Thiruvananthapuram: PV Sindhu, who recently became the first Indian world champion, on Wednesday said all her focus now remains on clinching the top honours at next year’s Tokyo Olympic Games.Sindhu had missed out on the gold medal as she lost to Spain’s Carolina Marin in the summit clash in the 2016 Olympics. However, now the 24-year-old is committed to improve her performance at the prestigious quadrennial event and turn the silver she won in Rio into gold.”Right now, my focus is on the 2020 Olympic Games and my main aim is to work hard and give my best in Tokyo,” Sindhu told reporters on the sidelines of an event where she was facilitated by the Kerala government.”My ultimate aim is to get gold. I know it’s not going to be easy and I need to work hard,” she added.In August, Sindhu became the first Indian to bag gold at the world championships after a dominating win over Japan’s Nozomi Okuhara in the final.However, her form dipped a bit as she made early exits from the China Open and Korea Open to slip to the sixth spot in the latest rankings. Sindhu will now look to bounce back at the French Open World Tour Super 750 tournament starting in Paris on October 22. Get the best of News18 delivered to your inbox – subscribe to News18 Daybreak. Follow News18.com on Twitter, Instagram, Facebook, Telegram, TikTok and on YouTube, and stay in the know with what’s happening in the world around you – in real time. 2020 tokyo olympicsGoldgold medalPV Sindhu First Published: October 9, 2019, 3:22 PM IST
Defending champions Sunrisers Hyderabad will be desperate to win their final home match here on Monday against top-placed Mumbai Indians in order to seal their play-offs berth of the ongoing Indian Premier League (IPL).Hyderabad have 13 points from 12 matches and are fourth in the points table. One more win will likely take them through to the play-offs and due to their superb home record, they will be eager to bag two points at the Rajiv Gandhi International Stadium here.Out of the six matches at home, the David Warner-led side has won five, while winning only once in away matches. Hence, before travelling to Kanpur to face Gujarat Lions, they will like to win at home.But Hyderabad, who are coming off with two consecutive losses against Delhi Daredevils and Rising Pune Supergiant, need to raise their game against two-time champions Mumbai, who have won nine of their 11 matches so far.Hyderabad failed to defend a total of 185 against Delhi away and then were unable to chase a target of 140 against Pune at home to suffer their maiden defeat at this stadium.For Hyderabad, their middle and lower middle-order has been a cause of concern and they can’t always depend on David Warner, Shikhar Dhawan and Kane Williamson to fire. Yuvraj Singh and Moises Henriques have been inconsistent, while wicket-keeper Naman Ojha is yet to make impact with his bat. Hyderabad need to correct this with key matches coming.On the bowling front, the home side will rely on Purple Cap holder Bhuvneshwar Kumar and Afghanistan’s teenaged leg-spinner Rashid Khan to deliver the goods again. The responsibility will also be on Ashish Nehra and Siddharth Kaul.advertisementIt will not be a bad idea if captain David Warner revisits the option of including spinning all-rounder Bipul Sharma as he hasn’t looked confident in his late appearances.They will be up against a side that has all bases covered — a simple reason for their success.Mumbai on Saturday showed in their huge 146-run triumph over Delhi Daredevils that they will be ruthless in their push for the top two spots at the end of the league phase and the cushion that they offer. They posted 212/3 in 20 overs before bowling out Delhi for their lowest score of 66 in 13.2 overs.Mumbai bowlers hunt as a team and the experience and variety they possess must be a captain’s dream. While pacers Mitchell McClenaghan, Lasith Malinga and Jasprit Bumrah all have the calibre to do well at any phase of the innings, veteran off-spinner Harbhajan Singh and young leg-spinner Karn Sharma are a near-perfect pair to choke runs as well as pick wickets. Pandya brothers, Hardik and Krunal, are also there to provide more depth in both batting and bowling.Lendl Simmons, Kieran Pollard, Parthiv Patel, Rohit Sharma and this edition’s revelation Nitish Rana have been in sizzling form and it will be a tough ask for Hyderabad to trouble this batting line-up.
Coimbatore, Jun 11 (PTI) Defending champion Jagan Kumar (TVS Racing) and Rajiv Sethu (Honda Ten10 Racing) won a race each in the premier Super Sport 165cc class in the Rolon round of MRF MMSC FMSCI National Motorcycle Racing Championship at the Kari Motor Speedway here today. While Jagan and Sethu, both from Chennai impressed during their wins, Mithun Kumar of Honda Ten10 Racing registered a double in the Pro-Stock (up to 165cc) class that was run concurrently with the Super Sport Indian (165cc) races. Also scoring a double was Gusto Racing?s Amarnath Menon of Kerala, who won both races in the Super Sport Indian (300-400cc) category. After finishing eighth in the first race owing to an electrical glitch, Jagan Kumar showcased his skills to win the second race. “I had electrical issues with my bike in the first race as the engine kept switching off and on. After the race, we fixed the problem in time for the second race. I didn?t want to take chances when I went out again, but after a few laps, I picked up pace and won,” said Jagan. Sethu, winner of the first race,however,had a nightmarish time in the second. Following an engine failure prior to the start, he was forced to start from the pit lane,but managed to move to fourth, before a mistake at turn one saw him crash out.Results (Provisional): National Championship: Super Sport Indian (up to 165cc, Race 1, 6 laps): 1. Rajiv Sethu (Honda Ten10 Racing) (07mins, 53.415secs); 2. Mathana Kumar (Honda Ten10 Racing) (07:53.947); 3. Harry Sylvester (TVS Racing) (07:56.935). Race 2 (15 laps): 1. Jagan Kumar (TVS Racing) (19:08.883); 2. S Mathana Kumar (Honda Ten 10 Racing) (19:11.374); 3. KY Ahamed (TVS Racing) (19:53.750).advertisementPro-Stock (up to 165cc, Race 1, 6 laps): 1. Mithun Kumar PK (Honda Ten10 Racing) (08:17.120); 2. P M Soorya (Honda Ten10 Racing) (08:19.870); 3. R L Yashas (Rockers Racing) (08:25.485). Race 2 (15 laps): 1. Mithun Kumar (Honda Ten10 Racing) (20:07.186); 2. B. Aravind (Honda Ten10 Racing) (20:08.278); 3. Aravind Ganesh (Chennai) (20:14.774).Super Sport Indian (300-400cc, 15 laps): 1. Amarnath Menon (Gusto Racing) (18:56.817); 2. V S Kishoar (Apex Racing Academy) (18:58.897); 3. Anthony Peter (Kingdom Motorsports) (19:16.375).Stock (up to 165cc, 10 laps): 1. M Anup Kumar (RACR) (14:35.212); 2. A Amala Jerald (Honda Ten 10 Racing) (14:39.447); 3. Sri Rahil Pillarishetty (Sparks Racing) (14:41.270).One-make Champinship ? Honda CBR 250 Open (Race 1, 10 laps): 1. Rajiv Sethu (13:23.802); 2. Amit Richard Topno (Pro-lap Racing) (13:31.060); 3. B Aravind (Honda Ten 10 Racing) (13:32.938). CBR 150 (Novice, 8 laps): 1. Satyanarayana (Hyderabad) (14:34.597); 2. Amala Jerald (Chennai) (14:39.573); 3. Aditya Rao Immaneni (Bengaluru) (14:39.843).Support Race (Girls, 5 laps): 1. A Ryhana Bee (Chennai) (07:47.567); 2. N Shruthi (Chennai) (07:48.333); 3. Kalyani Potekar (Madhya Pradesh) (08:40.809).Apache RTR 200 Open (Race 1, 10 laps): 1. Yashas (14:24.644); 2. V Prabhu (Chennai) (14:28.944); 3. S Yuvraj (Chennai) (14:30.745). Race 2: 1. S Sivanesan (Chennai) (14:24.914); 2. Prabhu (14:28.005); 3. Kamran Dubash (Panchgani) (14:43.268).Apache RTR 200 Novice (Race 2, 6 laps): 1. Peddu Sri Harsha (Chennai) (09:4.222); 2. A Shankar Guru (Chennai) (09:10.164); 3. A S Alexander (Chennai) (09:12.848). PTI SS APR APR
World-record signing Neymar looks set to make his debut for Paris St Germain on Sunday after the French football federation confirmed it had received the player’s transfer certificate.The Brazilian, whose 222 million euros ($262 mln) signing from Barcelona doubled the world-record transfer fee, was prevented from playing in PSG’s first Ligue 1 match of the season against Amiens last week because his registration had gone through too late.PSG travel to En Avant Guingamp on Sunday.”One thing is clear: we want him to make his debut (on Sunday),” PSG coach Unai Emery told reporters. “He’s been good in training. He is ready. We want him to be in the squad and to start. He’s a player we need.””I think he is ready to start the game.”The French football federation (FFF) confirmed that Neymar was now licensed to play in France.”The FFF confirms it has received the transfer certificate of Neymar Jr, sent by the RFEF (Spanish football federation),” the FFF said on its Twitter feed on Friday.PSG opened the season by beating Amiens 2-0 at the Parc des Princes last Saturday. They ended last season as runners-up to Monaco after winning four successive Ligue 1 titles.
Secure Hardware With TLS securing the sender, the next step in closing the loop in providing full end-to-end security is protecting the receiving IoT end-point. For TLS to secure edge-to-cloud communications, developers need to consider the following:Secure storage of the private key in the IoT end-point, such that an attacker wishing to impersonate the device cannot retrieve it.Ensure the authenticity and validity of the public key certificate offered by a server to which the IoT end-point is attempting to connect.As noted, private keys must remain known only to the IoT end-point to ensure the overall security of the system. If compromised, an attacker may use the private key to impersonate the IoT end-point, intercept communications, or gain increased surface or information for a potential attack on the cloud infrastructure.While modern microcontrollers and architectures often implement mechanisms to protect non-volatile memory and incorporate cryptographic co-processing engines, such platforms can still be susceptible to discovery attacks using measurement of dynamic supply currents or analysis of electromagnetic emissions.For applications with the highest security requirements, developers should choose a hardware secure element – a device built on tamper-resistant hardware that implements mechanisms to:Store the private key in a manner that makes it irretrievable by all practical meansPerform the cryptographic operations necessary to sign and/or decrypt data using the private keyWhen combined with a secure, element-aware embedded IoT connectivity stack, key TLS protocol operations may be offloaded to the secure element, thereby providing the security benefits of a root of trust founded in tamper-resistant hardware (see Figure 3).Figure 3: A secure stack comprises secure firmware built on tamper-resistant hardware. (Source: UbiquiOS Technology) IoT: SmartThings Security Risks In 2016, researchers from Microsoft and the University of Michigan found multiple security issues in Samsung’s SmartThings smart home platform. They learned that hackers could use these vulnerabilities to seize control of devices such as smart locks and smoke detectors connected to the SmartThings system.The researchers performed four different attacks on the smart home platform, including a spearphishing email with other attacks that resulted in users downloading malicious apps from SmartThings’ app store. These attacks were effective because of a defect in SmartThings’ privileges for apps, which let the researchers employ a malicious app that would activate devices or steal PINs for smart locks. SmartThings announced it had collaborated with the researchers to fix the defects. However, the researchers revealed that the problem was that the SmartThings platform lets apps have access to far too many privileges, which allows a malicious app to cripple any device connected to SmartThings.Establishing the Device on the Network Due to the criticality of IoT solutions having a small footprint (e.g., lightbulb, sensor, etc.), IoT products typically have limited user interface and frequently need to be installed and commissioned by non-expert users. As a result, they must support a provisioning flow that is very simple to follow while still maintaining security of the overall system.With the device identity and root of trust embedded within a hardware secure element in the IoT end-point, the primary role of the provisioning process is to enable the device with credentials and details for access to the wireless network and/or gateway by which it will access the Internet.A common approach is to employ a smartphone or tablet application that presents a user-friendly interface to provision the device and link it with the appropriate cloud server and account. In this scenario, the IoT device may include an alternative wireless technology (that is, to the one that it uses to communicate with the cloud) providing an interoperable means to communicate with the provisioning smartphone or tablet.For example, a Wi-Fi IoT product may additionally include a low-power, low-cost technology such as Bluetooth Smart. This technology provides a secure out-of-band pipe for provisioning, with excellent compatibility and usability on a broad range of smartphone and tablet platforms.Conclusion IoT implementations are a valuable tool in many applications for improving product features and capabilities. Unfortunately, many of these implementations are done with minimal resources and designers may be tempted not to address the critical nature of security.But, in addition to the Samsung example shared in the sidebar, nearly every week, distributed denial-of-service (DDoS) or ransomware attacks such as the recent WannaCry cripple companies, compromising their ability to do business. Designing robust security into an IoT product whether a camera, thermostat or temperature sensor, is possible and should be part of every designer’s criteria. Not only will the use of industry standard practices provide a high-level of protection and ease implementation in the field, it will provide the assurance needed for large enterprise level distributors to come onboard, resulting in a dramatic uptick in market growth.Share this:TwitterFacebookLinkedInMoreRedditTumblrPinterestWhatsAppSkypePocketTelegram While traditional computing/IT systems now include robust practices and standards to best protect important enterprise devices on the network, the lack of these capabilities for Internet of Things (IoT) applications remains a primary deterrent for widespread adoption. According to a study by the Ponemon Institute, 2017 Study on Mobile and Internet of Things Application Security, 75 percent of respondents say the use of IoT apps increase security risk very significantly or significantly, with nearly the same amount very concerned about the use of insecure IoT apps. Despite the concern, less than half of respondents (44 percent) say their organization isn’t taking any steps to prevent attacks.For IoT device developers to enjoy a ready market and realize maximum growth, things need to change. Clearly, project designers need IoT applications that are as secure and robust as IT systems. In addition, with IT being an important stakeholder in the implementation of enterprise IoT solutions, adoption will increase as security improves and IoT devices better fit into the framework of these IT practices. Let’s look at what’s needed for IoT devices to securely fit into the enterprise framework.Security requirements for enterprise IoT applications IoT deployments often include the following architectural features to provide full security (see Figure 1):Use of multiple wireless protocols, including low-power sensor technologies, such as Bluetooth Smart, Thread, or Zigbee, all of which require gateways to access the public Internet or even the corporate intranetCarefully controlled access to the public Internet via a firewallIntegration with public cloud services such as Microsoft Azure IoT Hub, AWS IoT and IBM Watson IoT, using highly scalable publish/subscribe protocols like Message Queue Telemetry Transport (MQTT)Figure 1: IoT deployments include multiple protocols, controlled access to the public Internet and integration with public cloud services such as Microsoft Azure IoT Hub, AWS IoT and IBM Watson IoT. (Source: UbiquiOS Technology) While the underlying connectivity technologies such as Wi-Fi and Bluetooth provide robust security at the link layer, these safety measures do not meet the security needs of an enterprise IoT application because the benefits exist only between the communicating wireless devices (e.g., between a Wi-Fi IoT end-point and the access point to which it is connected).Enterprise IoT applications require true end-to-end security between the IoT end-point and the cloud server, preferably with a root of trust founded in secure hardware. The most important concerns, pictured in Figure 2, are typically:Authentication: Ensuring the end-point connects only to the proper server, and that the server accepts connections only from bona fide end-pointsIntegrity: Ensuring all messages exchanged between the end-point and server are received accurately, and that any intentional (e.g., malicious) or unintentional (e.g., corruption) changes of a message while in-flight can be detected by the recipientPrivacy: Ensuring no content of any message exchanged between the end-point and server is divulged to a third partyFigure 2: Enterprise IoT applications require true end-to-end security between the IoT end-point and the cloud server, with typical concerns including authentication, integrity and privacy. (Source: UbiquiOS Technology) Clearly, there’s a gap between what IoT developers create and what IT architects need.End-to-end security in the IP world To ensure the same level of end-to-end security of the enterprise at the IoT level, Transport Layer Security (TLS) protocol is the first line of defense. With its origins in the Secure Sockets Layer (SSL) protocol developed by Netscape Communications, TLS provides state-of-the-art algorithms to secure a connection between two nodes and ensure that:The identity of the communicating parties can be authenticated using public key cryptography. This authentication can be made optional but is generally required for at least one of the parties (typically the server).The connection safeguards integrity because each message transmitted includes a message integrity check using a message authentication code to prevent undetected loss or alteration of the data during transmission.The connection is private because symmetric cryptography is used to encrypt the data transmitted. The keys for this symmetric encryption are generated uniquely for each connection and are based on a shared secret negotiated at the start of the session.The latest stable version of the protocol is TLS 1.2, defined by RFC 5246, with TLS 1.3 currently in draft status.To provide the highest levels of security, TLS relies on asymmetric public key cryptography in which each communicating entity is assigned a unique and strong private key , and a mathematically related public key. As its name suggests, the private key must be kept secure with its owner and not disclosed to any third party. The public key, on the other hand, may be made generally available, as it is practically impossible to use it to determine the private key.Public key cryptosystems are structured to enable two primary operations:The public key may be used to verify that the holder of the corresponding private key signed a given message.The public key may be used to encrypt a message such that only the corresponding private key holder can decrypt it.TLS builds on these functions to directly achieve the goals of authentication and ensure message integrity. Privacy is indirectly achieved by using communication under the protection of public key encryption to establish a shared secret that may then allow a more computationally efficient symmetric encryption scheme to protect subsequent communications. Continue Reading Previous Another technological Cheshire cat?Next How long will the transition to autonomous vehicles take? Leave a Reply Cancel reply You must Register or Login to post a comment. This site uses Akismet to reduce spam. Learn how your comment data is processed.
Acclaimed filmmaker Kabir Khan who is making 83, a film on Indian cricket team’s historic victory in the 1983 World Cup has revealed that the entire team will start principal shooting of the film in May this year in England.Kabir Khan was interacting with the media when he attended music composer Pritam’s new musical platform JAM8 along with Pritam, Advait Chandan, Karan Johar and Imtiaz Ali on Thursday in Mumbai.When asked if the music is going to be important in his sports-drama 83, he said, “Music is important in every Hindi film. It will be an integral part of 83 as well.””It’s a sports film, so there will be motivational music. Pritam is composing music of the film,” said the director.”We will not lip-sync songs because I don’t think the audience will accept Kapil Dev singing on the streets of London,” he added.On June 25, 2018, Ranveer Singh shared a group picture of Indian Cricket team that won World Cup in 1983 against West Indies. He captioned, ”35 years ago…They made India proud. 35 years on…I hope we can make them proud.”35 years ago…They made India proud 35 years on…I hope we can make Them proud @kabirkhankk #83 pic.twitter.com/AGY5VlkGLjRanveer Singh (@RanveerOfficial) June 25, 2018When asked about the shooting date for 83, Kabir Khan said, “Our major schedule of four months in England will start from May this year and it will end in August. But before that, we will shoot small portions of the film in India.”advertisementA few days ago, Ranveer Singh, who is playing the character of Kapil Dev in the film, posted a picture on Twitter where he was training as a cricketer with former Indian player Balwinder Singh Sandhu and Kabir Khan.@therealkapildev @83thefilm #balwindersinghsandhu @kabirkhankk pic.twitter.com/ebn0Yjrk0sRanveer Singh (@RanveerOfficial) January 12, 2019On January 6, 2019, Ranveer Singh also wished legend Kapil Dev on his birthday with his post on Twitter.Happy Birthday, Legend! @therealkapildev @83thefilm @kabirkhankk pic.twitter.com/pxisxloMoiRanveer Singh (@RanveerOfficial) January 6, 2019Kabir Khan also said, “We have started training for the film and we are working really hard for it. I feel sleepy all day because I have to get every day at 6 in the morning for it, but I am enjoying it a lot.”Written by National award-winning director Sanjay Puran Singh Chauhan, 83 will be co-produced by Phantom Films and the founder and managing director of the Celebrity Cricket League (CCL), Vishnu Vardhan Induri.Relive the historic glory when 15 minions from India ruled over the mammoths of world cricket. Film releases on April 10, 2020. #Relive83 @RanveerOfficial @kabirkhankk @RelianceEnt @FuhSePhantom @vishinduri pic.twitter.com/QQiPJnaVnF’83 (@83thefilm) July 5, 2018Watch the world cup match of India Vs West Indies that happened in 1983:ALSO SEE: Ranveer Singh opens up on rumours of cold war with Shahid Kapoor during PadmaavatALSO READ: Are Ranveer Singh and Shahid Kapoor at loggerheads with each other?ALSO WATCH: Padmaavat is a celebration of womanhood, Deepika Padukone tells India Today
Here’s a really close-up look at the new turf inside Boone Pickens Stadium.If possible it looks even better from this angle than it does from far away. h/t Chris DealIf you’re looking for the comments section, it has moved to our forum, The Chamber. You can go there to comment and holler about these articles, specifically in these threads. You can register for a free account right here and will need one to comment.If you’re wondering why we decided to do this, we wrote about that here. Thank you and cheers!
MORGANTOWN, WV – NOVEMBER 23: Kyler Murray #1 of the Oklahoma Sooners warms up before the game against the West Virginia Mountaineers on November 23, 2018 at Mountaineer Field in Morgantown, West Virginia. (Photo by Justin K. Aller/Getty Images)If the Oklahoma Sooners are going to clinch the final spot in the College Football Playoff, they might need help from the other conference championship games. However, the most important part is avenging their early-season loss to Texas.With the Sooners and the Longhorns ready to battle for the Big-12 Championship, it’s imperative that Lincoln Riley leads his crew to victory.The chance to play for a national championship isn’t out of reach, but there are certain results that have to come into fruition. Ultimately, here are the three scenarios that the Sooners probably need to happen, with No. 1 being imperative:Oklahoma defeats Texas in the Big-12 ChampionshipAlabama defeats Georgia in the SEC ChampionshipOhio State loses or narrowly defeats Northwestern in the Big Ten ChampionshipPerhaps the most important game will be the battle between the Buckeyes and the Wildcats. Ohio State gained tons of momentum with its convincing win over Michigan last weekend, yet that would come crashing down with an upset loss to Northwestern.In addition, another loss for Georgia would most likely knock them out of contention.Obviously, the Sooners would make a tremendous statement by dismantling the Longhorns in the rematch.It should be one chaotic Saturday for college football fans.
Ajith Kumar participated in 45th Tamil Nadu State Shooting ChampionshipAs Nerkonda Paarvai is gearing up for release on August 8, Ajith has already moved on with his other activities. He recently participated in the Tamil Nadu State Shooting competition, which was held in Coimbatore.advertisement India Today Web Desk ChennaiJuly 30, 2019UPDATED: July 30, 2019 15:05 IST Ajith from his practice sessionAjith Kumar tries his hand at many things. Apart from being one of the superstars of Tamil cinema, Ajith also has other interests in his life. He was once very much into car racing and participated in international racing events.He is also into aero-modeling since childhood. The Tamil actor was recently appointed as Helicopter Test Pilot and UAV System Adviser by The Madras Institute of Technology for its team Dhaksha, which participated in an international Unarmed Aerial Vehicle launch competition.Now, the actor has participated in the 45th Tamil Nadu State Shooting Championship, which was held in Coimbatore last weekend. A few months ago, pictures of Ajith practicing rifle shooting went viral on social media. Back then it was thought that the actor was doing it as a hobby, but it looks like Ajith had taken the sport seriously.He will next be seen in Nerkonda Paarvai, which is releasing on August 8. The film, directed by H Vinoth, is a remake of Bollywood venture Pink. Ajith is playing the role of a lawyer in the courtroom drama.Shraddha Srinath, Abirami, Andrea Tairang, Adhik Ravichander and Rangaraj Pandey are playing pivotal roles in the movie.ALSO READ: #RIPActorVijay trends online. Cricketer Ashwin Ravichandran lashes out at Tamil youngstersALSO WATCH | Tamil superstar Rajinikanth may join politics with own partyGet real-time alerts and all the news on your phone with the all-new India Today app. Download from Post your comment Do You Like This Story? Awesome! Now share the story Too bad. Tell us what you didn’t like in the comments Posted byP Kirubhakar Tags :Follow Nerkonda PaarvaiFollow Ajith Next
Provincial government offices in Pictou, Colchester, Cumberland, Hants, Annapolis, Kings, Queens, Digby, Shelburne, Lunenburg and Yarmouth counties will delay opening until noon Tuesday, Feb. 17, due to the winter storm. Road conditions will be reassessed in the morning and an announcement will be made regarding re-opening for the afternoon. All other provincial government offices will open as usual. Employees are encouraged to travel safely with caution. -30-
New York: US researchers have found that electronic cigarettes, often targeted at youth and pregnant women, produce a stress response in brain stem cells. Present throughout life, stem cells become specialised cells with more specific functions, such as brain cells, blood cells, or bone. “Although originally introduced as safer, ECs, such as Vuse and JUUL, are not harmless,” said Atena Zahedi from the University of California. “Even short-term exposure can stress cells in a manner that may lead, with chronic use, to cell death or disease. Our observations are likely to pertain to any product containing nicotine,” Zahedi said. Also Read – Turkey preparations for Syria offensive ‘completed’Using cultured mouse neural stem cells, the researchers identified the mechanism underlying EC-induced stem cell toxicity as “stress-induced mitochondrial hyperfusion,” or SIMH. “SIMH is a protective, survival response,” said Prue Talbot, a professor in the University of California. “Our data show that exposure of stem cells to e-liquids, aerosols, or nicotine produces a response that leads to SIMH,” Talbot said. Electronic cigarettes, or ECs, are nicotine-delivery devices that aerosolize nicotine and flavour chemicals through heating. Also Read – Imran Khan arrives in China, to meet Prez Xi JinpingThe high levels of nicotine in ECs lead to a nicotine flooding of special receptors in the neural stem cell membrane,” Zahedi said. “Nicotine binds to these receptors, causing them to open up. Calcium and other ions begin to enter the cell. Eventually, a calcium overload follows,” she said. Zahedi explained that too much calcium in the mitochondria is harmful. The mitochondria then swell, changing their morphology and function. They can even rupture and leak molecules that lead to cell death, according to the study published in the journal iScience. “If the nicotine stress persists, SIMH collapses, the neural stem cells get damaged and could eventually die,” Zahedi said. “If that happens, no more specialised cells — astrocytes and neurons, for example — can be produced from stem cells,” she said. Damaged stem cell mitochondria could accelerate aging and lead to neurodegenerative diseases, she noted. The researchers said that youth and pregnant women need to pay especially close attention to their results. “Nicotine exposure during prenatal or adolescent development can affect the brain in multiple ways that may impair memory, learning, and cognition,” Talbot said. “Furthermore, addiction and dependence on nicotine in youth are pressing concerns. It’s worth stressing that it is nicotine that is doing damage to neural stem cells and their mitochondria,” she added.
The Supreme Court (SC) today said that former Defence Secretary Gotabaya Rajapaksa cannot be arrested in respect to four incidents.The four incidents were mentioned in a petition filed by the former Defence Secretary in the Supreme Court. Last month the Supreme Court had issued an order against arresting Rajapaksa until a petition filed by him was heard.Rajapaksa had filed a fundamental rights petition against the special police unit investigating allegations of serious financial crimes. (Colombo Gazette)
Most components of Lebanon’s cultural heritage were spared during the recent conflict, experts sent by the United Nations Educational, Scientific and Cultural Organization (UNESCO) said today after visiting the country, but urgent measures are needed to protect the World Heritage List site of Byblos from the effects of an oil spill.At a press conference at UNESCO’s headquarters in Paris following the six-day assessment visit by the experts, the mission’s leader Mounir Bouchenaki said the World Heritage List sites of Baalbek and Tyre sustained only minor damage.But Mr. Bouchenaki, who is also Director-General of the International Centre for the Study of the Preservation and Restoration of Cultural Property, said the most serious damage occurred at Byblos, which contains the ruins of an important city of the Phoenician civilization.The Israeli Defence Forces (IDF) bombed a coastal power plant at Jiyeh during its conflict with Hizbollah, causing an oil spill in the eastern Mediterranean sea that has reached Byblos.Mr. Bouchenaki said the stones at the base of two mediaeval towers and other seashore archaeological remains in the port have been affected by the oil spill. He estimated the clean-up operation will take up to 10 weeks, involve 25 people and cost about $100,000.In Tyre, while the Roman hippodrome and triumphal arch were undamaged, several frescoes in a Roman tomb on the site had come partly unstuck and needed restoration, Mr. Bouchenaki said.At Baalbek, the site was spared apart from the fall of one block of stone and suspected widening fissures on the lintels of the temples of Jupiter and Bacchus. In the nearby Old City of Baalbek, which is not part of the property inscribed on the World Heritage List, bombs damaged the souk and some old houses.The experts also visited the Old City of Saida and the nearby Temple of Echmoun – which the Lebanese Government is preparing to propose for inscription on the World Heritage List – and found them unscathed from the conflict.Stressing the importance that cultural heritage plays in demonstrating Lebanon’s diversity and tolerance, UNESCO Assistant Director-General for Culture Françoise Rivière told today’s press conference that the World Heritage Fund could set aside $70,000 in emergency spending to help the country.Aside from Mr. Bouchenaki, the experts who took part in the mission were: Alain Bouineau, Honorary Professor at the Jean Monnet University of St. Etienne, France; Giorgio Croci, Professor at La Sapienza University, Rome; Véronique Dauge, head of the Arab States unit at UNESCO’s World Heritage Centre; Joseph Kreidi, culture project officer at UNESCO’s Beirut office; and Tamara Teneishivili, cultural programme specialist at UNESCO’s Beirut office.
“At times of great uncertainty, such as during an election, it is important that homes, communities, and schools continue to be havens of safety for children and that they have uninterrupted access to basic social services,” UNICEF Executive Director Anthony Lake said in a press release.“Children are not political and should be sheltered, in all countries, from political turbulence,” he stated.Speaking at the end of a two-day visit to the southern African country, Mr. Lake wished Zimbabweans a peaceful election, saying it was everybody’s duty to ensure that children and women suffered no violence and disruption to their lives during the 16 March referendum and later general elections.The referendum will decide a new constitution which, if adopted, will pave the way for elections after June when the current presidential and parliamentary terms expire.Last month, independent UN experts urged Zimbabwean authorities to ensure that fundamental rights are respected in the run up to the referendum, following reports of civil society organizations being subjected to searches, harassment and intimidation by the police.While in Zimbabwe, Mr. Lake met with Prime Minister Morgan Tsvangirai and acting Minister of Foreign Affairs Nicholas Goche, and welcomed their assurances on the protection of children. He also visited St. Joseph’s rural health clinic and St. Vincent Primary School which have received medicines and textbooks, respectively, through a donor-supported funding mechanism managed by UNICEF.
Thanks to the “generous contributions” by top donors and despite the “difficult and dangerous” conditions inside Syria that have killed 79 aid workers since March 2011, humanitarian agencies continue to stay and deliver to millions of people in need, Stephen O’Brien, who is also the UN Under-Secretary-General for Humanitarian Affairs told the Fifth Syria Top Donor group in Kuwait City.Humanitarian agencies have delivered food aid, shelter, cash and vouchers, medical services, clean water supplies, psycho-social support and schooling to millions of people in Syria and in neighbouring countries, Mr. O’Brien said, and UN agencies were also able to “significantly scale up cross-border operations.”But he also said “as the Syria crisis enters its fifth year, humanitarian needs are greater than ever.”“One million people have been displaced by violence this year alone, many for the second or third time, and the humanitarian crisis only looks set to worsen if a political solution is not found,” said Mr. O’Brien.He also noted that “funding shortfalls in Syria can be the difference between life and death.”“Under-funding could have disastrous results on the civilian population both inside Syria and on Syrians who have crossed borders into neighbouring countries,” the top UN humanitarian official said. “Public services in Lebanon, Jordan, Iraq and Turkey, which between them are hosting millions of refugees from Syria, are straining at the seams.”Aid agencies have received just one third of the funding needed for the Syria Response Plan and the Regional Refugee and Resilience Plan. For 2015, he told the donors, the combined plans call for $7.42 billion, of which only $2.38 billion has been received, forcing aid agencies to scale back.Without new funding, Mr. O’Brien warned, the World Food Programme has already scaled back food aid by one fifth, and food vouchers by as much as half for some displaced communities, and will have to further reduce its food aid and cash assistance.UNICEF will not have the $185 million it needs to build, supply or staff new schools.“This could jeopardize the education of 1.6 million children inside Syria,” he said, and “the funding gap will continue to deny 225,000 people access to life-saving health care inside Syria.”“And unless donors come forward, the timely procurement of vital shelter supplies or clothes that Syrians will need to survive the winter months will not be possible,” he said.Mr. O’Brien also drew attention to the consequences of the Syrian conflict “that will be felt many years after the fighting comes to an end – not only across the region, but also more widely as people flee Syria in search of safety and better opportunities.”In the latest such report by UNICEF, the number of “exhausted and desperate” women and children making their way from Syria through the Former Yugoslav Republic of Macedonia seeking refuge in Europe has tripled just in the past three months.“We are witnessing this in the growing migration crisis that is playing out on the shores of Europe, with the number of migrants and asylum seekers at record highs,” Mr. O’Brien said. “This growing crisis puts all the more onus on the need to find a political solution to the Syria conflict.”
‘Address disparities’The violations are occurring against a backdrop of stigmatized rights defenders, especially those living in rural areas, which lack basic social services and have high levels of poverty and illegally-armed and criminal groups.“There is an urgent need to address disparities in the enjoyment of all rights, particularly economic, social and cultural rights and especially in rural areas”, Mr. Colville stressed.A wide range of activists have been targeted, including community leaders, Afro-Colombians, indigenous people, environmentalists, journalists and women’s rights defenders, some involved in local politics.“Community leaders are particularly vulnerable and account for more than 70 per cent of all recorded killings”, the OHCHR spokesperson explained, adding that some were targeted because they supported aspects of the historic 2016 Colombian peace agreement, including land restitution and victims’ rights.Mr. Colville went on to express concern that, with local elections in October,” the number of violent attacks may increase even further”.While acknowledging the steps taken by the State to better protect rights defenders, such as the President’s recent announcement to appoint specialized judges in the field, Mr. Colville called on the authorities “to redouble their efforts to expand and strengthen efforts to safeguard a free and secure environment for civic engagement”.“Despite some positive actions by the Office of the Attorney-General, we urge the State to make sure all killings, attacks and threats are properly investigated and the perpetrators – including those directing them, as well as those carrying them out – are brought to justice”, he asserted.UN heavily invested in lasting peaceAfter decades of civil war, in 2016, rebels from the Revolutionary Armed Forces of Colombia (FARC) signed a landmark peace deal with the Government. Joining them as part of a trilateral mechanism to verify and monitor the cessation of hostilities and surrender of weapons, with the unanimous approval of the Security Council, the UN opened a political mission there on 25 January 2016.By that October, the mission had verified the destruction of 620 kilogrammes of munitions and explosives held by the FARC.On 26 September 2017, the UN Verification Mission in Colombia was established to verify the commitments of the Government and former FARC rebels on reintegrating them back into society, and on ensuring security in territories most affected by the decades-long conflict.This past January, Special Representative Ruiz Massieu updated the Security Council on the situation in the country, noting the “important milestone” of the May 2018 inauguration of a ‘Truth Commission’ to examine past human rights violations, including sexual violence. OHCHR described the dozens of deaths since the beginning of the year as a “terrible trend” that seems to be worsening.Spokesperson Rupert Colville told reporters in Geneva that the rights office in Colombia is “closely following up on the allegations” reported by civil society, State institutions and the national human rights institution, that in the first four months of 2019 recorded a total of 51 human rights defenders and activists have been allegedly killed.“This staggering number continues a negative trend that intensified during 2018, when our staff documented the killings of 115 human rights defenders”, he said.#Colombia: We are alarmed by the strikingly high number of #HumanRights defenders being killed, harassed & threatened – 51 in last 4 months alone. We urge authorities to take all necessary measures to tackle the endemic impunity around such cases.👉 https://t.co/iB6M5VRZJQ pic.twitter.com/U78vZs9qkx— UN Human Rights (@UNHumanRights) May 10, 2019
OSU coach Urban Meyer watches his team during spring practice March 20 at the Woody Hayes Athletic Center.Credit: Mark Batke / For The LanternOffense is what Urban Meyer is known for as a football coach.His spread system has helped him win two national championships, and win 83.7 percent of the games he’s been a head coach.But after watching Ohio State’s defense get torched in its final three games — two of them losses, to Michigan State and Clemson in the Big Ten Championship Game and 2014 Discover Orange Bowl, respectively — Meyer has said he is putting more of an emphasis on that side of the ball. He said the defense had to undergo an “overhaul” after last year — and so far, he likes what he’s seen after bringing in co-defensive coordinator and safeties coach Chris Ash and defensive line coach Larry Johnson.“It’s going well,” Meyer said Tuesday on how Ash is working with fellow co-defensive coordinator and linebackers coach Luke Fickell after OSU’s sixth spring practice. “We’re completely revamping the entire back end of how we do our business, and so far it’s been pretty good.”The Buckeyes finished 112th in the country last year in defending the pass, giving up 268 yards per game. That group lost leaders like linebacker Ryan Shazier, cornerback Bradley Roby and safety Christian Bryant to graduation or the NFL Draft, but Meyer likes what he’s seen from their replacements so far in spring ball — particularly junior linebacker Joshua Perry, who is looking to fill Shazier’s shoes.“He’s really, he’s without question one of our top five most improved players,” Meyer said of Perry. “Demeanor’s always been there, work ethic’s been there and the toughness element is something that’s really improved. Love of the game and he’s a wonderful guy to coach.”Offensively, however, OSU has the task of replacing four offensive linemen as well as stud tailback Carlos Hyde, who were all big parts of OSU rushing for 4,321 yards last season.One of the replacements on the offensive line has already been set according to Meyer, who said redshirt-sophomore Pat Elflein has earned a starting spot. Elflein played admirably during the Michigan game last year, as well as the Big Ten Championship Game.As for running back, Meyer said Tuesday that between redshirt-senior Rod Smith, sophomore Ezekiel Elliott, redshirt-sophomores Warren Ball and Bri’onte Dunn, “no one’s really separated themselves yet.”Starting senior quarterback Braxton Miller hasn’t been taking snaps all spring because of a shoulder surgery Feb. 21, but he’s been taking mental repetitions with a camera on his hat and reviewing them with offensive coordinator and quarterbacks coach Tom Herman.Not getting the actual reps with Miller on the field is “frustrating,” Herman said Tuesday, while also noting that the team has to replace four starters on the offensive line.Herman isn’t worried too much about that, though.“It’d be a bigger concern if I didn’t believe the talent was there, and if I didn’t believe in (offensive line coach) Ed Warinner,” Herman said. “This group of O-linemen, whether we like to say it or not is much farther ahead than the group of our O-linemen our first spring.”Another player who has improved is sophomore running back Dontre Wilson, who Meyer said “is the starting H at Ohio State,” as he looks to fulfill that hybrid position the offense so desperately needs.“But we’d like that hybrid position is really a key guy if we can do that,” Meyer said.Herman echoed Meyer, saying the reason Wilson’s role was simple last year was because he wasn’t ready for anything more than that.“He couldn’t play receiver last year — he didn’t know what the hell he was doing,” Herman said of Wilson. “Didn’t know how to do it. He was 175 pounds or whatever the heck he was. So him and his ability limited us. And ability doesn’t just include running fast and making guys miss. There’s a lot that goes into and usability in the offense. Has had a great offseason and really took to the position and it still learning.”The Buckeyes are set to take on Navy in their first game of the season Aug. 30 at M&T Bank Stadium in Baltimore. Kickoff is set for noon.
L’Elysée chauffé aux eaux usées Un communiqué de la présidence indique qu’à partir de cet été, le palais de l’Elysée sera chauffé par le biais d’un système de récupération de chaleur grâce aux eaux usées. Dans son communiqué, la présidence annonce que le palais de l’Elysée ainsi que ses annexes seront bientôt chauffées grâce à un système de récupération de chaleur. À lire aussiRéchauffement climatique : une réduction de l’intensité carbone encore insuffisanteC’est le procédé Degrés Bleus de la Lyonnaise des Eaux qui a été mis en place. En récupérant les eaux usées en provenance des salles de bains et des cuisines par exemple, des échangeurs thermiques et des pompes à chaleur concentrent les calories pour les redistribuer. Le communiqué précise qu'”à l’heure du Grenelle 2 de l’Environnement […] les services de la présidence de la République montrent l’exemple”. Ce faisant, l’Elysée devient le “premier bâtiment d’État français à bénéficier de ce procédé utilisant une énergie locale et écologique”. Le document indique également qu’avec ce nouveau système, la consommation d’énergie fossile sera réduite de 63% et permettra de réduire de 206 tonnes les émissions de C02 par an. Le 2 avril 2011 à 09:46 • Emmanuel Perrin