[vemba-video id=”van/sc/2019/06/07/bang_f48a0055-b442-4af8-8c53-4d14bb1e5804″]OAKLAND — Stephen Curry wasn’t surprised when Draymond Green stood up and took the heat again after the Warriors’ loss to the Toronto Raptors in Game 3 of the NBA Finals.“That’s definitely an M.O. of his,” said Curry, when asked about Green blaming himself for the 123-109 loss on Wednesday night.“Honestly, I know even if he didn’t say nothing, just having been around him the last seven, eight years, that he …
UPDATED on May 7, 2015 Sungevity also offers batteries for homeownersTesla isn’t alone. The Oakland, California, based solar company Sungevity has announced that it will begin offering a home battery system manufactured by Sonnenbatterie, a German company, the San Francisco Chronicle reported.Sungevity’s chief product officer, Peter Graf, made the announcement two days before Tesla, but said it was not so much an attempt to upstage Musk’s announcement but a response to customers who have been been clamoring for home storage.Even so, the details of the Sungevity offer are yet to be worked out. Graf didn’t disclose any technical details on the batteries, and offered no official pricing, although Greentech Media said it had been told by Sungevity that the system would cost less than $10,000.Graf told The Chronicle that Sungevity and Sonnenbatterie were still discussing whether to sell the systems, lease them, or both. The home battery system will apparently become available in the second half of the year.Sungevity does business in more than a dozen states, including Arizona, Massachusetts, New Jersey, Vermont, New York, and California. Less expensive than lead-acid battery optionTesla’s lithium-ion battery appears to be a cheaper option for battery backup than the lead-acid batteries that have traditionally been used for off-grid photovoltaic systems, says Fortunat Mueller, co-founder and co-owner of ReVision Energy in Portland, Maine.It would take six EnergyCell 200H batteries to form a 7 kWh bank and eight batteries to make a 10 kWh bank, given certain assumptions about the battery discharge rate and depth of discharge.Each of those 12-volt batteries costs $545, so the 7 kWh sealed lead acid battery system could be set up for $4,200 and the 10 kWh bank for about $5,500, he said, if you include the cost of a rack.Mueller added that cheaper batteries are on the market, but they aren’t maintenance-free.“But all in all, if Tesla’s quoted prices are the retail price for a fully capable battery with a real 7 or 10 kWh of useable energy storage in a heavy cycling application, then they definitely have an attractive price point and will substantially improve what is available in the market today,” he said in an email. “We’re eager to actually get our hands on one and see what they can do in the real world.” Later this year, Tesla Motors will begin selling two versions of a lithium-ion battery to homeowners who either want to store power generated by their photovoltaic (PV) systems or store utility electricity purchased when rates are low.The lithium-ion batteries for home use, called Powerwall, is part of a rollout announced by Tesla CEO Elon Musk. The product line also includes batteries for businesses and utilities, all derived from the batteries that power Tesla’s Model S electric vehicle.Batteries will be connected to the internet, allowing them to be managed remotely by Tesla, according to an article in The New York Times.Powerwall batteries have three potential uses, according to Tesla’s website:Backup power for times when the grid is down.Storing electricity purchased at low, overnight-rates for use during the evening when peak rates typically apply, what the company calls “load shifting.”Storing power generated by PV systems for use at a different time of day.Batteries will be available in two configurations: a 7 kilowatt-hour version for $3,000, and a 10 kWh model for $3,500. They will be able to provide 2 kW of continuous power and 3.3 kW of peak power, and up to 450 volts. Two or more batteries can be paired for houses that need more storage capacity. The batteries will carry a 10-year warranty.
Serverless Backups: Viable Data Protection for … The NSA does not monitor every piece of data, the story reports, only targeted individuals. But the capability to monitor the target within all of the companies’ data is there, according to the slides obtained by the Post.All of the companies named in the leaked slides have categorically denied being involved in PRISM, which is pretty much the only answer they can give: if such a program exists, they are likely bound by court order from revealing their participation, and if it doesn’t exist, then they are truthful in denying it. The U.S. government, for its part, acknowledges that such programs do exist, but that the documents published by the Post and the U.K.’s Guardian contain “numerous inaccuracies.”Which, alas for the U.S. tech industry, isn’t exactly a “no.”Perception-wise, the firms named in the leaked slides are screwed. If PRISM doesn’t exist, it will be very hard to prove otherwise in a climate where distrust of government is at an all-time high. If PRISM does exist, then the perception of these companies will either be as lying co-conspirators in a massive breach of user privacy – or incompetent morons who don’t know that the U.S. government can get into their data whenever it wants.The most likely scenario here is that the tech companies are being very, very literal: they can deny ever hearing of a program called PRISM because they may have really never heard of it. Ars Technica spoke with Electronic Frontier Foundation Staff Attorney Kurt Opshal, who outlined what’s probably going on with these denials:“Whether they know the code name PRISM, they probably don’t,” [Opshal] told Ars. “[Code names are] not routinely shared outside the agency. Saying they’ve never heard of PRISM doesn’t mean much. Generally what we’ve seen when there have been revelations is something like: ‘we can’t comment on matters of national security.’ The tech companies responses are unusual in that they’re not saying ‘we can’t comment.’ They’re designed to give the impression that they’re not participating in this.”In Cloud We Trust?Successfully pulling off that impression would seem to be nearly impossible and the nine tech companies named in the PRISM documents are in for a world of pain. Already, U.S.-based users, individual and corporate, are up in arms about the perceived breach, even as the U.S. government insists that it is not spying on its own citizens, but is targeting non-U.S. citizens in its quest to maintain national security.US companies may end up becoming more active participants in cyber/national security related activities anyway, depending on how Department of Defense cyberwar rules of engagement play out. (See also: New Cyberwar Rules Of Engagement: Will The U.S. Draft Companies To Fight?)But for public cloud users who reside outside the U.S., the statements about non-U.S. targets are sure to have a chilling effect. Especially in the European Union, which has been critically examining their data relationship with the U.S. for some time. That relationship, once precarious, may have just gotten pushed off the cliff.Currently, data generated by European companies is bound by the strictures of the E.U.’s 1998 European Commission Directive on Data Protection (ECDDP), which, among other things, blocks data from being transferred to outside the European Economic Area unless the E.U.’s strict protection guidelines were followed.The problem is that U.S. laws and policies let data like names and addresses be handled in ways that were way outside the ECDDP comfort zone. This would have effectively prevented any European data from being stored on U.S.-based clouds and data centers, were it not for Safe Harbor.Established in the Fall of 2000, Safe Harbor is a compromise that would allow data interchange to take place. Safe Harbor requires that companies follow a certain set of privacy practices, such as informing individuals that their data is being collected and how it will be used. If Safe Harbor rules are followed by U.S. companies, which self-certify themselves to be Safe Harbor compliant, then E.U. data can be stored in the U.S., which is handy since many of the world’s biggest public cloud services are located in the U.S.All of the E.U. nations, with the exception of Germany, are participants in the E.U.-U.S. Safe Harbor agreement. This is why in Germany, corporate workers are prohibited from using services like Google Docs to store and work with company information. (One has to wonder if the Germans didn’t have an inkling that something like PRISM was going on.)The Europeans have had some qualms about Safe Harbor already. Last July, an independent European advisory body, the Article 29 Working Party, recommended the existing Safe Harbor agreement between the U.S. and E.U. is not enough to provide true security for European organizations’ data. Their argument? That self-certification was nowhere near enough to assure adequate protections.“…[I]n the view of the [Article 29] Working Party, sole self-certification with Safe Harbor may not be deemed sufficient in the absence of robust enforcement of data protection principles in the cloud environment,” the recommendation stated. “The Working Party considers that companies exporting data should not merely rely on the statement of the data importer claiming that he has a Safe Harbor certification. On the contrary, the company exporting data should obtain evidence that the Safe Harbor self-certifications exists and request evidence demonstrating that their principles are complied with.”In other words, don’t take U.S. tech companies at their word that they will comply with Safe Harbor rules.Safe Harbor At RiskFast forward to today, when suddenly the Article 29 Working Party’s non-binding recommendation has some teeth to it. European companies and lawmakers are very likely going to look at the events surrounding PRISM and wonder how safe their data would be if stored in a U.S. system.Amazon and Rackspace, two large U.S.-based public cloud providers, were not named in the PRISM slides, but Microsoft and Google were. While no one knows if the U.S. intelligence services can and were accessing cloud-based data hosted by Microsoft and Google, the integrity of their cloud hosting services will probably be called into question now, especially by companies outside the U.S., which – by the U.S. government’s own insistence – are valid targets for national security investigations.The E.U.-U.S. Safe Harbor agreement may be the one of first casualties of the leaking of PRISM – even if PRISM turns out to be fictitious. Just the hint that something like PRISM could exist could evaporate a large amount of trust and business for U.S. cloud vendors – even ones not named in the PRISM documents.Public cloud infrastructure is under serious threat, as users domestic and international start seriously questioning public cloud security and integrity. This may bring a large shift towards private cloud or virtual data centers deployments, as companies seek to protect their data from government’s prying eyes.Images courtesy of Shutterstock. brian proffitt Related Posts U.S. tech firms who have built their business on a free-flowing Internet just got a huge smack in the face. Leaked government documents seemed to reveal the existence of a top-secret program with the capability to mine their users’ data at will.Right now, the debate is over exactly what data’s being collected and how—and whether the companies were complicit in letting it happen.But that misses the real impact of such a program. Regardless of the details, it will damage the reputations of the U.S. as a technology marketplace.There are many operations that will feel the hit, but the biggest one may be in cloud computing. After all, what foreign company would want to host its data in a cloud that could be rifled at will by the U.S. government?What We Think We KnowLeaked documents from the National Security Agency and the FBI have revealed an apparent secret government program, code-named PRISM, that is “extracting audio, video, photographs, e-mails, documents and connection logs that enable analysts to track a person’s movements and contacts over time,” according to the Washington Post.The data was pulled from the servers of Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. Dropbox, the Post reported, is supposedly “coming soon.” How Intelligent Data Addresses the Chasm in Cloud Top Reasons to Go With Managed WordPress Hosting Cloud Hosting for WordPress: Why Everyone is Mo… Tags:#cybersecurity
India’s Jwala Gutta and Ashwini Ponappa won their last group match against Shinta Mulia Sari and Lei Yao of Singapore on Tuesday but could not progress to the quarterfinals of women’s doubles badminton at the London Olympics. The Indian duo, who lost their opening match, beat the Singaporean girls 21-16, 21-15 in just 31 minutes.But the win wasn’t enough as Jawala and Ashwni, World Championship bronze medallists, finished third despite winning two matches like group toppers Yu Chin Chien and Wen Hsing Cheng of Chinese Tapiei and Japanese duo Reika Kakiiwa and Mizuki Fujii.The Chinese Taipei and the Japanese team went through to the quarters on the basis of better points.For the Indians, the first set was a tight affair with the Singapore team equalling them for half of the game. Jwala and Ashwini then pressed on the accelerator to take a eight point lead and finally close the game 21-16.In the second game, the Indians were quickly out of the blocks taking a 10-0 lead. Complacency on their part allowed the Singapore pair to make a comeback into the match. But it proved to be a little too late as the Indians held on to record a memorable win.Jwala partnered by V. Diju had earlier in the day lost third consecutive group match to be ousted from Olympics.Jwala-Diju lost their third and final group match 15-21, 15-21 in 27 minutes against World No.9 pair of Ha Jung Eun and Lee Yong Dae of South Korea to end fourth and last in Group D. The win came as a consolation for the South Koreans who are also out of the tournament.advertisement
Advertisement Executive producers Akiva Goldsman, from left, Heather Kadin, Gretchen Berg, Aaron Harberts and Alex Kurtzman and actors James Frain, Sonequa Martin-Green, Mary Chieffo and Jason Isaacs participate in the “Star: Trek Discovery” panel during the CBS Television Critics Association Summer Press Tour at CBS Studio Center on Tuesday, Aug. 1, 2017, in Beverly Hills, Calif. (Photo by Chris Pizzello/Invision/AP) “Star Trek: Discovery” also stars Jason Isaacs, Michelle Yeoh and Shazad Latif. Executive producer Alex Kurtzman told the Television Critics Association Tuesday that they “spent a lot of time” discussing how to create this new world for TV that felt authentic to the “Star Trek” universe. Advertisement Advertisement LEAVE A REPLY Cancel replyLog in to leave a comment LOS ANGELES — The premiere of “Star Trek: Discovery” on CBS’ subscription streaming service, CBS All Access, was postponed nine months to maintain the quality of the brand. “We are telling a story that we believe in. Everyone is so passionate. The craftsmanship here in our entire company, behind the camera and in front of the camera, is nothing short of stellar,” said Green. Kurtzman also debuted the theme song for “Star Trek: Discovery” performed by a 60-piece orchestra. It plays homage to the original theme and the entire song will play under a credit sequence in each episode. “Star Trek: Discovery” stars Sonequa Martin-Green of “The Walking Dead,” as central character, First Officer Michael Burnham. She’s the foster daughter of the Vulcan Sarek, who is Spock’s father. Also during that time, executive producer Bryan Fuller decided to exit the series as showrunner to focus on other projects. The timeline for the series is 10 years prior to the original series, or TOS, as Trekkies say. Kurtzman said “it became clearer and clearer” that the targeted January debut would “compromise the quality of the show,” so it was pushed with the blessing of CBS Chairman and CEO Leslie Moonves. The series premiere will broadcast on CBS Sept. 24. Immediately following, the first and second episodes will stream on CBS All Access. New episodes going forward will be available on Sundays. Executive producer Akiva Goldsman said, “We are going to cross paths with components that ‘Trek’ fans are familiar with, but it is its own standalone story with its own characters and its own unique vision of ‘Trek.’” Login/Register With: Facebook Twitter
Facebook Twitter Google+LinkedInPinterestWhatsAppKINGSTON, Jan. 23 (JIS): A Bill which seeks to decriminalise ganja for medicinal, religious, and private/personal use was tabled in the Senate today (January 23).The Dangerous Drugs (Amendment) Act, 2015, was laid on the table by Minister of Justice, Senator the Hon. Mark Golding.The amendments will make the possession of small quantities of ganja, amounting to two ounces or less, a non-arrestable but ticketable infraction, attracting a fine payable outside of the court, but not resulting in the possessor attaining a criminal record.However, failure to pay the monetary penalty will be deemed a minor offence punishable in the Petty Sessions Court by an order for community service.The legislation prohibits the smoking of ganja in public spaces, subject to specified exemptions.Proposed changes to the Act will also facilitate ganja being used for therapeutic purposes, as prescribed by a registered practitioner, or for scientific research conducted by an accredited tertiary institution or otherwise approved by the Scientific Research Council (SRC).The changes will enable the use of ganja in religious engagements by stakeholders, such as Rastafarians.The Bill also makes provisions for the creation of a Cannabis Licensing Authority to regulate the proposed hemp and medicinal ganja industry in Jamaica. Facebook Twitter Google+LinkedInPinterestWhatsApp Consultation on Gaming Policy 2015 Recommended for you Police execute search warrants and get Ganja; questioning man in cutlass crooks case Related Items:bill, dangerous rugs act, ganja, petty session court, scientific research council PM Tables Sexual Harassment Bill
MMTC’s flagship event ‘Festival of Gold’ has returned this festive season to dazzle the city with handpicked collections of hallmarked gold and certified stone-studded jewellery, silver and gold medallions in 999 purity, and the latest range of Sanchi silverware in 92.5 per cent purity. The event was inaugurated by dignitaries from the Dept of Commerce, Ministry of Commerce & Industry and by the senior management of MMTC on the evening of October 27, and will continue until November 10 (excluding November 5 and 6)at Hotel Ashok, Chanakyapuri as well as MMTC’s sales outlets across the city. Also Read – ‘Playing Jojo was emotionally exhausting’MMTC, the only government of India enterprise in the jewellery sector, has been holding its annual exhibition-cum-sale of hallmarked jewellery, the ‘Festival of Gold,’ since 1994. However, due to restrictions imposed on gold imports by the government of India over the last few years to check the fiscal deficit, availability of the precious metal had been sparse for the domestic industry and the popular event had to be put on hold for two years. With the recent relaxation in these conditions, the company has brought back the much-awaited exhibition-cum-sale on a grandiose level with collections from different states of India, medallions in various denominations and competitively-priced Sanchi silverware items. Also Read – Leslie doing new comedy special with NetflixThis year’s edition has been attracting customers in droves since day one, and has registered record footfall with sales touching the 16 crores mark in the first week of the event. On every customer’s wish list here is the temple style jewellery from the southern states, handcrafted gold jewellery from West Bengal, and MMTC’s special bridal range of jewellery. There is in fact something for everyone here, whether one is looking for something traditional or contemporary, plain or studded, heavy or light, for gifting or to add glitter of gold at the event, noted cinestar Neha Dhupia, who visited the Festival on the evening of November 3 and expressed her delight at being able to visit the one-of-its-kind event. Dhupia, who has been a part of MMTC’s gold event in the past also, took a leisurely round of the many counters at the exhibition and interacted with the MMTC management as well as the guests and the media.MMTC has been assigned the prestigious responsibility of marketing the India Gold Coin by the government of India, being regarded as the sovereign and national coin of India. The India Gold Coin is being minted in denominations of 5 gm and 10 gm and bears the Ashok Chakra. Once launched, the India gold coin will be made available at various outlets of MMTC alongwith the ‘Festival of Gold.’
Kolkata: Noted social worker Meher Engineer died in the city on Wednesday. Engineer, who was a scientist, passed away at the age of 75.He was associated with the Singur Nandigram movement and visited places to organise the people to protest against the red terror unleashed by the CPIM. He was an active member of the forum of the intellectuals and cultural activists that came up after the Singur and Nandigram incidents. He was a presidium member. He was associated with many NGOs associated with slum development and empowerment of women.
March 11, 2019 5 min read Opinions expressed by Entrepreneur contributors are their own. Business-tech adoption continues to grow globally. Worldwide, according to a Gartner forecast, IT spending is expected to reach $3.8 trillion by 2019, driven by investments in enterprise software and IT services.Related: 3 Tech Strategies You Can Use to Earn and Save More MoneyThat’s good for the companies making the tech, but perhaps less so for the companies buying it. Reason: With software and hardware becoming increasingly affordable, it’s easy to make rash spending decisions to purchase devices or subscribe to services that promise productivity gains and benefits. Any of those purchases may fail to deliver.So, as an owner, you need to exercise caution, because building your company’s tech infrastructure in a slapdash manner can be a financial sinkhole. The last thing you need for your fledgling venture is a runaway IT budget.Want to avoid wasting money when it comes to technology? Here are three ways to do that:1. Streamline Saas subscriptions.Netskope’s data indicates that enterprise companies often run up to 1,200 cloud services and software-as-a-service (SaaS) products. Out of those 1,200 cloud services, the most highly used are HR and marketing apps, which respectively average 139 tools for HR and 121 for marketing apps apiece.Given this rate of adoption, it’s common for teams to subscribe to multiple applications twith similar features and overlapping functionalities. Marketing apps, for instance, might all feature some form of analytics and tracking, automation and communication capabilities. To prevent such redundancy, it’s important that companies track their SaaS subscriptions.”Keeping SaaS cost under control is a challenging task when SaaS spend is spread among different business units,” Uri Nativ, co-founder and VP of engineering at Torii, wrote on his company’s blog. “When visibility is low, the spend control is low, which quickly leads to wasted money.”A SaaS spend dashboard has to be presented to IT and your business units in readable way,” Nativ added. “Once the various business units have good visibility on cost, they can control it, save money and reduce waste.”2. Avoid cheap devices from dubious manufacturers.Another area where you may be spending unreasonably is hardware. The electronics manufacturing boom has fed an influx of cheap computing devices into the market. Due to their low prices, you may be tempted to experiment with off-brand PCs, tablets or even internet of things (IoT) devices, like smart thermostats for your workplace.However, many of these devices are sold cheaply because manufacturers cut certain corners on durability and performance. Some cheap devices may even expose you to data breaches. Additionally, issues that arise from shoddy production can become costly to deal with, especially if they result in information loss or down time.As cybersecurity expert Brian Krebs has advised on his blog, “Bear in mind that when it comes to IoT devices, cheaper usually is not better.”There is no direct correlation,” Krebs added, “between price and security, but history has shown the devices that tend to be toward the lower end of the price ranges for their class tend to have the most vulnerabilities and backdoors, with the least amount of vendor upkeep or support.”3. Adopt only mature and proven technologies.For smaller ventures, being an early adopter can be a double-edged sword. On the one hand, you may be able to leverage new technologies and turn them into your competitive advantage. On the other hand, new technologies take time to mature and offer only spotty reliability and poor user experiences. Emerging technologies also commonly fizzle out.Related: How Start-ups are Using Tech to Help SMEs save MoneyTake the case of cryptocurrencies. While they may have enjoyed massive buzz a year ago, users now struggle to find practical uses for many of the tokens in circulation. In late 2017, at the height of the crypto-hype cycle, even small businesses began to invest in these currencies and support them as payment methods. While that action might ultimately be the right move, we’re not there yet: Today, the infrastructure and climate simply aren’t ready yet.As economist Nouriel Roubini has noted, even Bitcoin, the most mainstream cryptocurrency, has serious limitations. “With Bitcoin, you can do five transactions per second; with Visa, you can do 25,000 transactions per second,” Roubini said in an interview with Cointelegraph. “It’s not scalable, it’s not secure, it’s not decentralized. So, what is it worth?”While this doesn’t mean that cryptocurrencies will never find their place in the business ecosystem, companies that were early adopters may now have to re-evaluate whether providing continued support for crypto payments will be worth the costs they’ve incurred.Smart spending countsConventional financial wisdom dictates that just because something is cheap or readily available doesn’t mean that you ought to buy it. The same is true for IT spending.Align your tech adoption with your business goals. That way, you’ll be able to identify which technologies fit your situation best, so that you can make smart purchasing decisions. A streamlined and secure infrastructure should help you get the most benefits with the least expense. You have to carefully evaluate your IT strategy and invest only in technologies that have the most potential to provide real value to your business in the immediate future.Related: Upgrading Your IT EquipmentGiven the competition that businesses face, making sure every penny creates value for your company could be the positive impact your bottom line needs. Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global Growing a business sometimes requires thinking outside the box. Register Now »