium complex to oxidize the amine, allowing for efficient bonding with the olefin. A thiophenol cocatalyst was then used to move the electron back. The researchers report that their technique could be uses for a variety of olefin and amine compounds allowing for using amines in pharmaceuticals in new and useful ways—some of which, they report, could not be created any other way. Furthermore, they note, the technique is completely atom economical—all of the atoms in the starting materials wound up in the end product.Buchanan and Hull suggest the new approach could represent a transformative approach to amine synthesis, noting that the researchers used their technique to animate a sample of every existing olefin type. A new method cuts the cost of drug-building chemicals Explore further This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. More information: Andrew J. Musacchio et al. Catalytic intermolecular hydroaminations of unactivated olefins with secondary alkyl amines, Science (2017). DOI: 10.1126/science.aal3010AbstractThe intermolecular hydroamination of unactivated alkenes with simple dialkyl amines remains an unsolved problem in organic synthesis. We report a catalytic protocol for efficient additions of cyclic and acyclic secondary alkyl amines to a wide range of alkyl olefins with complete anti-Markovnikov regioselectivity. In this process, carbon-nitrogen bond formation proceeds through a key aminium radical cation intermediate that is generated via electron transfer between an excited-state iridium photocatalyst and an amine substrate. These reactions are redox-neutral and completely atom-economical, exhibit broad functional group tolerance, and occur readily at room temperature under visible light irradiation. Certain tertiary amine products generated through this method are formally endergonic relative to their constituent olefin and amine starting materials and thus are not accessible via direct coupling with conventional ground-state catalysts. © 2017 Phys.org Citation: Blue light allows for making carbon-nitrogen bonds without ‘energetically unfavorable’ reactions (2017, February 17) retrieved 18 August 2019 from https://phys.org/news/2017-02-blue-carbon-nitrogen-bonds-energetically-unfavorable.html Proposed catalytic cycle for hydroamination. Credit: (c) Science (2017). DOI: 10.1126/science.aal3010
Astronomers detect flickering from the star EF Aquilae More information: MN Draconis – peculiar, active dwarf nova in the period gap, arXiv:1703.06742 [astro-ph.SR] arxiv.org/abs/1703.06742AbstractContext: We present results of an extensive world-wide observing campaign of MN Draconis. Aims: MN Draconis is a poorly known active dwarf nova in the period gap and is one of the only two known cases of period gap SU UMa objects showing the negative superhumps. Photometric behaviour of MN Draconis poses a challenge for existing models of the superhump and superoutburst mechanisms. Therefore, thorough investigation of peculiar systems, such as MN Draconis, is crucial for our understanding of evolution of the close binary stars. Methods: To measure fundamental parameters of the system, we collected photometric data in October 2009, June-September 2013 and June-December 2015. Analysis of the light curves, O−C diagrams and power spectra was carried out. Results: During our three observational seasons we detected four superoutburts and several normal outbursts. Based on the two consecutive superoutbursts detected in 2015, the supercycle length was derived P_sc = 74 +/- 0.5 days and it has been increasing with a rate of P_dot = 3.3 x 10^(-3) during last twelve years. Based on the positive and negative superhumps we calculated the period excess epsilon = 5.6% +/- 0.1%, the period deficit epsilon_ = 2.5% +/- 0.6%, and in result, the orbital period P_orb = 0.0994(1) days (143.126 +/- 0.144 min). We updated the basic light curve parameters of MN Draconis. Conclusions: MN Draconis is the first discovered SU UMa system in the period gap with increasing supercycle length. (Phys.org)—A team of astronomers led by Karolina Bąkowska of the Nicolaus Copernicus Astronomical Center in Warsaw, Poland, has discovered several new outbursts in a peculiar, active dwarf nova known as MN Draconis. The results of new observations, which could provide better understanding of dwarf novae in general, were published Mar. 20 in a paper on arXiv.org. Explore further Citation: New outbursts detected in a peculiar, active dwarf nova MN Draconis (2017, March 28) retrieved 18 August 2019 from https://phys.org/news/2017-03-outbursts-peculiar-dwarf-nova-mn.html MN Draconis (MN Dra for short) is an active SU Ursae Majoris-type (SU UMa-type) dwarf nova (DN). It is a poorly known active DN in the period gap and currently one of the only two known cases of period gap SU UMa objects showcasing quasi-periodic oscillations called superhumps.Superhumps are observed in light curves of SU UMa systems during superoutbursts. Most common are positive superhumps – oscillations with periods a few percent longer than their orbital periods. However, MN Draconis exhibits negative superhumps, which means that the oscillations have periods that are slightly shorter than orbital periods.SU UMa-type stars like MN Draconis are characterized by short orbital periods (shorter than 2.5 hours) and by the occurrence of superoutbursts, which are less frequent but one magnitude brighter than normal outbursts. Outbursts in MN Draconis were first spotted in 2002-2003. These observations derived the supercycle period (timespan between two successive superoutbursts) of MN Draconis to be about 60 days—one of the shortest among the values known in SU UMa stars. Now, Bąkowska and her colleagues present the results of an extensive world-wide observational campaign, which provided new essential information about this peculiar dwarf nova.The new observations were carried out in 2009, 2013 and 2015. The astronomers used several ground-based observatories, including the Skinakas Observatory in Greece, the Poznan Astronomical Observatory, the Warsaw University Observatory (both located in Poland), the Borowiec Station in Italy, the Antelope Hills Observatory and the MDM Observatory (both in the U.S.). The observations allowed the team to measure fundamental parameters of the system by collecting photometric data and analysing the light curves, O − C diagrams as well as power spectra.The scientists detected four superoutbursts and several normal outbursts. They also managed to characterize the occurrence of superhumps in superoutbursts, in outbursts, and in quiescence, along with their rates of change. Moreover, the researchers refined the supercycle length and possible changes in the superoutburst occurrence rate.”Based on the two consecutive superoutbursts detected in 2015, the supercycle length was derived Psc = 74 ± 0.5 days and it has been increasing with a rate of P = 3.3 × 10−3 during last 12 years,” the paper reads.The authors noted that MN Draconis is the first discovered SU UMa system in the period gap with increasing supercycle length. It means that the occurrence of superoutbursts in this object has been constantly decreasing in recent decades. Such increased supercycle length could be crucial for our understanding of the future evolution of dwarf novae.”MN Dra is another example of an active DN located in the period gap. It is worth noting that this star is not only a challenge for existing models of the superhump and superoutburst mechanisms, but also it presents other intriguing behaviours, in particular the increasing supercycle length,” the researchers concluded. © 2017 Phys.org The light curve of MN Dra during superoutbursts folded with Psc = 74 days. Black circles correspond to the June – July 2015 superoutburst and grey circles represent the September 2015 superoutburst. Credit: Bąkowska et al., 2017. This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.
Kolkata: In a significant improvement in the social security schemes for the workers in unorganised sectors, the Bengal government has completed the digitalisation of data of more than 55 lakh beneficiaries in the state so far.The state Labour department, the implementing authority of the Samajik Suraksha Yojana (SSY), has set a target to include 1.2 crore beneficiaries within the schemes, aiming to provide income security and various social benefits to the people engaged in unorganised sectors. Also Read – Heavy rain hits traffic, flightsSSY schemes were introduced by the state government in 2017, following the initiative of Chief Minister Mamata Banerjee, who laid an emphasis on the improvement of socio-economic conditions of the people working in various unorganised sectors. Prodded by the Chief Minister, the state Labour department chalked out an elaborate plan for a comprehensive coverage of social benefits.The various schemes that are falling under the SSY are State Assisted Scheme of Provident Fund for Unorganised Workers (SASPFUW), West Bengal Unorganised Sector Workers Health Security Scheme (WBUSWHSS), Social Security Scheme for Construction Workers (BOCWA), West Bengal Transport Workers Social Security Scheme (WBTWSSS) and West Bengal Bidi Workers’ Welfare Scheme (WBBWWS). To provide uniform benefits to each and every unorganised worker, the common benefits of all these schemes were integrated and converged into a single and more comprehensive scheme for the benefits of the beneficiaries, many of whom are illiterate. Also Read – Speeding Jaguar crashes into Merc, 2 B’deshi bystanders killedAs per the latest available report, digitalisation work has been done for 55,39,368 beneficiaries in the state so far. According to sources in the Labour department, many more beneficiaries have already been brought under the SSY schemes, the data of whom are yet to be uploaded in the system. The department has a target of bringing 1.2 crore people under this scheme and upload their data in the online system, so that every individual in the state can avail the benefits of the social schemes of the state government. The state government had also received an award in the national arena for the conceptualisation and effective implementation of the schemes, a senior official of the department said. SSY is one of the best labour welfare schemes that have brought about a change in the lives of people across the state. The digitalisation of data has helped the department to maintain a centralised information system, where all the information related to any individual is available at the click of a mouse.This will bring more transparency in the system and maintain the records of beneficiaries. The online maintenance of data will also help the department to check multiple entries. For example, earlier there was a possibility that an individual could apply for some benefits from two districts simultaneously. But the digitalisation of data is helping the department check such incidents.Unorganised workers are getting financial assistance of Rs 20,000 per annum for any ailment and the amount extends up to Rs 60,000 per annum in case of hospitalisation. They are also entitled to get provident fund after the age of 60.The state government also extends financial assistance to the beneficiaries, so that their children can pursue higher studies. Workers in hazardous jobs also get benefits under the scheme. Construction workers are entitled to get additional benefits like invalid pension and family pension. Transport workers are also entitled to get additional medical benefits and family pension.
Kolkata: The Central Bureau of Investigation (CBI) questioned the former CEO of Narada News Mathew Samuel once again on Friday, sources said. Samuel went to the office of CBI in Kolkata in connection with the Narada sting operation case. Sources said that the CBI officers have questioned Mathew in connection with the original video footages of the sting operation. It has been learnt that the investigating officers have not got a satisfactory answer in this connection.Sources said that the matter related to the Muchipara case in which a former Central minister from Bihar had received a call demanding extortion money of Rs 5 crore and was threatened with some video footages. Storage devices containing video footages were recovered from a hotel room at Muchipara.
Kolkata: In a stride to ensure that jute farmers and labourers get their desired benefits, the Centre will make it mandatory for the mill owners to make their payments in its entirety before getting the entire payment of the government orders.The decision of the Centre comes in the wake of a section of farmers and labourers complaining of not getting the benefits that they deserve. “The jute industry used to get payments against the order regularly. Why are the farmers and labourers complaining about it? Now, we are making it mandatory, that if you do not pay the farmers or labourers or any way abdicate the responsibility, we will not give you the order,” Union Textile minister Smriti Irani said during an interactive session organised by the Indian Chamber of Commerce. Also Read – Rain batters Kolkata, cripples normal lifeThe jute industry, according to the minister has a ready order worth Rs 5,000-5,500 crore every year (in terms of sacking). “We give such huge orders so that the jute industry stays alive. The sum is given to the jute industry in terms of order so that the farmers and labourers can get the benefits out of it,” she maintained. Irani urged the industry to go for innovation and come forward in taking new initiatives and said the Centre has been focusing on how to transform small size firms into mid-size entities. Elaborating on innovation, she touched upon technical textiles that are finding its application in automobiles, interior decoration, healthcare, industrial safety among others. Also Read – Speeding Jaguar crashes into Mercedes car in Kolkata, 2 pedestrians killedIrani said the industry should work closely with the government so that the policies framed by the latter may be implemented effectively. Later, addressing the Annual General Meeting at the Merchants’ Chamber of Commerce, she said the government has increased the import duty on some textile products to protect domestic manufacturing. “India looks at the trade war between China and the US as an opportunity and not as a challenge. India would be benefited from the trade war not only through policy intervention but also through industry practices,” she added.
Its that time of year when everyone is busy making travel plans with friends and family. Deciding on what to pack for your vacation is never easy and it often requires more thought than the destination itself To ensure you have a stress-free vacation, Experts list some must have travel looks. Gemstones: Summer is for bright and colourful outfits. Incorporating the colour trend in your jewellery is a great way to keep you vibrant and energized. Pieces with amethyst, which is also the Pantone color of the year, beautifully coloured tourmalines and other gemstones, are a must to carry on your travels. Also Read – Add new books to your shelfVersatile pieces: Even though we suggest you travel only with the essential pieces and stay light, keeping versatile jewellery that can be paired with both formal and casual outfits is extremely helpful. Detachable earrings, stackable rings and layered necklaces are a must have in your travel case. Rose gold: Rose Gold is a universally flattering metal that usually looks great with any colour or clothing. It looks amazing when paired with soft pastels and neutral colour themes while keeping you right on trend! Also Read – Over 2 hours screen time daily will make your kids impulsiveKeep it quirky: For those of you who like to stay quirky in style, animal renditions of jewellery are unique and are an extremely cool accessory for vacations. This trend is especially seen in pendants, studs and rings and is go to jewellery for all destination types. Lightweight: The most important rule when you are travelling is to keep your baggage as light as possible. This goes for your jewellery as well. Dainty, light pieces in pendants, earrings, rings and bracelets, that are easy to carry and store. Preferably a selection of those that can be paired with more than one look are the most apt. Plan according to your destination: Your choice of jewellery should be synonymous to your travel destination. For a beach holiday we suggest you team your classic black or a bright shade swimsuit or shorts and tee with minimalist pendants or layered neck chains. Layered necklaces are a big trend for the summer and will add just the right amount of bling to your casual outfit.Minimalistic pieces: Minimalist pendants and earrings are vacation essentials. Incorporating geometry through neckpieces and studs, that are easy to carry and minimalistic in look ensures convenience and style.
In an endeavour to promote Indian handicrafts and the spirit of craftsmanship, Central Cottage Industries Corporation (CCIC) has organised an exhibition cum sale titled ‘Sculpted Renditions’ – of an exquisite collection of sculptures and artefacts in its showroom at Janpath, New Delhi.The exhibition will be open to view from 10 am till 7 pm every day until September 16.One can browse through some of the finest masterpieces of traditional Indian dexterity. The exhibition showcases a vast collection of statuettes, figurines, and replicas of our ancient mythological deities with intricate works in stones, bronze, and wood craft. A Special display of ‘Lord Ganesha’ has also been put on the occasion of Ganesh Chaturthi. Also Read – Add new books to your shelfThe ongoing exhibition is an initiative by CCIC in order to promote Indian crafts, encourage the craftspersons and to present their creations with a view to increase the awareness about handmade sculptures and artefacts to a wider audience.Central Cottage Industries Corporation of India Ltd. (CCIC), a public sector undertaking under the Ministry of Textiles is engaged in the promotion and retail marketing of best of authentic Indian Handloom and Handicraft products through its showrooms in New Delhi, Mumbai, Bengaluru, Chennai, Kolkata Hyderabad, Patna, and Varanasi.CCIC sources its merchandise directly from, weavers, master weavers, craftsperson, Shilpgurus, National Awardees, and Clusters. CCIC is dedicated to the development of Indian crafts and craft person, providing a unique platform for showcasing their art.
Just so there wasn’t any doubt about what happened, Kiffin later confirmed on Twitter that he took the safety because he didn’t want to cover. He referenced to comments from his former boss Nick Saban, saying covers are like rat poison.Owl up.Didn’t want to cover because of too much rat poison #keptuwatching #5-0 #cometothefau #playersgetweekendoff https://t.co/HCsRjZKh4E— Lane Kiffin (@Lane_Kiffin) November 4, 2017 Advertisement Gambling is always unpredictable and cruel, but it’s even worse when your fate is in Lane Kiffin’s hands. Kiffin is in the headlines today for intentionally blowing a 6.5 point cover against Marshall by intentionally taking a late safety, and later confirming he did it on purpose on Twitter.FAU had a cover well in hand, leading 30-23 with 14 seconds left in the fourth. All they had to do was kick the ball away and all the gamblers that laid the 6.5 could cash their tickets.Instead, Kiffin pulled an all-time troll job by having his punter run out of the back of the endzone for a safety, which brought the score to 30-25 to blow the cover and enrage bettors (unless they had Marshall and the points).FAU was -6 point spread on Marshall & Lane Kiffin just trolled everybody with the safety ??? #Fau #Lanekiffin pic.twitter.com/LOwr6qSF7R— Lil Mook (@Lilmook4real) November 4, 2017
Legendary promoter Don King was the driving promotional force behind Mike Tyson dominated the heavyweight division in the 80’s and became one of the most famous athletes in the world. Over the years the relationship has deteriorated, with Tyson accusing King of using him taking advantage of him and his naivety and contributing to his eventual downfall.The two appeared at a Boxing Hall of Fame event this weekend in Calistoga, New York, and apparently Tyson isn’t ready to bury the hatchet. During the panel discussion, King gave Tyson a friendly pat on the shoulder as he walked past him on his way to his seat. Tyson wasn’t feeling the olive branch and instead threw his drink on King. King kept walking rather than risk getting his face pounded in. Probably a wise move. Apparently, time doesn’t heal all wounds. Advertisement After the event, Tyson explained why he still hates the extremely hate-able King:
February 22, 2011 This story appears in the March 2011 issue of . Subscribe » You know the drill. You and a client agree on terms. You send out a contract and it sits. You give a reminder call, and the client finally inks the contract–but the scanner is broken, so the contract sits some more. By the time it’s in hand, you’ve worked months with no legal umbrella.There’s no reason to live with that scenario anymore. Technology has made signing with electronic signatures (e-signatures) a real option.The legal framework for acceptance of e-signatures has been in place since the passage of the federal Electronic Signatures in Global and National Commerce Act in 2000. Many larger businesses have adopted the practice, but delivery models have been too cumbersome and expensive for most smaller outfits, until recently.With the software-as-a-service model, a solution that integrates with PDF and Word documents costs as little as $10 a month. In fact, with the release of Adobe’s free beta for eSignatures, it may be possible to jump on the e-signature bandwagon for no upfront cost.The adoption of e-signatures could help you reap dividends during the sales cycle. A study of 472 organizations by the Aberdeen Group found that users of e-signatures were 50 percent more likely to show improved customer renewal rates. They were also 41 percent more likely to reduce proposal errors and 18 percent more likely to shorten their sales cycles.”A key challenge facing businesses is achieving cost-effective sales growth,” says Peter Ostrow, Aberdeen research director. “Users of electronic signature technology outperform non-users in areas that significantly impact sales growth.” This hands-on workshop will give you the tools to authentically connect with an increasingly skeptical online audience. Free Workshop | August 28: Get Better Engagement and Build Trust With Customers Now 2 min read Enroll Now for Free
Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global The onslaught continues.On Wednesday night Anthem, the second-largest health insurer in the United States, announced that it had succumbed to a massive cyber attack. It may be the largest hack to hit the health care industry to date.The company, formerly known as WellPoint, has nearly 40 million customers that appear to be at risk, but the breach may have also exposed personal information for the company’s past customers, too. In total, the names, social security numbers, e-mail addresses, birthdays, street addresses, member IDs, and employment information (including salaries) for some 80 million people may been compromised. No credit card or medical data seems to have been taken.According to an FAQ provided by the company, the following Anthem brands were impacted by the hack: Anthem Blue Cross, Anthem Blue Cross and Blue Shield, Blue Cross and Blue Shield of Georgia, Empire Blue Cross and Blue Shield, Amerigroup, Caremore, Unicare, Healthlink, and DeCare. The company promises to provide credit monitoring and identity protection services free of charge to those affected.“Anthem’s own associates’ personal information—including my own—was accessed during this security breach,” wrote Joseph Swedish, president and CEO of Anthem, on a Web site—www.anthemfacts.com—the company set up amid the attack’s disclosure. “We join you in your concern and frustration, and I assure you that we are working around the clock to do everything we can to further secure your data.”Anthem has employed Mandiant, a division of cyber security firm FireEye, to investigate its attack. Mandiant was also called upon to investigate the last major attack to hit the health sector, which involved Community Health Systems, a Tennessee-based hospital operator, in August. That earlier breach consisted of 4.5 million records being compromised from April to June—and, like Anthem’s breach, did not appear to target medical or financial information.Mandiant pegged the Community Health Systems attack on Chinese hackers, an “Advanced Persistent Threat” group that normally targets U.S. intellectual property. Following that breach, the FBI issued a one page flash warning to the healthcare industry urging companies to be on the lookout for attacks.As reported by Reuters, which had obtained a copy shortly after it was disseminated, the agency said:The FBI has observed malicious actors targeting healthcare related systems, perhaps for the purpose of obtaining Protected Healthcare Information (PHI) and/or Personally Identifiable Information (PII)…. These actors have also been seen targeting multiple companies in the healthcare and medical device industry typically targeting valuable intellectual property, such as medical device and equipment development data.One problem the health industry faces is that many companies within rely on aging computer equipment—an easy target for vulnerability-seeking miscreants. “Legacy systems running outdated software and vulnerable application elements are contributing to these companies being a prime target for compromise,” says Jay Kaplan, CEO of Synack, a security firm that sells subscription security software, and a former NSA senior cyber analyst. “All of our healthcare information, from insurance claims to patient records, is being moved online for convenience. We are at the liberty of these companies housing our sensitive data to adequately protect this information.”According to V. Miller Newton, CEO of data encryption company PKWare, the corporate world will see a major hack every month this year—at least. The only way to solve the problem? “By armoring the data at its core with persistent encryption,” he says, which would render sensitive data into garbled text.“Old antiquated computers are not the problem,” Newton says. “The problem is that adversaries are going to continue to penetrate these systems no matter what level of perimeter network security they have in place. Every other major company and health provider in this country has to start to think about this problem differently. They have to think about it from the ‘information out’ versus the ‘network in’ perspective—that paradigm shift is starting to happen now, but it has to happen a lot more quickly.”An FBI spokesperson declined to comment beyond the statement the agency had issued saying that the agency was aware of the intrusion and is investigating it. “Anthem’s initial response in promptly notifying the FBI after observing suspicious network activity is a model for other companies and organizations facing similar circumstances,” said FBI spokesman Joshua Campbell. “Speed matters when notifying law enforcement of an intrusion, as cyber criminals can quickly destroy critical evidence needed to identify those responsible.”In terms of scale, Anthem’s breach looms large when compared to other breaches that have made headlines. Last year, Home Depot disclosed that up to 56 million credit cards had been looted. In 2013, Target suffered theft of 40 million customers’ credit cards and had lost the personal information of another 70 million. Unlike those attacks, Anthem’s is believed to not involve credit cards.When hackers infiltrated J.P. Morgan and stole personal information from around 80 million customers, they did not acquire highly sensitive data like social security numbers, as they have in the case of Anthem.Chris Petersen, CTO and co-founder of LogRhythm, a security intelligence company in Boulder, Colorado, said: “The barrier to entry for cybercriminals continues to decrease, and personal health information can trade at a premium on the black market. Healthcare providers and insurers are a veritable treasure trove for would-be attackers, not only storing PHI but also card holder data. The Anthem breach should put all healthcare providers and insurers on notice.”For current and former customers who believe they have been affected, Anthem has provided a toll-free phone number (1-877-263-7995) where it has promised to address questions related to the “very sophisticated external cyber attack,” as Swedish referred to it. When this reporter dialed the extension, though, he was met with a busy signal. February 5, 2015 Growing a business sometimes requires thinking outside the box. This story originally appeared on Fortune Magazine Register Now » 6 min read
Last year will go down as the year of the security breach.Reports of attacks and breaches made headlines across the world as many companies learned firsthand the damage a high-profile breach can inflict on a brand. Of the several lessons learned, the biggest may be that security needs to be top-of-mind for any online business — regardless of size.In fact, small companies stand to lose the most because they typically lack the dedicated security staff and expertise of a business ranked in the top half of the Fortune 500. While breaches at smaller companies may not make the headlines — if they’re detected at all — the sheer number of small e-commerce sites in operation is just too tempting for hackers to ignore.A recent study found that not only do the number of bots (automated applications that crawl and scan websites) on the Internet outnumber human visitors, but smaller websites actually receive a disproportionately higher percentage of automated bot visitors — up to 80 percent of all traffic on sites with fewer than 1,000 visitors a day. Malicious bots probe sites for vulnerabilities, effectively automating web hacking.The rise of automation has broadened the scope of attacks, making small businesses just as vulnerable as Home Depot or Target. Today, all online businesses are at risk. You don’t have to be a Fortune 500 company to protect your business and customers from malfeasance. The following are simple measures any business owner can take to thwart attacks and prevent breach.Related: Is Your Company’s Data Safe in the Cloud? (Infographic)1. Mind the gapsVulnerabilities are just that: exploitable weaknesses that allow attackers to penetrate systems. Fortunately, many of these vulnerabilities are well known and easy to patch. Specifically, there are two vulnerabilities all e-commerce business owners should be aware of: SQL and Cross Site Scripting (XXS).Many sites, based on how their e-commerce application was built, are vulnerable to SQL injection attacks. Criminals probe web applications with SQL queries to try to extract information from the e-commerce database.Cross Site Scripting attacks can occur when applications take untrusted data from users and send it to web browsers without properly validating or “treating” that data to ensure it isn’t malicious. XSS can be used to take over user accounts, change website content or redirect visitors to malicious websites without their knowledge.Because attacks on these vulnerabilities are directed at web application, a web application firewall (WAF) very effective in preventing them.2. Denial of serviceSome criminals are taking a brute force approach and flooding websites with traffic to take them offline — called a distributed denial of service (DDoS) attack. For e-commerce sites, a DDoS attack has a direct impact on revenue. A single DDoS can cost more than $400,000, with some sources reporting costs of up to $40,000 per hour. With attacks ranging from mere hours to several days, no business can afford the risk of a DDoS attack.Often times these attacks are accompanied by a ransom note demanding funds to stop the DDoS attack; other times the attack is merely a smokescreen, giving hackers time to probe the site for vulnerabilities.In either case, rather than fall prey to extortionists, e-commerce sites should enlist DDoS protection to detect and mitigate the attack before it impacts their bottom line. DDoS protection is often available from hosting providers, so small businesses can ask their website hoster for options.3. Two-factor authenticationStolen or compromised user credentials are a common cause of breaches. eBay reported that cyber attackers compromised a small number of employee log-in credentials, allowing unauthorized access to eBay’s corporate network. Criminals use social engineering, phishing, malware and other means to guess or capture usernames and passwords. In other cases, attackers target administrators, whom they discover on social networks, using spear phishing attacks to obtain sensitive data.Related: Why Your Password is Hackerbait (Infographic)Stopping this problem is as simple as implementing two-factor authentication. This second factor is usually a code generated via an app or received via text on a phone owned by the user. Two-factor authentication has been around for a while, but just as better smartphone cameras opened up a whole new market of photo editing and sharing applications, so too has the escalation in breaches increased the number of options for two-factor authentication.Today, there are a number of great two-factor authentication solutions that are both easier to use and very effective at keeping hackers out. Many are free, including Google Authenticator, and are packaged as handy apps on smartphones. With the increasing risk of breach, it’s more important than ever that any application dealing with customer data be protected by two-factor authentication.4. Scan your siteWeb scanners are an important tool for detecting the SQL injection vulnerabilities and XSS mentioned above, as well as a host of other vulnerabilities. Information from these scanners can be used to assess the security posture of an e-commerce website, providing insights for engineers on how to remediate vulnerabilities at the code level or tune a WAF to protect against the specific vulnerabilities.However, in order to be effective, businesses need to use them regularly. It’s important to subscribe to a service that scans on a periodic basis — not every three years.5. Keep your ‘friends’ closeAccording to research by the Ponemon institute, third party providers — hosters, payment processors, call centers, shredders — have a significant impact on breach likelihood and scope. You wouldn’t trust your money to a bank without rigorous, proven security measures in place. Nor should you trust a software vendor without security practices in place.When seeking new providers, make sure they’re compliant with security best practices like the Payment Card Industry’s Data Security Standard (PCI-DSS) and cloud-security certification SSAE16. Don’t be intimidated to ask cloud software vendors how they’re managing security and what certifications they have. If they have none, you should think twice about working with them.Don’t overlook this. No matter how good the product, if the software introduces risk to your business, it’s not worth it.Today the risk of data breach is greater than ever, for large and small businesses alike. But security does not have to be complicated. By using the right tools, partnering with the right vendors and implementing safeguards, online businesses can reduce risk and keep out of the headlines.Related: Sometimes Hackers Just Want to Embarrass You April 10, 2015 Problem Solvers with Jason Feifer Opinions expressed by Entrepreneur contributors are their own. Hear from business owners and CEOs who went through a crippling business problem and came out the other side bigger and stronger. Listen Now 6 min read
Music PlayerIf you’re a music lover, you’ll appreciate the ScreenPad’s ability to play your tunes. ScreenPad currently has two apps for music: Music Player and Spotify. The Music Player app will play your music files, provided that they’re downloaded onto the computer. The Spotify app lets you access all your playlists once you log in and give ScreenPad access. Keep in mind that ScreenPad will play nice with only premium Spotify accounts.Office ToolbarOne of ScreenPad’s biggest draws is its intelligent adaptive design, used specifically for Microsoft Office software. Thanks to this feature, when I launched Excel, Word or PowerPoint, a little toolbar full of helpful shortcuts would appear.It’s like a larger, better version of Apple’s Touch Bar. Now, if Asus could find a way to bring this functionality to Google Docs, this could be one of my top ScreenPad uses. by Taboolaby TaboolaSponsored LinksSponsored LinksPromoted LinksPromoted LinksYou May LikeVikings: Free Online GameIf you’re over 40 – this game is a must!Vikings: Free Online GameUndoKelley Blue Book5 Mid-engine Corvettes That Weren’tKelley Blue BookUndoGrepolis – Free Online GameGamers Around the World Have Been Waiting for this GameGrepolis – Free Online GameUndoTODAYPolice Identify Girl Licking Ice Cream Tub In Viral VideoTODAYUndoMy Food and FamilyHealthy, Homemade Drunken Thai Noodles In Just 20 MinutesMy Food and FamilyUndoMayo ClinicManaging psoriatic arthritis painMayo ClinicUndoAdvertisement Adobe SignDigital signatures, they’re the wave of the future. And to help usher in this future of ease and convenience, Asus has added the Adobe Sign app. As the name suggests, the app allows you to sign your name using the touchpad, which is much more elegant than using a mouse. Just be sure to have Adobe Reader installed before you try this feature.Phone MirroringSome of us have developed a serious relationship with our smartphones, making it hard to hold off from touching them for pretty much any length of time.Asus has a clever solution for this by way of its Asus Sync app.After downloading the app on both your Android (or iOS) phone and the ZenBook and syncing the two devices up, you can make calls and check your notifications from the ScreenPad. It won’t break you out of your smartphone fixation per se, but it’s a start.Credit: Laptop MagBest 2-in-1s (Laptop/Tablet Hybrids)Our Favorite Tablets for Work and PlayThe Best Laptops for Business and Productivity Second screens on laptops are nothing new (cough, MacBook Touch Bar). But in reviewing the Asus ZenBook Pro 15, I believe that the company’s ScreenPad is the best implementation yet.ScreenPad is a capable chameleon; with a simple tap of the screen and press of a button, the screen can change at a moment’s notice to adjust to your current activity, whether you’re writing a paper, enjoying a movie or listening to music. Here are some of the best uses for the ScreenPad.Second ScreenThis is my absolute favorite thing to do with the ScreenPad. When enabled, the ScreenPad mirrors its larger counterpart, allowing you to level up your multitasking.MacBook Air vs MacBook Pro: Which 13-inch MacBook Is Right For You?Apple’s entry-level MacBook Air and Pro look pretty similar, but our testing proved they differ in crucial ways.Your Recommended PlaylistVolume 0%Press shift question mark to access a list of keyboard shortcutsKeyboard Shortcutsplay/pauseincrease volumedecrease volumeseek forwardsseek backwardstoggle captionstoggle fullscreenmute/unmuteseek to %SPACE↑↓→←cfm0-9接下来播放Which Cheap Tablet Is Best? Amazon Fire 7 vs Walmart Onn02:45关闭选项Automated Captions – en-USAutomated Captions – en-USAutomated Captions – en-US facebook twitter 发邮件 reddit 链接https://www.laptopmag.com/articles/asus-screenpad-uses-zenbook-pro?jwsource=cl已复制直播00:0003:4603:46 My ideal setup for the second screen is to have either my FaceBook or my Twitter open on the ScreenPad. Before you use second screen, be sure to enable Extension Display mode. From there, you can drag windows down onto the ScreenPad.YouTube RemoteInstead of futzing around on the top display, you can access all of your YouTube controls on the ScreenPad. After you enable the extension in Google Chrome, the Remote opens automatically whenever YouTube is launched. I appreciate how smoothly the slider allowed me to skip forward or backward in a video and that I could access full-screen mode and closed-captioning without activating the title and scroll bar.
Block Facebook Live Notifications by Martin Brinkmann on June 24, 2016 in Companies, Facebook – Last Update: January 04, 2018 – 3 commentsThe following guide walks you through the steps of blocking Facebook Live Notifications for live video streams on the social networking site.Facebook Live is a relatively new feature on Facebook that users of the service can utilize to stream live video on the site.Anyone on Facebook can use Facebook’s applications to broadcast live. As is the case with all things that end up in your news feed, some may be more interesting than others.One issue with Facebook Live is that notifications are turned on by default which means that you will be informed about any live stream that Facebook friends start.This makes sense considering that time is of the essence when it comes to live streams, as you would not know about it in first place if Facebook would not push out notifications.On the other hand, if your friends use the live stream feature for things that are of little or no interest to you, then you may want to block Facebook Live notifications on the site as you’d probably be annoyed by those notifications after a while. This is true especially if some happen to live stream regularly.Block Facebook Live NotificationsIt is thankfully rather easy to turn off Facebook Live Notifications. One of the fastest option to do so is the following one:Load the page https://www.facebook.com/settings?tab=notifications§ion=on_facebook&view on a desktop computer.Locate the Live Videos section under “What you get notified about”.Click on the menu to its right, and switch it to All Off.Facebook does not list the difference between All Off and Suggestions Off, the second option besides On. It is likely that Suggestions Off will block live video notifications that don’t originate from a user’s friend list.If the direct link won’t load for you, do the following instead:Click on the down arrow icon at the top right corner of the Facebook page. It is the rightmost icon on Facebook currently.Select Settings from the menu that opens.On the Settings page, switch to Notifications. You find the link listed on the left.When the Notifications page opens, select On Facebook.There you find the Live Videos notifications setting, and the option to turn it off.The Facebook application, at least the one on Android, does not include an option to turn off live notifications currently.SummaryArticle NameBlock Facebook Live NotificationsDescriptionThe following guide walks you through the steps of blocking Facebook Live Notifications for live video streams on the social networking site.Author Martin BrinkmannPublisher Ghacks Technology NewsLogo Advertisement
How to migrate from Evernote to OneNote by Martin Brinkmann on June 29, 2016 in Tutorials – 20 commentsThe following guide walks you through the process of migrating all of your Evernote notebooks to Microsoft’s OneNote service.Evernote’s recent announcement that it would limit basic users to syncing two devices, and increase pricing of the service for all paying customers, will certainly lead to users leaving the service behind.One Evernote alternative is Microsoft’s OneNote service. OneNote supports many features of Evernote, and tops the service in others. It features unlimited monthly uploads for instance, is free, and enables you to write anywhere on a page.Migrate from Evernote to OneNoteAs far as migration from Evernote to OneNote is concerned, the easiest option is to use Microsoft’s Evernote to OneNote importer. The program is only available for Windows 7 and later only however.Good news is that it supports two ways of migrating your data from Evernote to OneNote. The easier one of the two picks up the data from the local Evernote program for Windows, the other manually exported Evernote data files with the .enex extension.The easy methodMake sure Evernote for Windows is installed, and that you signed in recently so that all data including recent additions is available on the local computer.Install Microsoft’s Evernote to OneNote Importer program on the same device.Accept the license agreement when you start the importer, and click on the get started button.The importer scans the device for Evernote notebooks, and displays all it finds in its interface.Select one, some or all Evernote notebooks for the migration and click on the next button.You need to sign in to a Microsoft Account, or a work or school account now. Select the appropriate option from the selection menu. If you don’t have a Microsoft account, there is also an option to sign up for one.If you are using Windows 10, your Microsoft account may be picked up automatically. If not, you need to enter the username and password manually to complete the step.OneNote creates new notebooks for every Evernote notebook automatically during the migration. You may check the “use Evernote tags to organize content in OneNote” option to use the tagging system on OneNote as well.Click on the import button to complete the process.The import may take a while depending on the content that is stored on Evernote.The manual wayYou may use Microsoft’s OneNote Importer to import Evernote .enex files instead. You may use the Evernote for Windows or Mac application to save notebooks as .enex files.Instructions on how to do so are provided on the Evernote help website.The process is nearly identical from that point on. The only change is that you need to select database files manually, and that you can import only one notebook at a time using the method.Considering that the importer will pick up all notebooks by default if the Evernote application is installed on the same computer, it is without doubt easier to use it instead of the manual method.If you are using a Mac or Linux, you may want to consider using a virtual machine installation of Windows for the importing if you want to switch to OneNote.Now You: Which note taking service are you using, if any?SummaryArticle NameHow to migrate from Evernote to OneNoteDescriptionThe following guide walks you through the process of migrating all of your Evernote notebooks to Microsoft’s OneNote service.Author Martin BrinkmannPublisher Ghacks Technology NewsLogo Advertisement
Detect Outlook Ransomware emails with RansomSaver by Martin Brinkmann on October 03, 2017 in Email – Last Update: May 22, 2018 – 1 commentRansomSaver is an add-in for Microsoft’s Outlook messaging software that detects and protects against ransomware emails.Email is one of the main attack vectors of ransomware attacks. While there are other means of distribution, email is still a lucrative option considering that attackers may send emails to millions of users in a short period of time.It does not help either that a lot of computer users are still undiscerning when it comes to email security. If all users would be very careful in regards to links and file attachments, the overall situation would be much brighter in regards to computer security, hacked accounts and botnets.RansomSaverRansomSaver is an add-in for Microsoft Outlook. The add-on is compatible with all 32-bit and 64-bit versions of Microsoft Outlook starting with Outlook 2007 and including Outlook 2016 and Outlook for Office 365. It runs on all systems newer than Windows XP.The application is installed as an Outlook add-in which means that it is integrated into Outlook automatically when you install it. It works out of the box, and comes with a handful of options on top of that.The program’s main function is a scan for ransomware. It checks emails that you select for ransomware attachments, and may delete the entire message or only the attachment.The add-in moves the emails to a special folder called RansomSaver that it creates as a child folder of deleted items in Outlook.It is unclear from the description on the developer website how the add-in determines whether an attachment is potentially malicious or not. The FAQ lists extensions that RansomSaver considers suspicious.The options that the program supports are simple: you may enable or disable the removing of attachments and/or emails, disable the scan functionality until the next Outlook start, and disable the scanning of the deleted items folder of Outlook.Options are accessible from the add-in’s toolbar. There you find options to scan existing folders for ransomware attachments and a link to the incident log as well.Here is a short video that highlights the add-in’s functionality:Closing WordsRansomSaver serves two main purposes: to detect potential threats when users open emails, and to scan all existing emails for threats. Experienced users won’t have much use for it, at least not when it comes to their own systems, but it may protect inexperienced users from executing file attachments on their devices.Summary12345 Author Rating4 based on 5 votes Software Name RansomSaverOperating System WindowsSoftware Category EmailLanding Page https://www.synergy-usa-llc.com/ransomsaver-overview.html Advertisement
Firefox 60: HTTPS upgrade for Mixed Content by Martin Brinkmann on February 24, 2018 in Firefox – 20 commentsMozilla plans to launch a new feature in Firefox 60 that upgrades optionally-blockable mixed content on HTTPS sites to HTTPS if possible.The migration to an HTTPS powered World Wide Web is in full swing. One of the byproducts of the migration is that some sites may load HTTPS and HTTP content. This is called Mixed Content and it is undesirable as it reduces security and privacy if loaded.Mixed Content is divided into blockable and optionally-blockable content. Modern web browsers block any content that may interfere with the display of data on HTTPS web pages if it is loaded using HTTP.Think of a script that is loaded from an HTTP resource on an HTTPS site. Browsers don’t block optionally-blockable content usually on the other hand. This is static content such as images or videos that can’t interfere with the web page or data directly.Firefox displays a different lock symbol on sites with mixed content that is optionally blockable. The browser displays a green lock symbol on HTTPS sites without mixed content.While optionally-blockable mixed content is less dangerous than blockable mixed content, it is still problematic from a privacy point of view.HTTPS upgrade for Mixed Content in FirefoxMozilla Firefox 60 includes a feature that changes the browser’s behavior when it comes to mixed content that is optionally blockable.Firefox attempts to load mixed content that is optionally blockable from HTTPS domains instead of the referenced HTTP domains. If the resource cannot be loaded, it is not displayed at all. This can lead to image, video or audio content not being shown correctly in the browser because of the change.The limitation is likely the main reason why Mozilla won’t activate the feature by default in Firefox 60.The feature won’t be enabled by default in Firefox 60 but users can set it to enabled in the following way:Load about:config?filter=security.mixed_content.upgrade_display_content in the Firefox address bar.Double-click on the preference to set it to true.You can revert the change at any time by setting the preference to false, or by right-clicking on it and selecting the reset option from the context menu.Now You: Do you care about mixed content? (via Sören)Related articlesFirefox 23 to block insecure contents from being loaded on https pagesFirefox 59: Referer Path Stripping in Private BrowsingFirefox 60: new “not secure” indicator preferencesFirefox 60 with new preference to disable FTPMozilla makes Firefox 60 next ESR targetSummaryArticle NameFirefox 60: HTTPS upgrade for Mixed ContentDescriptionMozilla plans to launch a new feature in Firefox 60 that upgrades optionally-blockable mixed content on HTTPS sites to HTTPS if possible.Author Martin BrinkmannPublisher Ghacks Technology NewsLogo Advertisement