Your Ultimate Investing Toolkit Sign up for MarketBeat All Access to gain access to MarketBeat's full suite of research tools: Portfolio Monitoring Top Stock Lists Premium Reports Stock Screeners Live News Feed Premium Support Free for your first month. Anixter International Inc., through its subsidiary, Anixter Inc., distributes enterprise cabling and security solutions, electrical and electronic wire and cable solutions, and utility power solutions worldwide. The company operates through Network & Security Solutions (NSS), Electrical & Electronic Solutions (EES), and Utility Power Solutions (UPS) segments. The NSS segment offers copper and fiber optic cable and connectivity, access control, video surveillance, intrusion and fire/life safety, cabinet, power, cable management, wireless, professional audio/video, voice and networking switches, and other ancillary products for the technology, finance, transportation, education, government, healthcare, and retail industries, as well as telecommunications service providers. The EES Solutions segment provides electrical and electronic wires and cables, shipboard cables, support and supply products, low-voltage and instrumentation cables, industrial communication and control products, security cables, connectors, industrial Ethernet switches, and voice and data cables to the commercial and industrial, and original equipment manufacturer markets. The UPS segment supplies electrical transmission and distribution products, power plant maintenance, repair and operations supplies, and smart-grid products, as well as arranges materials management and procurement outsourcing for the power generation and transmission, and electricity distribution industries. The company serves contractors, installers, system integrators, value-added resellers, architects, engineers, and wholesale distributors in various industries, including manufacturing, resource extraction, telecommunications, Internet service providers, finance, education, healthcare, retail, transportation, utilities, and defense, as well as government customers. The company was formerly known as Itel Corporation. Anixter International Inc. was founded in 1957 and is headquartered in Glenview, Illinois. Mohawk Industries, Inc. designs, manufactures, sources, distributes, and markets flooring products for remodeling and new constructions of residential and commercial spaces in the United States, Europe, Russia, and internationally. It operates through three segments: Global Ceramic, Flooring North America (Flooring NA), and Flooring Rest of the World (Flooring ROW). The Global Ceramic segment provides a range of ceramic tile, porcelain tile, and natural stone products; and sources, markets, and distributes other tile related products. This segment markets and distributes its products under the American Olean, Daltile, Eliane, EmilGroup, KAI, Kerama Marazzi, Marazzi, and Ragno brands. The Flooring NA segment offers floor covering product lines in a range of colors, textures, and patterns, including carpets, carpet tiles, rugs and mats, carpet pads, hardwood, laminate, medium-density fiberboards, luxury vinyl tiles (LVT), and sheet vinyl products. This segment markets and distributes its flooring products under the Aladdin Commercial, Durkan, IVC, Karastan, Mohawk, Mohawk Group, Mohawk Home, Pergo, Portico, and Quick-Step brands. The Flooring ROW segment provides wood flooring and vinyl flooring, as well as laminates, roofing elements, sheet vinyl, LVT, insulation boards, medium-density fiberboards, chipboards, and other woods products under the Feltex, Godfrey Hirst, Hycraft, IVC Commercial, IVC Home, Leoline, Moduleo, Pergo, Quick-Step, and Unilin and Xtratherm brands; and licenses its intellectual property to flooring manufacturers. Mohawk Industries, Inc. was incorporated in 1988 and is headquartered in Calhoun, Georgia. By Ritah Kemigisa: The motion seeking to remove presidential age limit returns to parliament today at 2:00pm after it was deferred by the Speaker of parliament Rebecca Kadaga last evening. This followed the successful resistance by the anti-amendment legislators, contesting the manner in which the motion was included on the order paper. The Speaker ruled that the motion returns today for Igara West MP Raphael Magyezi to seek leave of Parliament. The Motion by NRMs Raphael Magyezi seeks leave of Parliament to introduce a Private Members Bill, The Constitution (Amendment) Bill, 2017 Related Stories Chaos as MPs fight in Parliament By Moses Kyeyune Igara West MP Raphael Magyezi has been granted leave by parliament to present a private members bill for a constitution amendment on the presidential age limit. The lawmaker will now proceed to have the bill published in the gazette before it is tabled for first reading in parliament. Despite efforts by Fort Portal Municipality MP Alex Ruhunda, the Speaker insisted that submissions on the matter will come after the bill is presented. The bill which mainly targets Article 102 (b) has been widely criticized, with numerous scenes of chaos in parliament, culminating into the arrest of anti-amendment lawmakers. Opposition Members of Parliament have this evening walked out of the house, over the manner in which their colleagues were arrested earlier today. Led by the Leader of Opposition Winnie Kiiza, the MPs accuse the Speaker, Rebecca Kadaga of allegedly aiding oppression of legislators. Twenty Five MPs have been suspended over alleged breach of parliamentary rules of procedure. Water State Minister Ronald Kibuule has been suspended for entering the chamber with a gun. Meanwhile, Lwemiyaga Countys Theodore Sekikubo, Mathias Mpuuga and Ibrahim Semujju have been arrested under unclear circumstances and taken to an unknown destination. Police and other plain clothed security personnel stormed the parliament chambers pushing a number of opposition legislators out. The officers have also beaten and confiscated a number of cameras and mobile phones from journalists. Human rights activists have condemned the suspension of some legislators by the Speaker Rebecca Kadaga. The executive director of the Foundation for Human rights Initiative Dr. Livingstone Ssewanyana tells KFM that this is a sign of growing intolerance on the side of the speaker. By Benjamin Jumbe: Government says it is not responsible for the welfare of refugees. This is according to the refugees, relief and disaster preparedness minister Eng Hillary Onek who was in regard to protests by some South Sudanese refugees in Nyumanzi and Nakivale settlements. The refugees were protesting allegedly because of food rationing and poor housing conditions respectively. Speaking to KFM, Onek said governments role is to provide security while the issue of welfare is taken care of by the United Nations and other partners. The United Nations High Commission for Refugees yesterday renewed its call to the international community to increase funds to Uganda to enable the agencies meet the basic needs of the refugees. During a recent visit to Imvepi settlement camp in Arua District, the UN Secretary General, Antonio Guterres said there was need for the world leaders to contribute to the management of the refugees and not leave it to Uganda government solely. By Damali Mukhaye & Judith Atim Key players in the media industry are sounding calls to the Uganda Communications Commission (UCC) to exercise fairness as it plays its regulatory role. According to James Kigozi the Executive Director of the Uganda Media Development Foundation, UCC must revisit its mode of operation in order to ensure that it is serving public interest and not the interest of an individual. Meanwhile Patrick Tumwine, the Advocacy, Research & Information Officer at the Human Rights Network notes that what UCC has done is against the right of access to information by the public and media freedom. The comments follow yesterdays directive by UCC barring radios and Television stations from relaying live feeds. UCC says live broadcasts are in breach of the minimum broadcasting standards as laid down in Section 31 of the Uganda Communications Act 2013, arguing that they are inciting the public, and promoting a culture of violence which may lead to insecurity. The directive comes at a critical time as the country and parliament in particular battles the controversial proposal to lift the presidential age limit. However, the government spokesperson Ofwono Opondo has defended the move, advising rights activists condemning it to go and hang. Meanwhile, broadcasters have this evening written a protest note to the Uganda Communications Commission for the latters ban on relaying events live. Kin Karisa, the chairman of broadcasters under their umbrella National Association of Broadcasting says the ban will be challenged in court. Chilean regulator Subtel has begun a public consultation over whether MVNOs should receive lower wholesale rates from network operators to allow them to compete more effectively. Subsecretaria de Telecomunicaciones de Chile noted that allowing new brands to gain market share would open up a wider range of services in the market as well as driving down tariffs for consumers. Currently three operators America Movils Claro, Telefonicas Movistar, and former state operator Entel account for 92% of the Chilean non-M2M market, with 26.2 million connections between them at the end of Q2 2017. Most of the remaining 8% of connections belong to WOM, which is the fourth main MNO. However, there are several MVNOs operating in the market, including Grupo GTD, Simply Moviles and Virgin Mobile. Executives from the latter two MVNOs both of which use Movistars network publicly complained earlier this year that promotions and tariff reductions that MNOs were able to offer were adversely affecting MVNOs. Their argument was that while MNOs were able to reduce operator fees, they did not provide MVNOs with a corresponding drop in wholesale charges, meaning that MVNOs were unable to match the tariff cuts and therefore could not compete effectively. WhatsApps entire suite of services, including its widely used text messages, has been blocked by the Chinese government. The countrys authorities have previously imposed restrictions on access to its voice and video chat services, and in July prevented users from sending images via WhatsApp. The messaging app is owned by Facebook, which together with its Instagram app has been banned in China since 2009. Nadim Kobeissi, an applied cryptographer at Symbolic Software, suggests this wider ban on all of WhatsApps services indicates that the Chinese censors have created bespoke software that specifically targets the encryption technology used by WhatsApp, as very few other messaging apps use the same encryption. This is not the typical technical method in which the Chinese government censors something, Kobeissi was quoted as saying. Symbolic Software monitors Chinas digital censorship programme, and the countrys government is tightening up this regimen ahead of mid-Octobers Communist Party congress. The last congress, held in 2012, saw current President Xi Jinping ascend to power. In January, China outlawed all VPNs that did not have the approval of state regulators. In July, local VPN providers were targeted by Chinas government for closure, while new regulations allowed for the shutdown of any services enabling access to foreign sites from behind Chinas Great Firewall. Overseas firms have largely agreed to the restrictions, with Apple pulling several VPN applications from the Chinese App Store. Recently, three Chinese firms Baidu, Tencent and Weibo - also received fines from the Cyberspace Administration of China for the perceived inadequacy of content censorship on their platforms. Googles latest WebVR update enables users to browse the internet using a Google Daydream headset. WebVR automatically switches between 2D and 3D modes depending upon a websites support for VR. Google Chrome browser has added WebVR support for browsing the internet using Googles Daydream VR headset. An open-source Chromium evangelist, Francois Beaufort announced the news via a Google+ post and said that the first set of features are available to try with the Chrome 61 update. The post also said that the current feature allows users to view and interact with websites in VR and follow links between pages. The VR experience automatically switches between 2D and fully immersive 3D, depending upon a websites compatibility with WebVR. In order to make use of WebVR features, users need to browse any website in Google Chrome and insert their phones into a Daydream View VR headset. Beaufort also promised that the new WebVR features are just the beginning and soon more VR capabilities will make their way to the Chrome browser. The browser was recently seen testing a new feature that lets users permanently block audio for specific websites. The mute feature is an implementation that keeps a website muted even after users close a webpage and reopen it. Google is expected to launch the Pixel 2 and Pixel 2 XL smartphones at an event on October 4 . A recent report suggests that the company may also launch a new Chromebook laptop and Google Home Mini smart speaker at the event. Googles smartphones, Pixel 2 and Pixel 2 XL, will be powered by a Qualcomm Snapdragon 835 processor. They are expected to feature squeeze actions similar to the HTC U11. The Pixel 2 XL is expected to feature a 6-inch OLED display by LG and offer improved front-facing speakers. Both the upcoming smartphones are expected to run on Android 8.0 Oreo which Google recently started rolling out. The devices will also be compatible with Googles DayDream VR headset. Nokia 6 was launched in August 2017 & runs on Android 8 OS. The Smartphone is available in more than three color options i.e.Arte Black, Matte Black, Tempered Blue, Silver, Copper & has a built in fingerprint sensor as the primary security feature, along with the host of connectivity options in terms of 3G, 4G, GPS, Wifi, NFC Bluetooth capabilities. Priced at Rs. 13499 the phone is available with 32 GB of internal storage. The Smartphone is powered by 1.4 GHz If Finnish startup, HMD Global, was to do well with the Nokia brand, the company needed a flagship. Pure, secure and always up to date is a promise worth banking on, but as the market is today, its not enough. Hence, the Nokia 8. Its perhaps the only phone from HMD that has so far lived up to Nokias brand promise. I have only used it for a precious few minutes right now, but the phone feels like a functional flagship that very actively avoids pushing the boundaries of what a smartphone can be. Ive seen few phones from HMD now and as with those, the Nokia 8 feels positively sturdy. It doesnt feel as reassuring as the Nokia 6 (review), which is perhaps a flaw given that this is a flagship, but then neither do those glass-covered Galaxys and iPhones. The Nokia 8 also beats them in ergonomics. Its not perfectly suited to single handed usage, but it wont fail you when you really need it. But while its a well built phone, you have to question HMDs design choice. The Nokia 8 is compact and ergonomic, but for a flagship it lacks the premium feel or forward looking design, just as the OnePlus 5, which interestingly is its chief competitor now. My thoughts on the Nokia 8s look and feel are the same as I felt with the OnePlus 5 at first. Im not impressed, but I dont dislike it either. Is it fast? It would be criminal to proclaim the Nokia 8 a fast phone without actually testing it, but from what I saw, it certainly feels smoother and snappier than the Nokia 3, 5 and 6. Thats no surprise, given that the company chose to spend the cash needed to fit Qualcomms flagship class chipset on this phone. We were shooting outdoors with the Nokia 8, on a hot summers day, so I did find some heating on the device, but thats nothing to be worried about. Does it feel like a flagship? Truthfully, no it doesnt. But the Nokia 8 isnt your uber premium flagship anyway. Its a mid-ranged flagship, same as the OnePlus 5, and if you forgave that device for lacking the bells and whistles, you would do the same for this. Incidentally, I did not forgive OnePlus, so it remains an issue for me on the Nokia 8. Would slimmer bezels have been that difficult? After all, Sony sells near bezel-less form factors on cheaper phones like the Xperia XA1. What is Bothie? 'Bothie' is the first time weve seen Nokia try a gimmick this year. Its a software feature within the camera app that turns on both front and rear cameras. In doing so, it lets you shoot or record with the two of them simultaneously. Its not a feature you will buy this phone for, but its one that you may get addicted to once you have bought the Nokia 8. I would say Bothie is useful for creators/YouTubers, but the Nokia 8 lacks a wide angle camera, on the front or back. So, even if you do want to create with this, you will be stuck with rather narrow frames. Moreover, splitting the viewfinder into two seems rather cumbersome when youre trying to concentrate on the shot you need to take. My camera person, who shot the video below, thinks its more suited to vloggers than professionals. Speaking of cameras, are they good? The Nokia 8s camera is reasonably fast and shows no processing lag. While thats certainly good, Im not completely satisfied that this is indeed a flagship-class camera. I only had time for a few shots, almost all of which were taken in daylight and I saw some loss in detail on the phones own display. The monochrome and RGB combination should produce good colours, but Im not sure this is a competitive camera by todays standards. Well find out soon enough, I guess. Ozo recording The Nokia 8 also features Ozo audio recording. Thats the spatial recording technology in the real Nokias Ozo VR camera. It gives the handset the capability to identify where the sound is coming from and reproduce it in a similar manner when youre watching the recorded video. HMD had two pre-shot videos for this, which the company claims are shot on the Nokia 8. To listen to the audio in these, I used a Sennheiser HD205 headset, a Jlabs Epic 2 bluetooth headset and one of Sonys MDR series headsets. While neither of these are low-end headphones, it was easy enough to understand the difference in soundstage. The HD205 felt the most real, reproducing sound the way things were seen on the video. So, a woman recording the video seemed to be standing in front of me, while the dog barking behind her at a distance, felt farther away and to her left. On the Jlabs Epic 2 BT, the sounds seemed closer to each other, while the Sony MDR headset brought them closer still. There are two key takeaways here. The first is that audio still felt more real than it usually does on videos recorded by smartphones. The second, perhaps more important, is that the impact of Ozo recording becomes less apparent with the quality of headphones. Is it better than the OnePlus 5? Based on my first impressions, the Nokia 8 doesnt seem to outperform the OnePlus 5, but it matches it in many aspects. Sure, it doesnt have gobs of RAM, but did you really need 8 gigabytes of that in the first place? The decider between these two phones will be the camera, which may need some work on HMDs part. Theres a live bokeh mode here that looks more like Snapseeds lens blur feature, which gives the OnePlus 5 an edge. However, if my first impressions of the general image quality on the Nokia 8 turns out to be false, OnePlus may still have something to worry about. Should you buy the Nokia 8? The Nokia 8 is a phone meant for the masses, but not one that wows you out of the box. It doesnt have a curved or bezel-less screen. In fact, it doesnt have a single feature that you wouldnt expect from a phone in this price range. It doesnt dazzle, but it should suffice. That, combined with Nokias brand value, is what HMD would be banking on. But should you be buying this phone? I would implore you to wait for our review to find out! West African focused oil and gas exploration and development firm Canadian Overseas Petroleum (COPL) announced that it had made "encouraging progress" towards securing a funding deal for its OPL 226 offshore development project on the southwestern coast of Nigeria in the Gulf of Guinea. COPL said it was still confident that an appraisal well would be drilled at the NOA-1 oil prospect in either late 2017 or early 2018 as previously announced. Arthur Millholland, president and chief executive of COPL, said "At present, we remain focused on developing our highly attractive oil appraisal and development project in OPL 226, offshore Nigeria. The initial work program will be to drill an appraisal well at the NOA-1 oil discovery and bring it into production through an Early Production Scheme. The drilling of up to three additional similar wells on the NOA Structure would follow on from this." In terms of the funding, he added, "COFARCO SAS of Paris, France, and Zeus Capital of London, the two Investment Banks we are engaged with, specialize in project financing of African energy ventures and we have great confidence that they will secure the necessary funding." The company also noted that it had planned to approach Liberian authorities in regards to a contract extension on its Block LB-13 exploration area, which it shares with ExxonMobil, after the previous agreement expired on 25 September. "We look forward to updating shareholders with the next steps that we take with regards to evaluating other leads mapped out on block LB-13 and other opportunities we see along the Liberian continental margin," Millholland said. As of 0850 BST, shares had dipped 14.33% to 1.43p. Oracle Power , the UK-based developer of a combined lignite coal mine and mine mouth power plant located in the Thar desert in the south-eastern Sindh Province of Pakistan, announced on Wednesday that it has agreed in principle a memorandum of understanding with two Chinese state-owned enterprises for the full development and funding of its flagship Thar project. The AIM-traded firm said the MoU set out that the Chinese parties would take a significant majority equity holding, would arrange debt finance and would provide engineering, procurement and construction (EPC) contractors for the coal mine and power plant. It said the MoU terms were being finalised, and it anticipated that the memorandum would be formally signed during October. The MoU, once executed, would supersede previous memoranda and shareholder framework agreements relating to the development of the mine and power projects that had been announced by the company, its board confirmed A further announcement, with details of the terms of the MoU, would be released once the memorandum was finalised. This is a positive step-forward in taking our project through to financial close, said Oracles CEO Shahrukh Khan. I thank our Chinese partners for the confidence they have shown in the project and in Pakistan and I look forward to working with them. Advanced composite material kit supplier Velocity Composites outlined what its board called the strengthening of its senior management team through a number of appointments on Wednesday. The AIM-traded firm said Matthew Archer would be chief commercial officer, responsible for driving forward the company's new business opportunities and in-country strategies in new territories, in particular Europe-Middle East-Africa. It said Archer had 15 years of experience in the aerospace industry - most recently as head of commodity management for composites at GKN Aerospace. Chris Skinner would be moving into a new role as head of corporate development for EMEA, from his previous position delivering business growth and infrastructure in the south of England. Skinner would be responsible for the company's corporate entry into new territories, the board confirmed. Previously, he was director of asset management operations at Deutsche Bank, with a 17-year military career. Jon Haden-Brown was being appointed information systems manager, and would be responsible for Velocity's intellectual property - in particular the integration of Velocity's production system and developing real-time information systems. Haden-Brown reportedly had 20 years of industry experience. Finally, Frederic Hinnekens was set to join the company as head of European programmes in December. In that role, he would be responsible for customer engagement and supporting the CCO project managing new business responses in EMEA. Hinnekens was most recently regional sales manager of aerospace materials at Solvay Composites. Velocity Composites currently employed 117 staff across its two UK facilities - one in Burnley, Lancashire, where it is also headquartered, and one in Fareham, Hampshire. We are delighted to announce the new additions to our senior management team, supporting the company as we enter our next stage of growth, with a specific focus on EMEA, said CEO Jon Bridges. Matt, Chris, Jon and Frederic all have excellent track records, a complementary skill set and strong sector expertise. We are confident that these additions ensure we have the right team to execute our growth strategy, meet the demands of new and existing customers and support the company in its journey as we grow from a UK focussed business into a multi-national business. An interim tariff of 220% has been imposed on the import of Bombardier 's C-Series jets to the US after its competitor Boeing lodged a complaint that alleged the Canadian firm was receiving unfair state subsidies from the UK and Canada in order to win a major contract. As a result of the US Department of Commerce's decision to institute the hefty tariff, one which tripled the cost of a C-Series aircraft in the US, the jobs of thousands of Bombardier employees in the UK could be at risk. Bombardier called the ruling "absurd," saying that Boeing was attempting to use US trade laws as part of an effort to "stifle competition," because it had made a "superior aircraft" that was more efficient and comfortable than its own offerings. Both Downing Street and several trade unions feared that the decision could lead to the cessation of Bombardier's Northern Ireland operations, where it employs 4,100 people across four locations. PLANES "Boeing's position, in this case, is unjustified and frankly not what we would expect of a long-term partner to the UK - as well as damaging the wider global aerospace industry," a spokesperson from the Department of Business, Energy and Industrial Strategy said. The ruling was also said to potentially jeopardise a 4.15bn deal between Bombardier and US airline Delta that would see the former supply the latter with 125 new jets. The firm said the decision was "divorced from the reality about the financing of multibillion-dollar aircraft programmes." Prime Minister Theresa May said, "I am bitterly disappointed by the initial Bombardier ruling. The government will continue to work with the company to protect vital jobs for Northern Ireland." The Department of Commerce was set to make a second ruling on the tariff in Washington on 5 October, and the US International Trade Commission announced it would be convening in February 2018 to rule on whether it would uphold or remove the penalty. TRAINS Reports began to circulate on Tuesday that French firm Alstom and the Europe's largest manufacturing company Siemens were finalising plans to merge, creating what Siemens president Jo Kaeser called "a new European champion in the rail industry." According to Reuters, Siemens, which manufactures the inter-city ICE trains that run on German long-distance routes, had previously been in discussions to tie-up with Bombardier in a multibillion-dollar rail merger. In a joint statement, both Alstom and Siemens said their businesses were "largely complementary" and the merger would see customers benefit from a "larger geographic footprint." The announcement came just days after Angela Merkel and French President Emmanuel Macron's plans to move towards a closer integration between the two nations was dealt a blow after the Chancellor's less than favourable showing at Sunday's election left her somewhat isolated. Bombardier's euro-denominated bonds, set to mature in 2021, had dropped seven points as of 1000 BST, more than at any other time in the preceding two years, to 99.963 according to Bloomberg. As of 1005 BST, shares in Bombardier were on the up, moving 6.07% to CAD 2.27 each. European competition regulators have hit Volkswagen 's truck manufacturing brand Scania with an 880m fine for price fixing in a cartel with supposed rivals, which the company has said it will appeal. The European Commission said Scania broke EU antitrust rules as it had colluded for 14 years with five other truck manufacturers on truck pricing and on passing on the costs of new technologies to meet stricter emission rules. Scania decided last year not to settle the case last year, when the other five, MAN, DAF, Daimler, Iveco and Volvo/Renault, reached a settlement with the EC. "This cartel affected very substantial numbers of road hauliers in Europe, since Scania and the other truck manufacturers in the cartel produce more than 9 out of every 10 medium and heavy trucks sold in Europe," said competition Commissioner Margrethe Vestager, who added that the cartel was unusually long lasting. "These trucks account for around three quarters of inland transport of goods in Europe and play a vital role in the European economy. Instead of colluding on pricing, the truck manufacturers should have been competing against each other - also on environmental improvements." Scania said that after reviewing the EC's decision it will launch an appeal as it "strongly contests all the findings and allegations made by the European Commission, and will appeal against the decision in its entirety". "Scania also emphasises that it has co-operated fully with the European Commission by providing it with requested information and explanations throughout the entire investigation period." The Commission's investigation found that Scania had coordinated prices at the factory price, or 'gross list', level for medium and heavy trucks in the European Economic Area, as well as engaging in cartel behaviour over the timing for the introduction of emission technologies for medium and heavy trucks to comply with the increasingly strict European emissions standards and the passing on to customers of the costs for the emissions technologies required to comply with these emissions standards. US pending home sales fell more than expected in August, according to figures from the National Association of Realtors. The NAR's monthly index declined 2.6% to 106.3 from 109.1 in July, marking its lowest reading since January 2016 and missing expectations for a much smaller drop of 0.5%. The NAR's chief economist, Lawrence Yun, said: "August was another month of declining contract activity because of the one-two punch of limited listings and home prices rising far above incomes. "Demand continues to overwhelm supply in most of the country, and as a result, many would-be buyers from earlier in the year are still in the market for a home, while others have perhaps decided to temporarily postpone their search." The pending home sales index in the Northeast was down 4.4% to 93.4 in August and is now 4.1% below the year before. In the Midwest, the index was 1.5% lower at 101.8 and is now 3.2% below August 2016. Pending home sales in the South fell 3.5% to 118.8 last month and are now 1.7% below last August, while the index in the West was 1% lower at 101.3 and is now 2.4% below a year ago. The NAR said that slower activity in the areas hit by Hurricanes Irma and Harvey is likely to push existing sales for the year below the pace set in 2016. Yun now expects existing home sales to close out the year at around 5.44 million, down 0.2% on the year. "The supply and affordability headwinds would have likely held sales growth just a tad above last year, but coupled with the temporary effects from Hurricanes Harvey and Irma, sales in 2017 now appear will fall slightly below last year," he said. "The good news is that nearly all of the missed closings for the remainder of the year will likely show up in 2018, with existing sales forecast to rise 6.9%. Pantheon Macroeconomics said: "The mortgage applications numbers pointed to a clear increase in pending home sales, so the drop presumably is due to the impact of Hurricane Harvey. We expect a further decline in September as a result of Irma. The August index is a 19-month low, consistent with September existing home sales falling to just under 5.3m, from 5.35m in August. We would not be surprised by a lower number, because people evacuated from Florida will not have been able to attend closings, the point at which existing home sales are measured. Looking ahead to October and beyond, though, we expect to see a clear rebound in sales of both new and existing homes." Safety, health and environmental technology group Halma said it made good progress in line with board expectations in its scheduled trading update for the period from 2 April on Wednesday. The FTSE 250 company said its improved rates of organic constant currency revenue and profit growth achieved in the second half of the last financial year continued into the current year, adding that order intake was ahead of revenue and also ahead of the same period last year. Its board said there was widespread growth geographically, with organic constant currency revenue increases in all major regions. Asia-Pacific maintained strong growth, the board said, with good progress in the UK and mainland Europe and a steady performance in the US. The Environmental & Analysis sector performed particularly well, benefitting from strong growth in Asia-Pacific and the re-organisation in its life science and research business during the first half of last year, Halmas board explained in its statement. The improved performance achieved by the process safety sector in the second half of last year continued. Market diversification and rising demand from the US onshore energy market both contributed to significant growth over the prior year. Halma said its infrastructure safety sector continued to achieve good growth as greater investment in new product development in recent years contributed towards increasing demand from Asia-Pacific and mainland Europe. Its medical sector also achieved solid revenue growth, although the board said profitability was lower due to increased investment in new product development and sales resources. In August 2017, we announced the acquisitions of Cardios for an initial consideration of R$50m (12.1m) and CASMED for $4.5m (3.4m). Both businesses strengthen our medical sector's blood pressure monitoring technology base, with Cardios also being Halma's first acquisition in Brazil. The integration of both businesses is progressing well. Halma said its mergers and acquisitions pipeline strengthened during the period. The board said it was continuing to search for businesses in, or adjacent to, all four sectors, with the additional sector resources added during 2016 improving both the quantity and quality of Halmas opportunities. Cash generation was good and the group's financial position remains strong. The results for the half year ending 30 September will be released on 21 November. Germany's Siemens and France's Alstom announced on Wednesday that they will merge their rail operations to create "a new European champion in the rail industry". Under the terms of the deal, which has been approved by the board of both companies, Siemens will receive 50% of Alstom's share capital on a fully diluted basis. The new combined group, Siemens Alstom, will be listed in France with its headquarters in Paris and it will be led by Alstom chief executive Henri Poupart-Lafarge. The companies said their two businesses are largely complementary in terms of activities and geographies. Joe Kaeser, president and CEO of Siemens, said: "The global market-place has changed significantly over the last few years. A dominant player in Asia has changed global market dynamics and digitalisation will impact the future of mobility. Together, we can offer more choices and will be driving this transformation for our customers, employees and shareholders in a responsible and sustainable way." Meanwhile, Pourpart-Lafarge said: "Today is a key moment in Alstoms history, confirming its position as the platform for the rail sector consolidation. Mobility is at the heart of todays world challenges. Future modes of transportation are bound to be clean and competitive. Thanks to its global reach across all continents, its scale, its technological know-how and its unique positioning on digital transportation, the combination of Alstom and Siemens Mobility will bring to its customers and ultimately to all citizens smarter and more efficient systems to meet mobility challenges of cities and countries. "By combining Siemens Mobilitys experienced teams, complementary geographies and innovative expertise with ours, the new entity will create value for customers, employees and shareholders." Based on information from the last annual financial statements of both companies, the new entity will benefit from an order backlog of 61.2bn, revenue of 15.3bn and adjusted earnings before interest and taxes of 1.2bn. At 1110 BST, Siemens shares were up 1.7% to 118.55 and Alstom was 5.1% higher at 35.34. Maruti Suzuki Alto 800 & Alto K10 The brand Alto is one of the best-selling vehicles in India after the humble Maruti 800 for the carmaker. To make it more interesting, Maruti is offering discounts on the Alto 800 as well as the Alto K10. The Maruti Alto 800 is available with a cash discount of up to Rs 20,000. Additionally, you can avail exchange bonus ranging from Rs 15,000 to Rs 20,000 on the hatchback as well. Similarly, the Maruti Alto K10 comes with an exchange bonus similar to the Alto 800 with cash discounts up to Rs 10,000. The AMT model of the Alto receives cash discounts up to Rs 15,000 and exchange bonus of up to Rs 20,000. Recommended Video Tata Nexon Price And Features Variant-wise - DriveSpark Maruti Suzuki Wagon R After the Maruti 800 and the Alto, the WagonR is the largest-selling vehicle for the company, with sales of 2 million since it was introduced in India. Maruti is offering cash discounts for this Diwali on the WagonR similar to the Alto. The cash discount ranges from Rs 20,000 to Rs 30,000. Exchange bonus on the Maruti WagonR AMT and the manual variant are in the range of Rs 20,000 to Rs 25,000. Maruti Suzuki Celerio This Diwali, you can avail discounts on the Maruti Celerio hatchback with cash discounts ranging up to Rs 30,000. Exchange bonus on the Maruti Celerio can be availed up to Rs 15,000. The Maruti Celerio AMT variant gets cash discounts up to Rs 22,000 as well as exchange bonus of the same amount. Maruti Suzuki Swift & Swift Dzire Maruti Swift hatchback is among the best hatchbacks in India and continues to be on the top-selling cars in India from the time of its launch. Maruti Suzuki is offering cash discount this Diwali for the Swift of up to Rs 20,000 and a gold coin along with exchange bonus of up to Rs 15,000. The Maruti Swift diesel model gets cash discounts ranging from Rs 20,000 to Rs 22,000 with exchange bonus of up to Rs 15,000. The Maruti Swift Dzire was the best-selling car in India in August 2017 and is one of the most popular compact sedans in India. Maruti Suzuki is offering discounts on the Dzire Tour with cash discounts of up to Rs 20,000. Maruti Suzuki Ertiga The second best-selling MPV in India after Toyota Innova is the Maruti Ertiga. The MPV is available in petrol, diesel and CNG variants. Buyers of Maruti Ertiga can avail cash discounts of Rs 5,000 on the petrol model. You can even take advantage of the exchange bonus of Rs 20,000 on the Ertiga petrol model. The diesel variant of the Maruti Ertiga is available with a cash discount of up to Rs 30,000 and exchange bonus of up to Rs 20,000. Maruti Suzuki Ciaz Maruti Suzuki sold the Ciaz in its regular dealerships; however, in March 2017, the company started selling the sedan through its premium outlet NEXA. The Ciaz has been performing well through the NEXA outlets and is the only model to receive a discount this festive season. There is no cash discount; however, can avail exchange bonus of up to Rs 30,000 of the petrol model, while the diesel Ciaz is available with cash discounts of Rs 40,000 and exchange bonus of up to Rs 50,000. DriveSpark Thinks! This Diwali brings with it a host of discount offers on Maruti cars in India. With a vast network and excellent after sales and service, Maruti Suzuki offers you a lot more in the form discounts to make this festive season special. The first stop will be at Phuntsholing, and then towards valley town of Paro finally reaching Thimphu, the capital of the kingdom of Bhutan. Those interested can register for the Royal Enfield Tour of Bhutan here. Bhutan is known for its picturesque mountain and monasteries is among the bucket list destination for motorcycle enthusiasts from across the world. The country bridges the gateway to the Himalayan Rhapsody' and also rightfully features as a top riding destination embedded with an average of 10 curves per km of road. Recommended Video Triumph Street Scrambler Launched In India - DriveSpark The riders can submerge themselves in a thumping symphony of riding their Enfield motorcycles along deep valleys, rice paddies, orchards and specks of tiny villages along the roadside. With an average elevation of 4500m, the Tour of Bhutan assures an unforgettable adventure riding experience of a lifetime says, Royal Enfield. The route has been scheduled specifically to challenge the riders with the winding mountain roads; the snow-capped mountain peaks in the eastern Himalayan ranges; water crossings and slush, gravel tracks, cross narrow suspension bridges as well as straight stretches. Ride Schedule Date From To KM 13th October Siliguri- Scrutiny (Motorcycle & Riding Gear) 14th October Siliguri - First-aid Training 15th October Siliguri Phuntsholing 180 16th October Phuntsholing Paro 180 17th October Paro Thimphu 50 18th October Thimphu Rest Day 19th October Thimphu Punakha 85 20th October Punakha Gelephu 200 21th October Gelephu Bumthang 310 22th October Bumthang Mongar 184 23th October Mongar Tashi Gang 90 24th October Tashi Gang Samdrup Jongkhar 180 25th October Samdrup Jongkhar Guwahati 110 DriveSpark Thinks! The Tour of Bhutan by Royal Enfield sure does promise to take you through the beautiful landscapes of the land of Thunder Dragon. So if you are looking to explore Bhutan riding your Royal Enfield, this tour could be the one. Consultancy firm Arcadis announced it has been selected as Engineer of Record for a flood protection multiphase design of Manhattans Lower East Side coastline in New York City. The new flood defence scheme spans 3.5 miles and is the first element of coastal storm and sea level rise defense system for Manhattan. Arcadis is part of a team supporting New York City to protect the Lower East Side against severe weather events and sea level rise. One of the proposals of the Rebuid by Design challenge suggested an elevated green belt along the south side of Manhattan. Rebuild by design The flood protection plan responds to the impact of superstorm Sandy in 2012 when streets, tunnels and subway systems were flooded and New York Stock Exchange closed for two days. In the aftermath, the US government organised a challenge for designers to come up with innovative solutions to make New York more resilient. The challenge was led by Dutch special water envoy Henk Ovink. One of the winning teams of this Rebuild by Design challenge was Big U, lead by Danish architect Bjarke Ingels, that suggested the construction of a sloped park-liked barrier that's built into the landscape of Manhattans coastline. The US government awarded the proposal 335 million US dollar to prepare Manhattan for the next superstorm. Enforced boulevard of The Hague that combines an underground levee with an eye-catching designed seaside resort. Wealth of expertise According to Arcadis City Executive Peter Glus, New York City has proven to be vulnerable to the effects of sea level rise. Our team brings a wealth of expertise in climate change adaptability and resilience from our Dutch heritage and from our experienced engineers who designed flood protection systems across the Louisiana coast following Hurricane Katrina, said Glus. The projects conceptual design was amongst others inspired by the construction of a reinforced boulevard in The Hague, the Netherlands. The new boulevard combines the construction of a new underground levee with an eye-catching designed seaside resort. 'Replumb your cities.' 'Regard storm water as an asset not as a nuisance', advised John Batten, Global Cities Director of Arcadis at the introduction of the Amsterdam International Water Week that is to take place early November. Community enjoyment In collaboration with the New York City and local communities, Arcadis will design flood protection solutions that merge into the urban fabric for 200,000 residents and 21,000 businesses. These solutions will strengthen coastal defenses and improve community enjoyment of existing parks while offering future flood protection and environmental benefits. Arcadis will also develop supporting documentation necessary for changes to FEMA flood hazard maps. Design features will incorporate a combination of architectural floodwalls, bridging berms, embankments, moveable floodgates, and interior drainage improvements, all integrated with East River Park amenities to include recreational facilities, pedestrian and bicycle pathways. High-profile water management plans Arcadis has undertaken many high-profile water management and resiliency planning projects throughout the US, including Hurricane Harvey response in Houston to support damaged or at-risk commercial, industrial and public sector facilities, the assessment of San Francisco's Mission Creek, and reducing risks to communities in Norfolk, Virginia, against severe weather events via an enhanced flood protection system. This news item was originally published on the website of Arcadis US. Read also on this website Flavour of Dutch dialogues gets into 1 billion dollar US disaster resilience plans, 27 January 2016 Arcadis to study feasibility multi-purpose levee for protection Lower Manhattan, New York, 4 October 2013 Official opening boulevard Scheveningen adds new icon to modern coastal landscaping, 9 April 2013 More information Arcadis Amsterdam, the Netherlands +31 20 2011 011 www.arcadis.com A new analysis of state and federal data shows 2.9 million children enrolled in schools and daycares across the country are threatened by oil and gas air pollution. Released by the national environmental group Earthworks, this new analysis is part of a larger update to The Oil & Gas Threat Map, a map-based suite of tools designed to inform and mobilize Americans about the health risks from the oil and gas industrys toxic air pollution. The Obama-era U.S. Environmental Protection Agency (EPA) and Interior Department issued rules to limit this type of oil and gas pollution. The Trump administration is now trying to block and revoke these rules before they go into effect. My two sons are among the millions of children who go to school near oil and gas operations that threatens their health and safety, said Patrice Tomcik, National Oil and Gas program coordinator with Moms Clean Air Force, from Southwest Pennsylvania. She continued, Children are especially vulnerable to these threats, including cancer, respiratory illness, fetal defects, blood disorders and neurological problems. With so many children living, playing and learning in close proximity to oil and gas production, it is unconscionable that our federal government wants to stall and revoke safeguards that protect our children from this industrial pollution. Moms want to see these vital safeguards implemented, not ignored. The Oil & Gas Threat Map maps the nations 1.3 million active oil and gas wells, compressors and processors. Using peer-reviewed research into the health impacts attributed to oil and gas air pollution, the map conservatively draws a 1/2 mile health threat radius around each facility. Within that total area are: 2,944,785 students attending 9,102 schools, colleges and day care facilities; 12.5 million people living in their homes including 3,035,508 children under 18 1,756,398 senior citizens 65 and over; 2,292 medical facilities; and all encompassed by the 187,413 square milesan area larger than Californiathat lay within 1/2 mile of 1,292,669 oil and gas production facilities. The searchable map also allows users to: Look up any street address to see if it lies within the health threat radius; View infrared videos which makes visible the normally invisible pollution at hundreds of the mapped facilities; and View interviews with people impacted by this pollution. The Trump administration has at least 2.9 million reasons to support stronger safeguards against toxic oil and gas air pollution, said Earthworks Policy Director Lauren Pagel. She continued, Instead, EPA Administrator Pruitt and Interior Secretary Zinke are hell bent on eliminating them altogether. Peer-reviewed science indicates that living within a 1/2 mile of these production facilities is clearly correlated with negative health impacts including cancer, respiratory illness, fetal defects, blood disorders and neurological problems. Several U.S. weed scientists have turned down an invitation to attend Monsantos dicamba summit near St. Louis this week, as controversies unfold over the companys new Xtend Crop System, Reuters reported. Experts have linked the highly volatile and drift-prone herbicide to the damage of 3.1 million acres of crops that are not genetically engineered to resist the powerful chemical. Arkansas, which has logged the most dicamba-related complaints, is a step away from banning the chemical (again) next summer. The U.S. Environmental Protection Agency (EPA) is also consulting with state officials and scientists, including ones in Arkansas, on potential regulations. According to Reuters, the agrichemical giant is hosting the summit to win backing from the scientists in efforts to convince regulators the product is safe to use. At the summit, the company plans to present data claiming that user error is behind the crop injuries. Weed scientists from Arkansas and MissouriMonsantos home stateare reportedly skipping the summit. University of Missouri plant sciences professor Kevin Bradley, who has extensively logged the nations massive swath of dicamba-related damage, told Reuters that he is not attending the summit because he does not think Monsanto will discuss volatilization. Monsantos vice president of global strategy Scott Partridge told Reuters that this will be the companys largest summit on dicamba so far and at least half of the 60 people invited plan to attend. University of Arkansas professor Jason Norsworthy has also declined to present a summary of national drift and volatility research at the summit. Notably, after an Arkansas task force recommended that the state bar dicamba spraying next year, Monsanto filed a petition questioning the objectivity of Norsworthy and fellow Arkansas weed expert Ford Baldwin due to their supposed connections to Bayer Crop Science, which makes the competing weedkiller glufosinate. An ad from Bayers LibertyLink product featured a quote from Norsworthy, The next best technology is already available in the LibertyLink system. Tom Barber and Bob Scott, who are also University of Arkansas experts, will skip the meeting as well. With Monsanto questioning of the integrity of our science, we felt it was best not to participate, university spokeswoman Mary Hightower told Reuters. Dr. Mark Cochran, vice president-agriculture for the University of Arkansas System Division of Agriculture, defended Norsworthy. There are several points in the petition we need to address immediately: First, Norsworthys findings are anything but an outlier. It is consistent with research work in other states, including that of Kevin Bradley in Missouri, Tom Mueller and Larry Steckel in Tennessee, and elsewhere, he wrote. Second, none of our researchers has ever endorsed any product, but sometimes companies use our public comments and statements without our permission. University of Tennessee weed scientist Tom Mueller will be attending. He told Reuters he plans to pay his own way to the event even though Monsanto said it would foot travel costs. But he noted that he was skeptical Monsanto would engage in discussions. I think its just going to be a monologue, he said. The controversy surrounding dicamba started last year when Monsanto decided to sell its Xtend cotton and soybean seeds several growing seasons before getting federal approval for the corresponding herbicide. Without having the proper herbicide, cotton and soybean growers were suspected of illegally spraying older versions of dicamba onto their crops and inadvertently damaging nearby non-target crops due to drift and volatilization. Off-target crops are often left cupped and distorted when exposed to the chemical. Monsanto, DuPont and BASF SE now sell new federally approved dicamba formulations that the companies say are less drift-prone and volatile than older versions when used correctly. Monsanto developed its Xtend system to address superweeds that have grown resistant to glyphosate, the main ingredient in the companys former bread-and-butter, Roundup. Xtend crops are expected to expand across 80 million acres in the U.S., creating a $400-$800 million opportunity for the company. The worlds largest seedmaker has been accused of having staffers ghost-write favorable studies about glyphosate that federal regulators used to determine that the chemical does not cause cancer. By Wendy Becktold As Hurricane Maria approached Puerto Rico on Tuesday, Sept. 19, Adriana Gonzalez prepared as well as she could. She readied her campstove, a supply of canned food and two seven-gallon jugs of water. By late afternoon, she and two friends hunkered down in her apartment in San Juan. They had a restless night. At 11 p.m. the power went out. At around 1 a.m., they woke up to a roaring wind, followed by the sound of trees breaking. They make a really specific sound, like thunder, Gonzalez told Sierra by phone on Monday. A large branch fell from the mahogany tree in front of her house. By 6 a.m., it was raining hard. It looked as if someone was dumping buckets of water from the sky, Gonzalez said. Despite the aluminum-shuttered windows and the precautions she had taken to keep them tight, water started pouring into the apartment. It was like someone was hosing down my windows from the outside, she said. They used all the towels and sheets they could find to sop up the water. Later on Wednesday, the storm had tapered down enough for Gonzalez to step outside. She emerged to see a world upendeddebris-filled, flooded streets and damaged buildings. Overall, she counts herself lucky to have made it relatively unscathed through the worst hurricane to make landfall in Puerto Rico since 1932. Now, like many other residents in the capital, Gonzalez is waiting to see what happens next. Today we have better cellphone service, she said. Tomorrow we might get water back. Much remains uncertain. With a curfew in place from 7 p.m. to 5 a.m., the overall mood of the city is tense. Most of the islands 3.5 million residents are without electricity and could be for months, though Puerto Ricos aging electrical system is so unreliable that many people, especially business owners, have their own generatorsa perverse kind of bright side to the current predicament. On the radio, stores and restaurants in the capital are announcing that they are open for business. But all of those generators run on gasoline, which is scarce. Gas is on everyones minds, Gonzalez said. Yesterday, I saw one gas station that had a hundred cars. People were there with their chairs, playing dominoes. According to government officials, there is no actual gas shortage. The problem has been transporting the fuel to stations. But the long lines feed peoples anxieties: You see all these people waiting for gas, Gonzalez said, and you think that there is a crisis and you need to go get some. The lack of communication with the rest of the island is also producing widespread anxiety. Cellphone service is still extremely limited. People are starting to get desperate to hear from their family members, Gonzalez said. The news reports are grim: Entire towns along the coast destroyed; towns on the interior suffering major landslides; people running out of food and water as they wait for aid that has yet to arrive. We know that there are supplies, but people are not seeing them because distribution is very slow, Gonzalez said. After the storm subsided, the rain continued for two more days, dumping up to 40 inches on some parts of Puerto Rico. Some of the worst flooding was in Toa Baja, where officials opened the gates of a nearby dam while the city was also experiencing a storm surge. At least eight people died. As an environmental justice organizer with the Sierra Club, Gonzalez is worried about other problems as well. What happened in Toa Baja is terrible, but the town also has a huge oil refinery. There has been no conversation about that plantdid it flood? There is a total lack of information about possible contamination. Another concern is a mountain of coal ash at a landfill in Guayama. The secretary of the Environmental Quality Board released an official statement saying that the site had not flooded and that the coal ash had not blown away in the heavy winds, but Gonzalez is skeptical. Shes been texting contacts in both Toa Baja and Guayama but has yet to hear back from anyone. Questions about the long-term recovery effort loom. FEMA normally requires localities to pay 25 percent of the emergency funding it provides, but Puerto Rico was in an economic crisis before the hurricane season started and will not be able to afford it. Agriculture on the island was devastated, which means Puerto Rico will become even more dependent on imports. Gonzalez is already thinking about ways that she and the local chapter of the Sierra Club can help farmers recover. Shes also thinking about how to rebuild communities so that they are more resilient in future hurricanes. Were not just looking at rebuilding but also at transforming what we had, she said, because its the only way that were going to be able to move forward. Washington state regulators denied a water quality permit for a major coal export terminal Tuesday, dealing a possibly lethal blow to the project. The Washington Department of Ecology denied the permit for the Millennium Bulk terminal project, finding that the proposed terminal would have caused significant and unavoidable harm to the nearby city of Longview. There are simply too many unavoidable and negative environmental effects for the project to move forward, Ecology Director Maia Bellon said in a statement. As reported by the AP: An environmental review released in April by Washingtons ecology department and Cowlitz County analyzed potential harm to fish habitat, wetlands, water quality, local communities and more. Of 23 environmental areas, 19 would face harmful effects, and some could not be offset or reduced, officials said at the time. This a major victory for activists who have been fighting for seven years to stop the coal export terminal in Longview, Jasmine Zimmer-Stucky, senior organizer with Columbia Riverkeeper, told ThinkProgress. Todays victory came after 260,000 public comments were submitted in opposition to this permit, and its a relief to know that agencies are responding to not only overwhelming opposition from the public but also their own facts and their own science. If built, the terminal would have been the largest export terminal in the country, expected to export up to 44 million tons of coal per year from Wyoming and Montana to China and potentially increasing U.S. coal exports by 40 percent. I think this really ends the conversation around coal export, and it ends it with a firm punctuation mark that these are bad choices for our region, Seattle-based Earthjustice attorney Jan Hasselman said. For a deeper dive: AP, Reuters, Washington Examiner, ThinkProgress For more climate change and clean energy news, you can follow Climate Nexus on Twitter and Facebook, and sign up for daily Hot News. Ellwood City-area homes for sale rise in price to $139,000 In Lawrence County, homes for sale had a median price of $86 per square foot, while Pennsylvania's was $169 Alexandria Real Estate Equities, Inc. (NYSE:ARE), an S&P 500 urban office real estate investment trust ("REIT"), is the first, longest-tenured, and pioneering owner, operator, and developer uniquely focused on collaborative life science, technology, and agtech campuses in AAA innovation cluster locations, with a total market capitalization of $31.9 billion as of December 31, 2020, and an asset base in North America of 49.7 million square feet ("SF"). The asset base in North America includes 31.9 million RSF of operating properties and 3.3 million RSF of Class A properties undergoing construction, 7.1 million RSF of near-term and intermediate-term development and redevelopment projects, and 7.4 million SF of future development projects. Founded in 1994, Alexandria pioneered this niche and has since established a significant market presence in key locations, including Greater Boston, San Francisco, New York City, San Diego, Seattle, Maryland, and Research Triangle. Alexandria has a longstanding and proven track record of developing Class A properties clustered in urban life science, technology, and agtech campuses that provide our innovative tenants with highly dynamic and collaborative environments that enhance their ability to successfully recruit and retain world-class talent and inspire productivity, efficiency, creativity, and success. Alexandria also provides strategic capital to transformative life science, technology, and agtech companies through our venture capital platform. We believe our unique business model and diligent underwriting ensure a high-quality and diverse tenant base that results in higher occupancy levels, longer lease terms, higher rental income, higher returns, and greater long-term asset value. We're always interested in hearing about news in our community. Let us know what's going on! Go to form Malware, short for malicious software, is any unwanted software on your computer that, more often than not, is designed to inflict damage. Since the early days of computing, a wide range of malware types with varying functions have emerged. At its core, malware exploits existing network, device, or user vulnerabilities, posing as little a risk as annoying advertisements to the much more damaging demand for millions of dollars in ransom. This article dives into the lexicon of malware, offering descriptions, protections, and examples of each. Best Practices to Defend Against Malware As you browse the myriad of malicious software featured in this article, we offer tips for how best to defend against each type. In general, here are some of the most frequent best practices to protect against malware: Update all network, application, and device software promptly When alerted to potential vulnerabilities, patch promptly Boost your organizations IT literacy with ongoing cybersecurity training so they recognize the threats posed by malware attacks Architect a premium network security model like SASE that encompasses SD-WAN, CASB, secure web gateways, ZTNA, FWaaS, and microsegmentation Consider anti-malware solutions that can aid your existing infrastructure Understand malware is a reality; prepare for the worst, and plan your response to a malware attack Here are some common and not so common malware threats and how to defend against them. Adware Adware, also known as malvertising, is a type of malware that downloads or displays advertisements to the user interface. Rather than stealing data, adware is more of an irritant forcing users to see unwanted ads. Most users are familiar with adware in the form of unclosable browser pop-ups. Users sometimes unknowingly infect themselves with adware installed by default when they download and install other applications. How to Defend Against Adware Install an antivirus solution that includes anti-adware capabilities. Disable pop-ups on your browsers, and pay attention to the installation process when installing new software, making sure to un-select any boxes that will install additional software by default. Examples of Adware Malware Attacks While there are hundreds of adware versions, some of the most common examples include Fireball, Appearch, DollarRevenue, Gator, and DeskAd. These adware strains often present themselves as a video, banner, full screen, or otherwise pop-up nuisance. Also Read: Yahoo Malware Attack: Malvertising Is the Silent Killer Backdoors A backdoor is a trojan that offers an attacker remote access into the victims device. Most device or software manufacturers place backdoors in their products intentionally and for a good reason. If needed, company personnel or law enforcement can use the backdoor to access the system when needed. However, in a bad actors hands, a backdoor can do anything the user does. Backdoors can also be installed by other types of malware, such as viruses or rootkits. How to Defend Against a Backdoor Backdoors are among the most challenging types of threats to protect against. Experts say the best defense is a multi-pronged network security strategy that includes a firewall, anti-malware software, network monitoring, intrusion detection and prevention (IDPS), and data protection. Examples of Backdoor Malware Attacks Because backdoors are often intentionally built into products, the number of instances theyve been used maliciously is numerous. In 2005, Sony BMG delivered millions of CDs with a rootkit that monitored listening habits and unintentionally left a backdoor to the device for cybercriminals. In 2017, more than 300,000 WordPress websites were affected by a malicious plugin that allowed an attacker to place embedded hidden links on victim websites. Bots and Botnets Bots are software performing automated tasks, making attacks known as botnets deadly for victims. In cybersecurity, a bot typically refers to an infected device containing malicious software. Without the users knowledge or permission, a bot can corrupt the device. Botnet attacks are targeted efforts by an army of bots, directed by their bot herder. How to Defend Against Botnets Organizations can help prevent their computers from becoming part of a botnet by installing anti-malware software, using firewalls, keeping software up-to-date, and forcing users to use strong passwords. Network monitoring software can also help determine when a system has become part of a botnet. Always change the default passwords for any IoT devices you install before extended use. Examples of Botnet Malware Attacks Attackers often use botnets to send out spam or phishing campaigns to carry out distributed denial of service (DDoS) attacks. However, a growing number of botnet attacks are used against IoT devices and their connected networks. Additional features of botnets include spam, ad and click fraud, and spyware. In 2008, the Kraken botnet with 495,000 bots infected 10% of the Fortune 500 companies. This instance of a botnet attack was also the first where malware went undetected by anti-malware software. In 2016, the Mirai botnet attack left most of the eastern U.S. with no internet. With over 600,000 devices, this botnet exposed just how vulnerable IoT devices could be and led to the IoT Cybersecurity Improvement Act of 2020. Browser Hijacker A browser hijacker also called hijackware, noticeably changes the behavior of your web browser. This change could be sending you to a new search page, slow-loading, changing your homepage, installing unwanted toolbars, directing you to sites you did not intend to visit, and displaying unwanted ads. Attackers can make money off advertising fees, steal information from users, spy, or direct users to websites or apps that download more malware. How to Defend Against a Browser Hijacker Be careful when installing new software on your system. Many browser hijackers piggyback on wanted software, much like adware does. Ensure you install and run anti-malware software on your system and maintain high-security settings for browser activity. Because hijackware is related to your browser, therein lies the solution to exterminating a browser hijacker. If your antivirus software fails to notice a new strain, you can reinstall the browser. If that fails to work, clearing the contents of the device might be required. Examples of Browser Hijacker Malware Attacks A handful of notable browser hijackers are Ask Toolbar, Conduit, CoolWebSearch, Coupon Saver, GoSave, and RockTab. These browser hijackers typically come in the form of an added toolbar, and because its often included in the software download, users rarely recognize its potential harm. Bug Bugs are a generic term for flaws in segments of code. All software has bugs, and most go unnoticed or are mildly impactful to the user. Sometimes, however, a bug represents a severe security vulnerability, and using software with this type of bug can open your system up to attacks. How to Defend Against Bugs The best way to minimize potentially nasty bugs is consistent updates for your software. With vulnerabilities at the top of software vendors minds, they are quick to release patches to prevent user systems damage. For organizations writing or configuring their code, its imperative to follow best practices for secure code and potentially seek third-party review. Examples of Bug Malware Attacks Because bugs are often the root vulnerability that enables malware, almost every attack has something to do with a bug-related exposure. Also Read: What is a Bug Bounty? How to Set Up a Bug Bounty Program Crimeware Some vendors use crimeware to refer to malware that is criminally executed and often financially benefits the attacker. Much like malware, it is an inclusive category that encompasses a wide variety of malicious software. Unlike ransomware, it might be a criminal operation that does not involve the collection of a ransom. As a term, crimeware encompasses much of the malware types listed in this article. How to Defend Against Crimeware Best network security practices are essential, including using anti-malware, firewalls, intrusion prevention and detection (IPDS), network and log monitoring, data protection, security information and event management (SIEM), and threat intelligence. Cybersecurity vendors like Panda Security suggest the best way to defend against crimeware is using a combination of antivirus, anti-spyware, firewalls, and threat detection technology. Examples of Crimeware Malware Attacks Because crimeware is an umbrella term for most malware types, the examples are endless. Some malware technologies like keyloggers and backdoors come with the product design for later maintenance of the device. All crimeware programs are inherently malicious, and their successful activation is prosecutable. Keyloggers A keylogger is a software program that records all of the keys a user touches. This exposed data includes everything from emails and documents typed to passwords entered for authentication purposes. By obtaining sensitive authentication access, attackers can break into the vendor network or user account. How to Defend Against a Keylogger Good password hygiene is one of the best ways to prevent access to keyloggers. Using strong passwords that you update regularly can go a long way towards keeping you safe. You should also use a network firewall and an anti-malware solution. Examples of Keylogger Malware Attacks Keylogging is legal and widely enforced by vendors working with sensitive information. Employers can enable a keylogger through hardware or software to detect any criminal or unethical behavior on company systems. For malicious keyloggers outside your organization, initial access to a device or users account would be necessary. A strain of keylogger malware dubbed LokiBot notably increased in 2020. CISA reported that LokiBot employs Trojan malware to steal sensitive information such as usernames, passwords, cryptocurrency wallets, and other credentials. Malicious Mobile Apps In the sea of apps available today, not all of them are desirable, and the problem is even more acute with third-party app stores. While app store vendors try to prevent malicious apps from becoming available, some inevitably slip through. These apps can steal user information, attempt to extort money from users, gain access to corporate networks, force users to view unwanted ads, or engage in other undesirable activity types. How to Defend Against a Malicious Mobile App User education is one of the most powerful tools for preventing malicious mobile apps. By avoiding third-party app stores and investigating app data before downloading, users can significantly mitigate this risk. Deploying mobile anti-malware and a company-wide mobile security plan is essential for large organizations. Examples of Malicious Mobile App Malware Attacks During the 2019 holiday season, the Barracuda research team analyzed 4,200 Android apps related to shopping, Santa, and games. Of these, 165 apps had excessive permission requests, 35 contained adware, and 7 exhibited evident malicious redirecting. While this case study is just a snapshot, vigilance in the app store is required. Also Read: Types of Mobile Malware & Solutions Phishing and Social Engineering Phishing and social engineering are a type of email attack that attempts to trick users into divulging passwords, downloading an attachment or visiting a website that installs malware on their systems. More targeted efforts at specific users or organizations are known as spear phishing. Because the goal is to trick the user, attackers will research the victim to maximize trick potential, often using spoofing to make the email seem legit. How to Defend Against Phishing Because phishing relies on social engineering tricking users into doing something employee training is one of the best defenses against these attacks. Users should deploy anti-spam and anti-malware solutions, and staff should know not to divulge personal information or passwords in email messages. Training about downloading attachments or clicking website links in messages, even if they appear to come from a known source, is imperative given phishing attackers often pretend to be a company or person known to the victim. Email is also usually how ransomware works. Examples of Phishing Malware Attacks Phishing Type Description Deceptive Phishing Most common type, using an email headline with a sense of urgency from a known contact. This attack blends legitimate links with malicious code, modifies brand logos, and evades detection with minimal content. Spear Phishing As noted, spear phishing targets specific users or organizations by exploring social media, recording out-of-office notifications, compromising API tokens, and housing malicious data in the cloud. Whaling Even more targeted than spear phishing, whaling targets chief officers of an organization by infiltrating the network, exposing the supply chain, and following up the malicious email with a phone call to give it legitimacy. Vishing Targeting victims over the phone, vishing is the use of Voice over Internet Protocol (VoIP), technical jargon, and ID spoofing to trick a caller into revealing sensitive information. Smishing Smishing also targets phone users, but this one comes in the form of malicious text messages. Smishing attacks often include triggering the download of a malicious app, link to data-stealing forms, and faux tech support. Pharming Moving away from trying to trick users, pharming leverages cache poisoning against the DNS, using malicious email code to target the server and compromise web users URL requests. RAM Scraper RAM scraper malware, also known as Point-of-Sale (POS) malware, harvests data temporarily stored in a systems memory, also known as random access memory (RAM). This type of malware targets POS systems like cash registers or vendor portals where an attacker can access unencrypted credit card numbers. While this sensitive payment data is only available for milliseconds before passing the encrypted numbers to back-end systems, attackers can still access millions of records. How to Defend Against a RAM Scraper Organizations can help prevent RAM scraper attacks by using hardened POS systems and separating payment-related systems from non-payment systems. Usual precautions such as anti-malware software, firewalls, data encryption, and complying with any relevant standards or regulations for protecting customer data are a must. Examples of RAM Scraper Malware Attacks Since 2008, RAM scraping has been a boon for retailers. A handful of years later, the now-infamous spyware dubbed BlackPOS led to the compromise of 40 million Target customers and 56 million Home Depot customers. Heading into the 2020s, a few notable RAM scraping malware families are FrameworkPOS, PoSeidon/FindStr, FighterPOS, and Cabanak/Anunak. Ransomware In recent years, ransomware has quickly become one of the most prevalent types of malware. The most common malware variants encrypt a system or specific files, pausing any work from being done until the victim pays a ransom to the attacker. Other forms of ransomware threaten to publicize sensitive information within the encrypted data. How to Defend Against Ransomware Often organizations can mitigate ransomware attacks by having up-to-date backups. If their files become locked, they can simply wipe the system and reboot from an offline backup. Organizations should train users about the threat, patch their software as necessary and install all the usual security solutions. Some instances of ransomware appear so dire that many organizations and individuals resort to paying the ransom. Examples of Ransomware Malware Attacks With vendors and organizations increasingly moving online, more data is at risk of exposure. Attackers know this and often take advantage of small to mid-sized organizations with weaker network security, requesting an amount they know the organization can afford. Notable examples from the 2010s included CryptoLocker, Locky, WannaCry, Hermes, GandCrab, and Ryuk. Rogue Security Software Rogue security software is a form of ransomware or scareware. An attacker enabling this method tricks users into thinking their system or device is at risk. The malware program will present itself as a fake security tool to remove the problem at a cost. In actuality, the user pays up and the artificial security software installs more malware onto their systems. How to Defend Against Rogue Security Software As with most other malware forms, you can prevent most rogue security software from being installed on your system by using a firewall and anti-malware solution and by being careful when clicking on links or attachments in email messages. Also, organizations should educate users about the threat as rogue security software attackers have become particularly good at social engineering. Examples of Rogue Security Software Malware Attacks Some of the most common rogue security software attacks have come in spam campaigns and adware. However, a different infection vector for this malware is the technique known as Black Hat SEO. By following the most popular keywords on the internet through public records like Google Trends, attackers use malicious scripts to generate websites that appear legitimate. Rootkit Rootkits are one of the most insidious malware types because they allow attackers to have administrator-level access to systems without the users knowledge. Once an attacker has root access to a network, they can do almost anything with the system, including recording activity, changing system settings, accessing data, and mounting attacks on other systems. How to Defend Against a Rootkit You can prevent most rootkit infections by installing appropriate security software (anti-malware, firewall, log monitoring) and keeping your operating system and other software up-to-date with patches. You should be careful when installing any software on your system and when clicking email attachments or links. If a rootkit infects your system, it can be nearly impossible to detect and remove; in many cases, you may have to wipe your hard drive and start over from scratch to get rid of it. Examples of Rootkit Malware Attacks Rootkit Type Description Bootkit rootkit A type of kernel-mode rootkit infecting boot functionality during computer startup, subverting the kernel upon powering on. Firmware rootkit Firmware is often used by organizations, however, their persistent presence in the router, network card, hard drive, or BIOS makes detecting it difficult if used maliciously. Kernel-mode rootkit This rootkit alters the very core of your system, the kernel. Resembling device drivers or loadable modules, they operate at the same security level as the OS, giving the appearance of credibility. Virtual rootkit Also known as a hypervisor, this rootkit hosts the target OS as a virtual machine (VM). It can forgo modifying the kernel and subvert the OS. User-mode rootkit This rootkit can alter security settings, allowing the attacker to replace executables and system libraries and modify interface behavior. Also Read: Top 5 Rootkit Threats and How to Root Them Out Spam In IT security, spam is unwanted email. Usually, it includes unsolicited advertisements, but it can also have attempted fraud or links or attachments that would install malware on your system. Most spam emails contain: Poor spelling and grammar An unusual sender address Unrealistic claims Links that look mighty risky How to Defend Against Spam Most email solutions or services include anti-spam features. Using these capabilities is the best way to prevent spam from showing up on your systems. If your inbox contains thousands of unread emails and a dozen subscriptions no longer pertinent, do yourself a favor and unsubscribe. Examples of Spam Malware Attacks Spam might be one of the most universally understood forms of malware. As billions of users enable email for their everyday lives, it makes sense that malicious actors try to sneak into your inbox. Some of the most common types of spam emails include fake responses, PayPal, returned mail, and social media. All of which are disguised as legitimate but contain malware. Spyware Spyware is any type of software that gathers information about someone without their knowledge or consent. For example, website tracking cookies that monitor a users browsing history is considered a form of spyware. Other types of spyware might attempt to steal personal or corporate information. Government agencies and law enforcement often use spyware to investigate domestic suspects or international threat actors. It is challenging for the user to detect spyware symptoms ranging from performance issues to unusual modem activity. How to Defend Against Spyware Install anti-spyware software on your computer. Luckily, anti-spyware capabilities are included in most antivirus or anti-malware packages nowadays. Using a firewall and caution when downloading software is a must. And finally, scanning for potential threats at least once a week can be a lifesaver. Examples of Spyware Malware Attacks Spyware often comes in the form of adware, trojans, keyloggers, and rootkits. Some of the best-known spyware strains include CoolWebSearch, Gator, Internet Optimizer, TIBS Dialer, and Zlob. For example, CoolWebSearch uses Internet Explorer vulnerabilities to direct traffic to advertisements, infect host files, and rewrite search engine results. Trojans In computer security, a trojan is any malware that pretends to be something else but serves a malicious purpose. For example, a trojan might appear to be a free game, but once installed, it might destroy your hard drive, steal data, install a backdoor, or take other harmful actions. How To Defend Against a Trojan Because trojans use social engineering for targeted attacks, educating users is imperative. Caution when installing new software or clicking email links and attachments is the name of the game. Organizations can defend against most trojans with security software such as anti-malware software and sufficient firewalls. Examples of Trojan Malware Attacks Trojan Type Description ArcBomb trojan Short for archive bomb, this trojan is built to slow, freeze, or overwhelm the computers performance by using malcrafted archive headers, repeating data, and identical files in the archive Backdoor trojan See Backdoor for reference. A remote user with control of your device can act as you, steal data, and corrupt files. Banking trojan Appearing as your bank, these trojans are built to steal your financial account information, exploiting your data and using your money. Clicker trojan Trojans that are activated upon click. Victims are usually the recipient of adware, but can also be redirected to malicious websites. DDoS trojan See DDoS for reference. These trojans execute a DDoS attack on a target website. Downloader trojan Trojans that can download or install updated versions of malware. Dropper trojan Installs trojans to prevent detection of malware or install additional malware; increasingly harder to detect for antivirus software. Exploit trojan Pertinent to our looks at bugs, exploit trojans target vulnerabilities in the code of application software. FakeAV trojan By simulating the appearance of an antivirus program, these trojans ask you to pay for the detection and removal of threats that dont really exist. Game thief trojan These trojans target the login and user account data of online gamers. Instant messaging trojan By stealing your credentials for instant messaging services like native SMS apps, Skype, Facebook, WhatsApp, and more, attackers can capture your accounts data. Mailfinder trojan Searching through your computer, this trojan harvests email addresses that it can use for additional malware. Notifier trojan This trojan alerts attackers to when an infected device is online, therefore giving the attacker access to IP address, open port number, and other sensitive information. Proxy trojan Often used for mass spam mailings, this trojan gives attackers access to the victim computers internet resources. Password stealing trojan Programs built to search systems files for username and password information. Ransom trojan Like ransomware, this trojan encrypts your files or causes a noticeable change in your computers functionality. Restoration of performance or data comes at a price. Rootkit trojan See Rootkit for reference. This trojan aids in the hiding of malicious software, concealing its activities and prolonging the infection. SMS trojan These trojans target cellular devices, using their access to a device to send messages without regard for how much it might cost the device owner. Spy trojan Similar to spyware, trojan spy software monitors your computer through keylogging, screenshots, and application authentication. Viruses While some refer to malware and viruses interchangeably, a virus is a specific type of malware that requires human activation a click on an attachment, image, link, or even a file you access every day. Often hidden, a click by staff could unknowingly boot up a virus. Viruses infect a device and then attempt to spread to other devices and systems. As far as damage to the user goes, a virus can perform several undesirable commands. These include: Incorporating systems into a botnet Sending spam to contacts Stealing sensitive information Locking the system Missing files and programs How to Defend Against a Virus Any internet-enabled system in your network should have antivirus software installed and up-to-date. Deploying a firewall is essential, but use care when clicking on email attachments or URL links. Inspecting website security by its SSL is imperative to avoid visiting unknown or untrusted websites. Major antivirus software vendors include Avast, AVG, BitDefender, ESET, Kaspersky, Norton, Panda and Sophos, and Micorosft offers free Windows protection in the form of Microsoft Defender. Examples of Virus Malware Attacks Virus Type Method of Breach Boot sector virus Infects the boot sector of the Master Boot Record (MBR) of hard disks, activating every time you start your computer. Browser hijacker virus See Browser hijacker for reference, this virus takes control of browser settings and redirecting traffic to malicious websites. Direct action virus Replicates and infects files of folders, most often .exe and .com files, activating when the file is accessed. File virus Targets both files and the operating system (OS), this virus can reformat the hard drive and damage programs by amending existing code. Macro virus Written into macro language like VBA, once an application is infected, the infection can spread when shared to other devices. Multipartite virus Targets both the boot sector and the systems programs, this speedy virus spreads by unauthorized activities Polymorphic virus Difficult for anti-malware to detect, this virus is quick to change identifiable file traits or encryption keys, changing the appearance of the code. Resident virus Conceals itself in the computers RAM, and can spread to any programs opened while infected. Script virus Through a vulnerability in the web browser think malicious ads and links this virus injects scripting into an organizations web page to access sensitive information. Also Read: Antivirus vs. EPP vs. EDR: How to Secure Your Endpoints Worms A worm is similar to a virus because it spreads itself, but a worm does not need an attackers permission for activation. Instead, it is a standalone piece of malware that extends within a system or network. Like viruses, it can cause just as much damage to the device. How to Defend Against Worms As with viruses, the best way to prevent worm infections is with antivirus or anti-malware software. And as always, users should only click on email links or attachments when confident of the contents. Examples of Worm Malware Attacks Worm Type Hidden In Email worm Email content (attachment or advertisement) Downloads worm Download files or FTP files Instant Messaging worm Mobile or desktop instant messaging programs Internet worm Corrupted websites HTML IRC worm Internet relay chat channels and rooms File Sharing/P2P worm Person-to-person file-sharing network Networks worm Carried in network packets or any shared access device, drive, or file in the network Prepare For All Malware Types If youve made it this far, you know the forest of malware is dark and deep. Todays league of malicious actors arent relying on the traditional forms of malware. Theyre consistently seeking more robust strains that can outdo your network security and current anti-malware or antivirus solutions. Being aware of the dangers that lie in different types of malicious software comes first. As a cybersecurity professional, it is your responsibility to stay mindful of malware trends and actively respond to pertinent vulnerabilities. Ransomware attacks hit the headlines every week, with governments, school districts, healthcare providers, and private companies forced to admit attacks after ransomware disrupts their operations. Healthcare ransomware attacks have even been linked to patient deaths. Faced with the threat of negative publicity and often unrecoverable data non-technical executives and board members often ask their security teams or service providers to explain ransomware and how their organization might prevent ransomware attacks. While security professionals can write entire books on ransomware, executives need concise, high-level information that provides the essential information in language free of acronyms, trivia, or technical details they may not understand. What is Ransomware: The Short Version The term ransomware applies to a broad spectrum of attacks and tools that seek to encrypt data and then hold the data ransom in exchange for a decryption key. Over the past couple of years, attackers evolved their attacks to use ransomware as just one of several methods to use their access to the victims network for financial gain. Another key tactic is to steal the victims data for resale or threatening to release the stolen data to the public as leverage for extortion. While most attackers typically use ransomware for financial gain, some attackers use ransomware to camouflage other types of attacks such as: Russian hackers deployed the 2017 NotPetya ransomware attack against companies doing business in the Ukraine. No ransoms could be paid, the malware solely sought to disrupt operations. The North Korean Lazarus group deployed ransomware to erase forensic evidence in its 2017 attempt to steal money from the Far Eastern International Bank of Taiwan. Attackers deploy the ONI ransomware on critical assets to wipe and conceal the true targets of the attackers within the Japanese corporate victims. Recently, ransomware gangs seek to move faster and avoid detections that focus on the encryption process. While these attacks technically no longer count as ransomware, businesses still need to guard against similar attacks that seek to corrupt data after exfiltration or simply extort businesses based on the threat of leaking stolen data. Ransomware recovery resources: How to Identify Ransomware Once inside a business, malicious hackers can deploy many types of malware or attack systems in many different ways. For many victims, they only recognize a ransomware attack once their data is encrypted and the ransom notes are found, as in the screen and text messages from the infamous REvil ransomware group below (Sources: Arista Networks and Qualys). When trying to catch ransomware attacks earlier in the process, defenders watch for indicators of compromise such as: Known malware, such as viruses or malware signatures captured by email, endpoint, firewall, or network monitoring software Data copied outside of the environment in large quantities Attempts to delete local or network backups Active encryption of data Attempts to download or execute hacking toolkits Unusual attempts to use PowerShell Simple ransomware attacks use semi-automated malware to spread itself through networks and execute the ransomware. Sophisticated attacks use command and control servers, PowerShell commands, and active exploration of the network by attackers in combination with malware and malicious use of standard tools. Also read: Exfiltration Can Be Stopped With Data-in-Use Encryption, Company Says Am I Vulnerable to Ransomware? Everyone is vulnerable to ransomware. Regardless of the amount of training, people keep clicking on phishing emails and opening holes in security. Regardless of the quality or quantity of layers of security deployed, zero-day vulnerabilities, deployment mistakes, and human error can create security gaps that attackers will eagerly exploit. The real questions that need to be asked should be: What does the organization have in place to prevent a ransomware infection? What does the organization have in place to limit the damage of a successful attack? What does the organization have in place to alert against infection? What does the organization have in place to react to an attack? Ransomware Prevention Best Practices Organizations can prevent many ransomware attacks and limit the damage of the successful ransomware attacks through security and IT best practices. Implementing all of these strategies may be beyond the resources of some organizations, but even small organizations can find ways to implement many of these best practices through open-source tools and software-as-a-service (SaaS) products or by engaging service providers such as The smallest organizations with limited resources should at least implement effective backups and endpoint protection software. This combination will prevent many types of ransomware infections and allow the company to recover as quickly as possible from those that succeed. See the Best Backup Solutions for Ransomware Protection Ransomware Infection Prevention Best Practices Ransomware prevention requires creating reinforcing layers of security to prevent an attacker or malware from entering the secured spaces of the organization. Key components of this strategy seek to protect devices, block common infection vectors, minimize human error, and check for gaps in the security. Secure devices Many ransomware attacks launch on the endpoint. Effective endpoint security increases the difficulty for ransomware attacks to launch or to avoid detection. Endpoint Security: Antivirus provides a baseline level of protection against established ransomware malware. However, to defend better against new variants or new malware, organizations should consider upgrading to next-generation antivirus (NGAV) or endpoint detection and response (EDR) tools. Antivirus provides a baseline level of protection against established ransomware malware. However, to defend better against new variants or new malware, organizations should consider upgrading to next-generation antivirus (NGAV) or endpoint detection and response (EDR) tools. Multi-Factor Authentication (MFA): Critical resources, such as servers that host key applications or services like Active Directory (AD) and Domain Name Systems (DNS), should be protected by multiple factors and methods of authenticating the user. Critical resources, such as servers that host key applications or services like Active Directory (AD) and Domain Name Systems (DNS), should be protected by multiple factors and methods of authenticating the user. Device Management and Bring-Your-Own-Device (BYOD) Restrictions: Devices should be inventoried and monitored and maintain specific security controls to be permitted to connect to the network. Network access control (NAC) and device management solutions can authorize and verify the security status of devices with sufficient antivirus and operating system updates among other options. Devices should be inventoried and monitored and maintain specific security controls to be permitted to connect to the network. Network access control (NAC) and device management solutions can authorize and verify the security status of devices with sufficient antivirus and operating system updates among other options. Windows and Email Settings: Software can be configured to block or require additional authorization to permit the download or launch of executable files. Similarly, Windows Script Host can be disabled as a defense against JavaScript malware. Software can be configured to block or require additional authorization to permit the download or launch of executable files. Similarly, Windows Script Host can be disabled as a defense against JavaScript malware. Configure Desktop Extensions: Windows should be changed from the default, so it always displays extensions. Employees can then be trained on .exe and other potentially malicious file types that should not be launched or downloaded. Windows should be changed from the default, so it always displays extensions. Employees can then be trained on .exe and other potentially malicious file types that should not be launched or downloaded. PowerShell and Hacking Software: Most users dont know hacking tools, what PowerShell is, or how to use these tools appropriately. Use of these tools should be restricted or at least immediately generate alerts. Secure common infection vectors Before ransomware launches, it must first enter the network. Organizations need to defend against the primary vectors of infection. Email Security and Spam Filters: Most malware infections start with phishing attacks with malicious links and attachments. An effective spam filter enhanced by cloud-based threat intelligence can prevent many attacks, and implementing effective DMARC, DKIM, and SPF email security tools can block even more. Email gateways are another effective first line of defense. Most malware infections start with phishing attacks with malicious links and attachments. An effective spam filter enhanced by cloud-based threat intelligence can prevent many attacks, and implementing effective DMARC, DKIM, and SPF email security tools can block even more. Email gateways are another effective first line of defense. Sandbox Testing: Some emails may be quarantined, and other emails may escape filtering, but users or email security tools may flag potentially malicious attachments. Security teams can examine these files utilizing a sandbox to examine the file and confirm if it may be safe for the user to open. Some emails may be quarantined, and other emails may escape filtering, but users or email security tools may flag potentially malicious attachments. Security teams can examine these files utilizing a sandbox to examine the file and confirm if it may be safe for the user to open. Block Malicious Websites: Phishing emails may contain links to malicious sites, or malware may contact malicious sites to download additional malicious software. Known malicious websites can be blocked by firewalls, web gateways or DNS strategies. Phishing emails may contain links to malicious sites, or malware may contact malicious sites to download additional malicious software. Known malicious websites can be blocked by firewalls, web gateways or DNS strategies. Browser Security: Users can be tempted by phishing attacks to visit malicious websites or by ads placed on legitimate websites. Browser security can automatically block pop-up ads and only allow connections with websites with valid security certificates. Even more security can be provided by using browser isolation that acts as a sandbox for web browsing. Users can be tempted by phishing attacks to visit malicious websites or by ads placed on legitimate websites. Browser security can automatically block pop-up ads and only allow connections with websites with valid security certificates. Even more security can be provided by using browser isolation that acts as a sandbox for web browsing. Firewall and Secure Gateway Security: Advanced security settings on firewalls and secure gateways can be used to filter malicious URLs, block malicious attachments, quarantine suspicious network traffic, and generate alerts of suspicious or anomalous traffic. The inspection features of these tools also help to add a layer of security for email and browser security. Secure humans Many ransomware attacks begin with a user falling for email phishing that launches malware or leads to malicious websites. The number of bad clicks can be reduced through cybersecurity training for users. While some users may remain a potential source of infection, training can also help security recognize these users that may need additional layers of security to help protect them. Patching and maintenance Attackers will quickly take advantage of exposed vulnerabilities in any way they can. Often, the announcement of a security patch or a zero-day vulnerability will be followed with malware attacks targeting that exposed weakness within a few days and sometimes within a few hours. IT teams for organizations of all sizes must promptly patch software and hardware vulnerabilities and implement mitigation to protect devices or software that cannot be patched quickly. Updates for security software and infrastructure with the latest security updates (malware signatures, malicious urls, etc.) must also be prioritized to prevent attacks. Check for mistakes The best plans often become unwittingly sabotaged by poor implementation or simple error. Organizations need to regularly check their systems with vulnerability scans and penetration tests to verify that all layers of the security stack operate as expected without any detected vulnerabilities or misconfigurations. Ransomware Damage Limitation Best Practices The best security tools can still be circumvented by human error, misconfigurations, and zero-day vulnerabilities. However, effective IT design and basic security principles can be put in place to limit the effectiveness and slow the spread of ransomware. Data encryption One key tactic in many ransomware attacks uses data exfiltration to extort companies with the threat of releasing that data to the public or to competitors. The effectiveness of this threat can be blunted significantly by encrypting sensitive data or even all data in the organization. However, encryption keys must also be managed and protected to prevent their theft by the ransomware attackers. Backups and offline backups The damage a ransomware attack can cause for an organization will be limited by the maintenance of disaster recovery solutions such as frequent immutable backups. Most ransomware attackers will seek to destroy backups and restore points for systems, so at least one version of the backup should be offline or unreachable from the network. Backup tools and processes should be tested regularly to practice restoration techniques. Organizations should also verify the capacity of the backup provider to operate at scale in the event of a widespread ransomware attack. In addition to data, backups should periodically capture the full operating system, installed software, and settings in the event that a full system backup is required. Backups should be retained for up to six months to enable the restoration of pre-infection data and operating systems as well as enable forensic investigation of long-term attacks. Segmentation and microsegmentation In line with least-privileged principles for users, devices can be isolated using segmentation and microsegmentation to create limited size networks in which a network can spread or an attacker can perform lateral movement. By implementing strict policies at the application level, segmentation gateways, firewalls, zero-trust architecture, and software-defined wide area network (SD-WAN) tools can prevent widespread ransomware attacks. Prioritize assets Using risk assessments, organizations can identify key assets and data for the organization and assign additional protections or alerts on these key assets. Utilize a CASB Cloud access security brokers (CASBs) provide additional visibility, compliance, data security, and threat protection in securing cloud resources and data against attacks. Ransomware Infection Alert Best Practices Despite the best efforts of security teams to prevent malware from entering the network, a simple mistake can lead to a ransomware infection. To limit the ability of the ransomware attack to damage the organization, security teams need to receive alerts regarding malicious activities as well as have the capabilities to recognize those alerts and the capacity to act on them. Security Tool Alerts: Security tools should be configured to detect and send alerts to the security team for malicious, potentially malicious, and anomalous activities. Security tools should be configured to detect and send alerts to the security team for malicious, potentially malicious, and anomalous activities. Data Alerts: Security teams can deploy data loss protection (DLP) tools or user and entity behavior analytics (UEBA) solutions to generate alerts of malicious activities or anomalous large-scale copying or data transfers. Security teams can deploy data loss protection (DLP) tools or user and entity behavior analytics (UEBA) solutions to generate alerts of malicious activities or anomalous large-scale copying or data transfers. Deception Technology: One way to set off a flare to warn of malicious activity is to use honeypots and other deception technology to lure attackers into setting off alarms. One way to set off a flare to warn of malicious activity is to use honeypots and other deception technology to lure attackers into setting off alarms. Active Monitoring: The best alerts from the best security tools can still lead to serious trouble if there is no one monitoring those alerts. Effective security requires the use of security information and event management (SIEM) tools, security operations centers (SOC), managed detection and response (MDR), and attentive security professionals to quickly recognize the alert and be able to take action. These professionals will also need to fine-tune the tools to minimize false alarms that might otherwise waste time and lose critical alerts in the noise of false-positive warnings. Ransomware Reaction Best Practices Advanced tools may be configured to take automated action to quarantine infected devices or block malware from executing. However, other attacks may only generate alerts. Once a ransomware alert has been recognized, the incident response teams will have very little time to react to prevent the ransomware attack from spreading or encrypting the data. We list a number of resources for recovering from a ransomware attack at the top of this article, but the short version is: Incident response The security team should already have specialists assigned or vendors contracted to perform incident response. These teams should develop and practice a playbook for responding to a ransomware attack, so they can respond immediately to an actual event. The incident response teams reaction can include: Incident response tools can help with investigation and recovery, but teams should already be practiced with their use in the local environment to enable the teams to act promptly, confidently, and effectively. Endpoint isolation can contain attacks to specific devices and prevent it from spreading throughout the network. Network isolation may be required if the attack has already spread to multiple devices within the network. Hard shut-down or the physical disconnection of devices can be warranted in large attacks that cannot be contained by other methods. This is the most disruptive response, so this action cannot be taken lightly. Forensic analysis After any detection of ransomware, there needs to be an investigation into the entry point(s), time in the environment, affected system(s), data exfiltrated, and data corrupted. Only once the investigation is complete can the organization confirm the ransomware attack is contained. What to Do When Attacked by Ransomware Ideally, ransomware reaction best practices will allow the incident response practice to kick into gear and lead to a speedy resolution. For those organizations without incident response plans, the general steps should include: First phone calls Cybersecurity Insurance Provider: Cybersecurity insurance policies often require organizations to use vendors required by the insurance company to be eligible for coverage. If the organization intends to seek coverage, the insurer should be the first call. Cybersecurity insurance policies often require organizations to use vendors required by the insurance company to be eligible for coverage. If the organization intends to seek coverage, the insurer should be the first call. Incident Response or Ransomware Recovery Experts : If the organization does not have in-house expertise, they should call in experts experienced with investigating, containing, and remediating ransomware attacks. If the organization does not have in-house expertise, they should call in experts experienced with investigating, containing, and remediating ransomware attacks. Other Stakeholders: Incident response and disaster recovery policies should contain current lists of executives, members of the board of directors, law enforcement, and legal counsel for the organization that must be contacted in the event of an incident. These parties may need to authorize any unusual steps and expenses that may be required to resolve the situation. Execute the ransomware reaction best practices As noted above, the first steps will be to contain the attack followed by stopping the malware. Once the attack has been controlled, the incident response team will need to perform a forensic investigation of the systems to remove any malware, system back doors, or other traces of the attack to prevent recurrence. Recover the data Once the systems are verified as sanitized, the organization can start the process of recovery. Version Restore: Some simple ransomware attacks leave system restore version intact and will allow the recovery team to roll back the system to a previous version. This is the best case scenario that will rarely be possible. Some simple ransomware attacks leave system restore version intact and will allow the recovery team to roll back the system to a previous version. This is the best case scenario that will rarely be possible. Restore From Backup: Organizations with good system and data backups will likely want to pursue this route because it can be the fastest to implement. However, if the last known good state for the system was a considerable time in the past, the recovery team will need to compare two options: Roll back the operating system (OS) and data, and go through all of the patching and updates since that time and restore data separately. Reinstall the OS and software from scratch, and then, restore data. Organizations with good system and data backups will likely want to pursue this route because it can be the fastest to implement. However, if the last known good state for the system was a considerable time in the past, the recovery team will need to compare two options: Decryption Attempts: Organizations without available backups will need to attempt to decrypt the data. Unfortunately, decryption does not have a good success rate, and critical data will often be lost. Post-event analysis & recommendations After the successful recovery of systems and data, the organization should do a post-event review to: Evaluate the cause and controls to prevent or mitigate a repeat event. Review the incident response process and recommend potential adjustments or improvements. Determine if additional training should be developed and provided to users or cybersecurity staff. Develop and approve reports to executives and stakeholders outlining the damages incurred, costs to remediate, steps taken to prevent future attacks, and recommendations for further controls. Effective Preparation is the Best Ransomware Protection Ransomware attackers continue to evolve and develop their skills. Some attacks may be inevitable and unavoidable especially from determined and skilled attackers. However, the hardening of IT environments to make attacks difficult and tedious can cause active attackers to prioritize easier targets of opportunity. The best protection against ransomware attacks remains effective preparation. Organizations that limit access within their IT environment, implement effective security tools, monitor alerts for signs of attack, and respond quickly will dramatically reduce the damage from ransomware attacks. If enough organizations can harden their environments and limit their damage, the ransomware business will certainly fade into the background. Of course, the current boom of ransomware is simply a resurgence of an old attack method that gained traction in a target-rich environment. Skilled attackers will always pivot to a new style of attack designed to extort or steal money, and IT teams will need to adjust their security tactics to address those new threats as they arise. Read next: How One Company Survived a Ransomware Attack Without Paying the Ransom This article was created by Sam Ingalls on Feb. 17, 2021 and updated by Chad Kime on Oct. 20, 2022. Once again, both Google and Apple have cooperated as part of a mobile operating system vendor industry coordination effort to patch a critical vulnerability in a common Wi-Fi component. The CVE-2017-11120 and CVE-2017-11121 vulnerabilities are both critical Remote Code Execution (RCE) vulnerabilities in the Broadcom Wi-Fi driver that is used by both Apple iOS and Google Android operating systems. An attacker within range may be able to execute arbitrary code on the Wi-Fi chip, Apple warned in its security advisory for the CVE-2017-11120 and CVE-2017-11121 vulnerabilities. Apple patched the two issues with the iOS 11 update, while Google included the patches as part of its September Android update. Both of the issues were reported to the impacted vendors by security researcher Gal Beniamini of Google Project Zero. Beniamini was previously credited in April 2017 with finding multiple other Broadcom Wi-Fi driver issued in Android and IOS. Beniamini isnt the only security researcher to identify critical RCE vulnerabilities in Broadcoms Wi-Fi drivers either. Nitay Artenstein, security researcher at Exodus Intelligence, reported a set of Broadcom RCEs he branded as Broadpwn that were patched by Google and iOS in July and publicly detailed during a session at the Black Hat USA security conference the same month. In addition to CVE-2017-11120 and CVE-2017-11121 which impact both iOS and Android, Google is patching for one additional critical Broadcom Wi-Fi RCE identified as CVE-2017-7065. In contrast Apple is patching for seven additional Wi-Fi issues which were reported by Beniamini. Malicious code executing on the Wi-Fi chip may be able to execute arbitrary code with kernel privileges on the application processor, Apple warns in its advisory for CVE-2017-7103, CVE-2017-7105, CVE-2017-7108, CVE-2017-7110 ,CVE-2017-7112 and CVE-2017-7115 The CVE-2017-7116 Wi-Fi issue reported by Beniamini is a bit different than the others, with Apple noted that the flaw could have enabled malicious code executing on the Wi-Fi chip to be able to read restricted kernel memory. Sean Michael Kerner is a senior editor at eSecurityPlanet and InternetNews.com. Follow him on Twitter @TechJournalist. In an age of strong data privacy laws like GDPR and CCPA, data loss prevention (DLP) technology is becoming a critically important IT security tool. Every organization has data, and some of that data is more sensitive than others. Sensitive data can include personally identifiable information (PII) that can impact user privacy. Sensitive data also includes payment and financial information that could lead to identity theft and fraud if the data is lost or stolen and winds up in the wrong hands. Other critical sources of data include intellectual property (IP) and trade secrets. How DLP Works DLP technology provides a mechanism to help protect against sensitive data lossand thus could also be something of a mitigating factor when dealing with compliance agencies in the wake of a data breach. As such, DLP has become a top IT spending priority in many organizations. By classifying data and users and identifying or blocking anomalous behavior, DLP tools give enterprises the visibility and reporting needed to protect sensitive data and satisfy compliance reporting requirements. Key DLP Trends A number of trends are all driving an increase in DLP adoption and strategic importance and in some cases changing how DLP is delivered and deployed. The Great Resignation Businesses are currently struggling with the number of workers leaving for alternate employers. Often leaving with them is the sensitive data that fuels the business. Whether intellectual property or regulated data, employee flight creates a situation where data loss or theft is more prevalent and more costly. Hybrid Work Model Prior to the COVID-19 pandemic, the common model was to have the vast majority of employees within the office and in a controlled technology environment. That model has flipped in favor of remote work and wont likely ever fully return to the way it was. More workers in more locations means more sensitive data in more locations and more potential points of data leakage. Cybersecurity Talent Shortage Hiring, training, and retaining the staff needed to effectively run an information security program can be a challenge for any size business given the cybersecurity talent shortage. Relying on a third party like a managed security service provider (MSSP) to be your eyes and ears delivers the simplicity and efficacy needed for an effective data protection program. Like other security defenses, DLP is also increasingly being offered as a service. Cloud Security Platform Delivery The cloud delivery model has proven itself to be efficient and often more secure than what companies can deliver on-premises relying on their own resources. Cloud-delivered DLP, or DLP as a Service, eliminates the complexity and overhead that can burden IT teams. Platform Consolidation Organizations rely on an ever-increasing stack of security vendors. This increase in vendors leads to excess complexity and often reduced information security. Consolidating internal and external data protection programs with a single solution delivers a simplified view that analysts can use to achieve their main goal, which is to protect sensitive data. Data Explosion IDC estimates that by 2025, 463 exabytes of data will be created every single day. Information security teams have a rapidly expanding challenge to find, understand, and protect all that data. Whether it be on the endpoint, in the cloud, or somewhere in between, data protection programs are a critical piece of the solution to stop data loss or theft. Profiling Customers and companies are moving away from the registration model. Maintaining spreadsheets with millions of rows to identify PII is too difficult to maintain and secure, especially as customers are moving to a profiling mode of operation. Also read: Top GRC Tools & Software DLP capabilities There are a number of key capabilities that the top DLP products and services support. Cloud: The DLP market, much like the broader IT market, has been shaped in recent years by the rise of the cloud. No longer is enterprise data confined to on-premises deployment. DLP solutions therefore must monitor sensitive data in the cloud. The DLP market, much like the broader IT market, has been shaped in recent years by the rise of the cloud. No longer is enterprise data confined to on-premises deployment. DLP solutions therefore must monitor sensitive data in the cloud. Privacy compliance: With GDPR, CCPA, and other data privacy regulations on the rise, DLP has become a useful tool for helping organizations protect customer privacy. With GDPR, CCPA, and other data privacy regulations on the rise, DLP has become a useful tool for helping organizations protect customer privacy. Data labeling: DLP tools have long enabled users to self-assess and identify what types of data should be protected. DLP tools have long enabled users to self-assess and identify what types of data should be protected. Machine learning: Among the latest advances in DLP is machine learning capabilities that automatically identify potentially sensitive information, so it can be protected. How to choose a DLP solution When choosing a DLP technology or services, there are several key considerations organizations must take into account, including: Scope: Where is the data that needs to be protected, and does the solution youre looking at have full visibility into those deployments? Where is the data that needs to be protected, and does the solution youre looking at have full visibility into those deployments? Compliance: If the DLP service is being used to help enable regulatory compliance, be aware of integration with GRC (governance, risk, and compliance) tools. If the DLP service is being used to help enable regulatory compliance, be aware of integration with GRC (governance, risk, and compliance) tools. Reporting: Its important for some organizations to have visibility and reporting into what data is protected and how it is being accessed, particularly for compliance purposes. 8 Top DLP Solutions Jump ahead to: After reviewing the market for DLP solutions, here are eSecurity Planets top picks for DLP. Digital Guardian The Digital Guardian Data Protection Platform by HelpSystems, powered by AWS, performs on traditional endpoints, across the corporate network, and on cloud applications, making it easier to see and block threats to sensitive information. Cloud-delivered means simplified deployment, cross platform coverage for no gaps, and flexible controls to stop risky behavior. And available either as a software-as-a-service (SaaS) or managed service deployment, Digital Guardian gives deployment flexibility. Key Differentiators Digital Guardian supports both a use case-based approach (known data types or user groups) or a data risk discovery approach (identifying unknown use cases). Users can gain visibility into their data by seeing where sensitive data is located, how it flows in the organization, and where it is put at risk, all without policies. Users can benefit from rapid deployment, reduced overhead, and instant scalability. DLP coverage is available for all endpoints, browsers, and apps. Controls are able to align data protection programs with business needs. These controls include log, alert, prompt, block, and encryption. The platform can be deployed as a fully managed security service program (MSSP) with a 24/7 global analyst team. Users can discover, classify, and protect data throughout the extended enterprise via an endpoint agent that can be installed on Windows, Mac, or Linux machines or a network appliance, either physical or virtual. All data-centric events collected are reported up to the Analytics & Reporting Cloud (ARC). This web-based console, powered by AWS, correlates and analyzes system, user, and data events from endpoint agents and network appliances to provide the visibility and context to identify and remediate insider and outsider threats. Digital Guardian provides intellectual property and regulated data protection. Fidelis Fidelis Network gives a clear picture of bi-directional, encrypted traffic along with its context, all in one place. Deep Session Inspection technology extracts metadata and monitors 300+ different attributes. In addition, Fidelis can retrospectively detect and investigate threats and stop sessions that violate policies with details about who is sending and receiving data and what type of data is being sent. As an integrated feature of a larger security stack, Fidelis DLP provides increased data visibility, protects intellectual property, and ensures compliance. Key Differentiators Fidelis offers visibility into all ports and protocols. Users can analyze encrypted traffic and detect anomalies within that traffic. Fidelis enables users to inspect objects, text, and attributes buried deep in layers of applications, archives, or compression. Custom file decoders extract text and attributes from PDFs, MS Office files, etc. Decrypt for deeper analysis to detect malware on the wire, encrypted attacker communications, data theft, and insider threat; inspect; and re-encrypt traffic without slowing down network traffic. Understand whats moving across the network, how its moving, and who is seeing it. Prevent data theft or unauthorized sharing. Fidelis provides a flexible and customizable policy engine. A prevention capability is available even in real-time sensors, including prevention by hash, using partial file matching. The platform offers an extensive list of profiling in addition to data registration processes. By using profiling, Fidelis customers can sufficiently describe the data rather than painstakingly collecting the data. PII profiling is covered by a multivariate data analysis technique that detects violating data without creating huge lists. Email handling with bi-directional quarantine blocks threats coming in and sensitive data going out. Check Point Check Point Data Loss Prevention (DLP) combines technology and processes to move businesses from passive detection to active DLP. Data classification integrates user, content and process information to make accurate decisions, while UserCheck empowers users to remediate incidents in real time. Check Points network-based DLP solution frees IT and security personnel from incident handling and educates users on proper data handling policiesprotecting sensitive corporate information from both intentional and unintentional loss. Key Differentiators Deploy predefined policy in monitor mode in a few minutes. Track and control the movement of sensitive data in the organization. Stay compliant with regulations and industry standards. Educate users on proper data handling policy. Check Point has two options for securing data: Content Awareness and a full-featured DLP. Choose from 60+ or 700+ predefined data content types for PII, PCI, HIPAA, and more. Customize predefined data types or create new ones as needed. Customizable, multi-language user notifications are available. Inspect and control SMTP, FTP, HTTPS webmail, and Exchange traffic. Harmony Cloud Email Security secures Office 365 and Google Workspace applications. DLP is integrated directly into Check Point security gateways and firewalls, and they also check SSL/TLS encrypted data to prevent data loss. Clumio Clumio Protect & Discover offers backup and recovery for AWS, VMC, and Microsoft 365. It simplifies and automates AWS data protection for Amazon S3, EC2, EBS, and RDS; SQL Server on EC2; DynamoDB; VMware Cloud on AWS; and Microsoft 365. Key Differentiators Ransomware protection is offered with air-gap backups that are immutable and end-to-end encrypted. Meet compliance requirements with global policies and protection groups. Restore data in minutes with granular, one-click recovery to reduce RTO (recovery time objectives). Get real-time visibility and recommendations to reduce data risks and stay on top of AWS backup spend. Validate defined RPO (recovery point objectives) across all accounts to ensure compliance on recovery points. With all backup and recovery management and optimization in one easy-to-use place, IT teams can spend less time on AWS backup and focus more on strategic initiatives. Backups in Clumio SecureVault are stored outside of AWS accounts by default so no additional actions are needed to protect backups from malicious attacks. Clumio backups are immutable; they cannot be changed, and there is no delete button. Centralized dashboards and reports plus calendar view, global search, and browse functionalities make it easy to see data and customize protection. Lifecycle management rules allow users to automate and streamline backup plans. Trellix Trellix formed from the merger of McAfee Enterprise and FireEye remains tightly coupled with its former cloud business, Skyhigh Security, in the area of DLP. Trellix Data and User Security provides DLP features such as real-time visibility and security of data, protecting against data leakage through dynamic access adjustment, intelligent threat identification, and automated response. Key Differentiators The platform protects data everywhere. Trellix provides continuous data security from any device with multi-vector DLP. Data is deployed and updated with a zero-trust approach. Applies AI (artificial intelligence)/ML (machine learning) insights at scale to identify anomalous user behavior (UEBA), while also automating and simplifying data access policy orchestration. Trellix Data and User Security adapts across the enterprise. Threat research is combined with intelligent automation to adapt to new risks, allowing you to flexibly address ever-growing data security needs. Code42 Code42 plays in the DLP market yet believes DLP isnt the answer. Instead, it advocates a risk-based approach via its Incydr solution. It monitors all the places data lives to identify when files move outside the trusted environment. Key Differentiators Code42 prioritizes the highest risk employee activity using 60+ contextual Incydr Risk Indicators (IRIs). Watchlists allow you to programmatically protect data when files are most at risk, such as during employee departure. A range of controls are available to contain, resolve, and educate on events via Incydr Flows and SOAR. The platform acts as a cross-platform endpoint agent for Windows, Mac, and Linux. Incydr Exfiltration Detectors are available for cloud (OneDrive, Google Drive, Box), email (Office365 and Gmail), and Salesforce. Tailored views identify data exposure, training gaps, and corporate policy.non-compliance as well as measure program performance company-wide. Prioritizes the risks that need immediate attention through contextual risk scoring based on file, vector, and user characteristics and behaviors. Automates management workflows and get focused visibility into file activity for a subset of users who are more likely to put data at risk, such as departing employees. Investigates event details and custom query a comprehensive, cloud-based index of activity metadata without putting strain on employee devices. Documents and retains investigation evidence for malicious and high-impact incidents, and creates reports for key stakeholders. Forcepoint Forcepoint DLP offers tools to manage global policies across every major channel, whether it is an endpoint, network, cloud, web, or email. Predefined templates, policies, and streamlined incident management, among other features, enable organizations to address risk by bringing visibility and control where people work and data resides. Key Differentiators Meet and maintain compliance with more than 1,500 predefined templates, policies, and classifiers applicable to the regulatory demands of 83 countries. Locate and remediate regulated data with network, cloud, and endpoint discovery. Take advantage of central control and consistent policies across all channels. Coach employees to make smart decisions, using messages that guide user actions, educate employees on policy, and validate user intent when interacting with critical data. Securely collaborate using policy-based auto-encryption that protects data as it moves outside the organization. Automate data labeling and classification by integrating with third-party data classification solutions (e.g., Microsoft Azure Information Protection, Boldon James). Identify data at rest, in motion, and in use with Forcepoint DLP. Proofpoint Proofpoint Endpoint DLP takes a people-centric approach to protecting data. It provides integrated content awareness and behavioral and threat awareness, which gives granular visibility into user interactions with sensitive data. In addition, Proofpoint Endpoint DLP offers the ability to detect, prevent, and respond to data loss incidents in real time. Key Differentiators Simplifies response for data-loss incidents and out-of-policy violations. Identifies risky user behavior and sensitive data interaction. Detects and prevents insider-led security incidents and data loss from endpoints. Proofpoint Endpoint DLP extends the capabilities of the Proofpoint Information and Cloud Security platform to the endpoint. Visibility and context into user and data activity is available. Proofpoint Endpoint DLP simplifies deployment with a pure SaaS back end and lightweight endpoint agent architecture. The platform collects telemetry on user interactions with data. Read next: Best Incident Response Tools and Software The term endpoint security is often used by vendors and security professionals alike, but what is it really all about? While it might seem obvious that endpoint security by definition is all about defending endpoints, as opposed to say networks, there are many levels of nuance and technologies involved in endpoint security. In a session at the SecTor security conference in Toronto, Kurtis Armour, principal security specialist at Scalar Decisions, provided an overview of the endpoint security landscape from a penetration testers point of view. Endpoint protection technologies are intended to give organizations the ability to detect and respond to security events within their environments. How endpoints are compromised Armour said endpoints are being compromised by a variety of different methods that ultimately aim to gain some kind of foothold in a victim system. Among the most popular forms of endpoint exploits is the use of various dropper technologies, which literally drop a malicious payload on an endpoint. Droppers can be delivered via malicious files, links and macros, among other infection vectors. Endpoints are being compromised for a variety of different reasons: insufficient security controls, lack of user education, lack of patch management and lack of environment hardening. The endpoint security stack While attackers have multiple tools for exploiting endpoints, organizations also have multiple tools that can be used to make up a complete endpoint security stack, including: Endpoint protection platform (EPP) Armour said the goal of an Endpoint Protection Platform is all about preventing code execution. EPP technologies include anti-virus (AV) and anti-malware technologies that aim to block malicious code from running on endpoints. EPP can be used to block known vulnerabilities as well. EPP has expanded in recent years beyond its AV roots and can also include encryption and data loss prevention (DLP) capabilities. Endpoint detection and response (EDR) Armour said sometimes the prevention capabilities that an EPP provides arent enough, and thats where data recorders for endpoints come in as part of endpoint detection and response (EDR) platforms. EDR gives organizations the ability to see whats happening on an endpoint and enables security professionals to hunt for bad things that might be present in an environment that an EPP might not know about. Capabilities commonly found in EDR include: a recording system, behavior detection capabilities, data search, suspicious activity detection and response capabilities. If youre looking for an EDR solution be sure to try out eSecurity Planets EDR selection tool Application and process whitelisting In Armours view, application whitelisting is perhaps the number one approach used by organizations to stop file-based malware from executing in a corporate environment. Implementing application whitelisting isnt always an easy task though. Armour said organizations need to first have a strategy in place to determine what asset will be covered. Application whitelisting isnt effective for dynamic users where things change often, but Armour said it can be beneficial for static servers or point-of-sale (POS) systems that are intended to be limited to certain range of tasks. Process whitelisting is another endpoint security approach that can be highly effective. Armour noted that Microsoft Windows Device Guard feature can be used to explicitly allow process that are trusted to run, while blocking the execution of unknown, untrusted processes. Privilege management Protecting privileged accounts is a core element of endpoint security, as one of the main activities that an attacker does is steal credentials in order to gain wider access to an environment. Privileged accounts include local administrator accounts as well as domain-level accounts. Armour said that if an attacker can compromise one system in an environment and there are shared passwords across the entire organization for local admins, the attacker will be able to authenticate across the entire organization. Privilege management technologies enable organizations to limit the ability for password compromise and reuse. Vulnerability and patch management Vulnerability and patch management technologies are two different but highly related capabilities that are often tightly integrated. Armour said vulnerability management technology is used to identify unknown security vulnerabilities within an organization. Knowing that and being able to patch that information makes it so that someone cannot exploit an application or an operating system that is vulnerable to attack, he said. Patch management obviously goes hand in hand with vulnerability management. You have to be able to patch the vulnerabilities that you know about. Looking for more information on patch management? Check out the eSecurity Planet Guide to the Top 10 Patch Management solutions Operating system hardening Operating Systems such as Windows, Linux and MacOS dont always have the most secure setting on by default. Armour said there are multiple steps organizations can take to harden desktop operating systems to make it harder for attackers to compromise. Armour said hardening takes time and is specific to each corporate environment. Deception An increasingly popular endpoint security approach in recent years has been the use of deception techniques to trick attackers. With deception technologies, bogus credentials and services are presented to an attacker. When the deception services are attacked, the organization is alerted and can take additional steps to limit risks and protect the rest of their environment. Deception is used as an early indicator of threat actors in your environment, he said. Central alerting and monitoring While having the other elements of an endpoint security stack are important, Armour said that having the ability to ingest alerts from across an enterprise infrastructure is critical. If youre not looking at the entire endpoint environment, you could miss something that is happening, he said. He added that visibility into alerts from a central location is key to being able to respond in a timely fashion. Security information and event management SIEM can also play a role in monitoring, learn more in eSecurityPlanets SIEM guide The endpoint maturity model Having an endpoint security stack is one thing, but having one that properly limits risk can be another discussion altogether. Armour suggests that a comprehensive endpoint security stack needs to be comprehensively deployed. When youre looking at your endpoint security strategy, you need to cover your entire environment, he said. So make sure that you know what assets are in your organization and that youre doing an assessment, and make sure that theyre covered by your endpoint security strategy. Additionally, its important for organizations to make full use of the capabilities that are present in the endpoint security technologies that are deployed. Armour also suggests that organization get proper training and implementation support for endpoint security technologies rather than trying to do it on their own. Dont just buy something and implement it yourself, especially if its a difficult product to implement, because that is going to be a failed deployment, he said. Sean Michael Kerner is a senior editor at eSecurityPlanet and InternetNews.com. Follow him on Twitter @TechJournalist. Following the recent disclosure of a massive breach of consumer data from Equifax, researchers at Comodo and Hold Security found evidence of more security failures at the company and Bloomberg reported that Equifax suffered an additional breach in March of this year. Hold Security researchers recently discovered that the Web portal Equifax uses to manage credit report disputes from consumers in Argentina was protected by the unfortunate user name/password combination admin/admin, investigative reporter Brian Krebs reports. Accessing that portal enabled anyone to add, modify and delete user accounts, view employee user names and passwords (all of which were simply the employees first initial and last name), and view 14,000 records of consumer disputes, each of which listed the complainants DNI (Argentinas Social Security number) in plain text. To me, this is just negligence, Hold Security founder Alex Holden told Krebs. In this case, their approach to security was just abysmal, and its hard to believe the rest of their operations are much better. Another Breach Bloomberg reports that Equifax learned about another major breach back in March, almost five months before the one that was recently disclosed. While the company says the two breaches were not related, a source told Bloomberg that the two attacks involved the same intruders. Equifax said the first breach, which involved a payroll service during the 2016 tax season, was disclosed to a small number of banking customers. Its possible that breach didnt expose sensitive enough data to trigger broader notification requirements. It was previously reported that three Equifax executives sold stock soon after the discovery of the second breach Bloomberg notes that company CFO John Gamble also sold 14,000 shares worth $1.91 million on May 23, raising further questions about his awareness of the two breaches prior to his sale of company stock. Executive Access Comodo researchers recently found more than 388 records of Equifax user and employee data, including user names, titles, passwords and login URLs, for sale on the dark Web. The data includes information on several members of senior management. Equifaxs chief privacy officer, CIO, vice president of public relations and vice president of sales used all lowercase letters for their passwords, including easily guessable words like spouses names and city names. Ironically, these executives are the people that should be responsible for implementing best practices, the researchers wrote. Most systems and company policies insist on complex passwords with minimum password length and a mix of upper- and lowercase characters, combined with special characters and numerals. Simple Passwords Still, a recent Intercede survey of 100 IT decision makers in the U.K. found that 86 percent of those with sysadmin level access rights use only basic user name and password authentication to access their companies IT systems and 17 percent use simple passwords of less than eight characters with no or minimal character type variation to do so. There is some variation by industry in retail, distribution and transport, its even worse: 38 percent of those with sysadmin access use simple passwords of less than eight characters. Fifty percent of all respondents admitted business users accounts in their organizations are not very secure. Sysadmins effectively hold the keys to the kingdom, and relying on user name and password authentication is a bit like relying on a basic Yale lock to secure your front door, Intercede CEO and chairman Richard Parris said in a statement. The concept of cyber threat intelligence is really not much different from other areas of the intelligence field. In national security, intelligence gathering techniques seek to detect potential situations and draw conclusions that enable people to take action before anything serious occurs. Similarly, cyber threat intelligence is only one tool in a complete security arsenal. See our picks for top threat intelligence companies Jump to: Used well, threat intelligence can warn companies that the bad guys are active inside their network and what they are looking for the kind of advanced persistent threat that can cause great damage to an organization. Threat intelligence points out unusual patterns to look for in systems and other valuable data. But it wont stop an attack. That takes human intervention and the deployment of the right technology tools to block or at least mitigate an attack. But as time goes on, the potential threat vectors are multiplying: servers, desktops, laptops, mobile devices, and now the Internet of Things (IoT), which could open enterprises to attacks via innocuous objects such as thermostats and a myriad of other devices that contain sensors and processors. Every device large or small becomes a source for cyber threat intelligence, said Peter Tran, senior director of Worldwide Advanced Cyber Defense at RSA Security. With the Internet of Things projected to grow to over 50 billion connected devices by 2020, there is a real challenge ahead in terms of structuring effective threat analysis across massive volumes of smart connected devices. What is threat intelligence? One of the problems of the modern IT security world is the quantity of labels used to describe a technology. There is threat intelligence, advanced threat detection, and security analytics, to name a few. So what is it exactly? Cyber threat intelligence can be defined one way and another will define it differently, depending on who is using it and what solutions they provide, said Sheldon Hogarth, vice president of Business Development at Massive Alliance. Hogarth prefers to exclude internal threats and focus on whats being initiated outside of the digital infrastructure. His company, for example, offers hacker monitoring, Dark Web monitoring, chatter interception, threat actor profiling, track and capture, data dump analysis, malware testing communities and black market observation. So lets attempt to define what cyber threat intelligence includes and what it doesnt. Brian Jack, chief information security officer at KnowBe4, breaks it down into its parts: Cyber anything related to computers and the internet Threat people or things likely to have intent to cause damage Intelligence acquiring and applying knowledge or skills. Intelligence can also be defined as the collection of information of value Cyber threat intelligence is the collection and application of relevant and valuable information relating to cyber threats, said Jack. Analytics may take intelligence as an input and give you more valuable intelligence as output. Detection methods then make use of intelligence, and based on determination and classification of data, could result in additional intelligence. But detection is a different field of security. Others favor a stricter definition. Jacob Williams, founder of Rendition Infosec and a SANS Institute security instructor, insists that it is all about applying the standard intelligence lifecycle to the cyber domain. That means, he said, using intelligence collection, processing and exploitation, analysis, and dissemination to gain insight about threats to the organization that exist in the cyber domain. If youre not using models (like the cyber kill chain and the diamond model) and processes (like analysis of competing hypothesis), then youre not doing good cyber threat intelligence, said Williams. He said that as so much of this area is analyst dependent, it is critical to use structured models to show academic rigor. Structured models also improve process standardization across teams. The point is that threat intelligence is not just about buying a subscription into one of the many threat indicator feeds and applying those indicators in your environment. While that is part of the overall function, Williams said cyber threat intelligence is about applying the entire intelligence lifecycle. Stopping advanced persistent threats Cyber threat intelligence is no panacea for all security ills. But it is particularly useful for advanced persistent threats (APTs). These are attacks where an unauthorized individual gets inside and sits tight for some time. This person wants to remain hidden, and gradually initiate an attack that steals sensitive data or gains access to funds. APT attackers have a high dwell time in networks and tend to reuse tools across intrusions, said Williams. By observing the data from an intrusion in one organizations network, another organization can benefit by searching for those same indicators of compromise (IOCs). Short lived, drive-by style attacks (like ransomware), on the other hand, probably wont benefit as much from advanced threat analytics. Why? Attackers know that security software will move to block malicious IP addresses and domains quickly. So their campaigns with any specific malware variant are generally measured in short time periods as little as minutes to hours. Cyber threat intelligence cant move fast enough to operationalize this data in most cases. Advanced threat analytics Regardless of the nuances of definition, there are certain key elements of a successful advanced threat detection program. These include: The ability to rapidly extract text-based content from chatter, publications and data repositories across all open source locations, TOR, I2P and data warehouses. Strong machine learning and filtering capabilities to sift through millions of pieces of data simultaneously and in as many languages as must be covered. Quality control and removal of false positives. Human Intelligence support to rapidly engage, verify and clarify a threat once detected through automation. This is where the skilled analyst comes in. Integration with a wide variety of popular, established security platforms such as Security Information and Event Management (SIEM). Automation and information sharing, then, are vital components of the technology. Automated mitigation functions like process stopping, user quarantining and IP blocking come in the form of orchestrating processes which support threat investigation and hunting, said Joseph Blankenship, an analyst at Forrester Research. The sharing side is one that is certainly gaining traction. One recent survey found that 76 percent of IT security pros believe that threat intelligence sharing is a moral responsibility. Blankenship said this cooperative sharing has risen from necessity. Managed security service providers (MSSPs), for example, often talk about the neighborhood watch benefit of their services. The idea is that if they observe malware or malicious behavior in one customer, the MSSP can develop detection and protection for all of their customers to block the threat. Similarly, threat intelligence sharing services and feeds provide greater visibility into the threats that individual companies are seeing. And vendors are opening up their platforms for bi-directional data sharing via APIs. This reduces the analyst workload, making it faster for security pros to take action, said Blankenship. Threat intelligence tools and products For an in-depth look at the threat intelligence market, see top 8 threat intelligence companies. Indicator feeds and threat intelligence platforms (TIPs) form the backbone of threat intelligence operations. Threat indicator feeds amount to the actual threat data (malicious IP addresses, domains, file hashes, etc.) that the threat intelligence team will consume from external parties and search for in their own network. The TIP, on the other hand, is a software platform for analyzing these threat feeds. Some TIPs can help analysts enrich data through transformations (such as automatically obtaining registration data for a malicious domain). Threat intelligence platforms take advantage of security technologies such as SIEM, log management, identity and access management, security and vulnerability management, incident forensics and others, said Mohit Shrivastava, information security analyst at MarketsAndMarkets.com. Some of the products in this field are: FireEye believes the goal is not only to spot and block incursions but to reduce overall security risk. This means it must be addressed tactically, operationally and strategically. True cyber threat intelligence enables better strategic decision making, reduces operational chaos, and expands the effectiveness of your broader security infrastructure, said Nick Rossmann, FireEye iSIGHT Intelligence Senior Manager for Production. He advocates TIP, security orchestration and SIEM as essential support elements to cyber threat intelligence. Security orchestration builds intelligence into a workflow that drives an intelligence-led security practice, making it the default method of handling cases and incidents. This cuts down on confusion and risk by automating the addition of context and prioritization. SIEM backs this up via the correlation of intelligence with alerts across the network in order to facilitate the detection and understanding of security events. TIPs enable an organization to aggregate and merge multiple threat intelligence sources into a single place, then feed that intel into their different technology systems, said Rossmann. They also provide a method to pivot to related intelligence from an alert and provide metrics on how those different sources were used in your environment. Open source threat intelligence Although there are many proprietary threat intelligence platforms available, Shrivastava noted that security vendors such as Palo Alto Networks, AlienVault, and Anomali offer open source threat intelligence tools. Tran of RSA concurs. The technology backbone for cyber threat intelligence doesnt rest with just one solution but can be a mix of open and/or proprietary sources, said Tran. Williams goes so far as to recommend that organizations try an open source TIP before investing in a commercial offering. Find out what features you really need, what you dont, and then shop for a platform, he said. Focus on people and process first and then adopt technologies that effectively augment their workflow. Avoid technology overreliance Study after study points out that too many organizations are over reliant on threat intelligence tools or feeds and lack the in-house skilled security analysts and data scientists to effectively harness the information. As a result, most enterprises fail to use threat data effectively to pinpoint cyber threats. Advanced threat detection, then, must encompass cyber threat intelligence training, as well as the hiring of top talent. Cyber threat intelligence must be supported minimally by certified data analysts who are familiar with a wide range of open source investigation tools, data logic and investigatory skills, said Hogarth. The goal is to view and intercept threats in near real time by seeing them through the threat actors eyes. His company, Massive Alliance, has all its senior analysts certified through UKs MI5. Williams of Rendition Infosec advised those seeking to improve their advanced threat analytics effectiveness to look for security and technology certification, academic rigor and real-world results. Just as a good rifle makes some soldiers deadlier than others, so do cyber threat intelligence tools, said Williams. Technology enables the mission, but people and process make it happen. Distributed denial-of-service (DDoS) attacks occur when attackers use a large number of devices to attempt to overwhelm a resource and deny access to that resource for legitimate use. Most commonly, we see DDoS attacks used against websites, applications, or services exposed to the internet, but DDoS attacks can also be applied against specific computers, gateways, or internal network resources. The very first DDoS attacks occurred when network engineers misconfigured networks and overwhelmed components by accident. Hackers soon developed ways to use DDoS for hacktivism, revenge, pranks, or criminal activity. Vendors that stop huge DDoS attacks are quick to claim credit and bask in the positive attention it brings to their services. Several record-setting DDoS attacks recently made the news: To understand the distinctions between these events and other DDoS events, we need to understand more about the types of DDoS attacks and their methods. Attacks can be performed at every OSI Layer, but most attackers use a mix of methods to make their attack more difficult to stop. Also read: What are the Main DDoS Attack Types? Even the specific DDoS tactics themselves can fall into gray zones that defy clean categorization because of how they are used. However, DDoS attacks can usually be generalized into three categories of attack: Those three classifications contain dozens of DDoS attack types, such as UDP, ICMP, IP, TCP and HTTP flood attacks and their variants. We cover the categories and attack types in depth below. Volumetric DDoS Attacks Volumetric DDoS attacks attempt to overwhelm the resources capacity. Servers will be overwhelmed with requests, networks will be overwhelmed with traffic, and databases can be overwhelmed with calls. On the internet, a DDoS attack seeks to saturate an attacked sites bandwidth, and the attack magnitude is typically measured in bits per second. Volumetric DDoS examples include: UDP Flood attacks The User Datagram Protocol (UDP) does not establish a two-way session with a server. Instead, UDP simply sends data packets without waiting for a reply. This characteristic provides the perfect setup for flood attacks that attempt to send enough packets to overwhelm a host that is listening to its ports for genuine UDP traffic. Attackers know that upon receiving a UDP packet at any port, the server must check for an application that corresponds to that port, and the protocols will trigger automatic processes within the server. Attackers target servers on the internet or within a network specifically through the IP address and port embedded in the UDP packets. The attack seeks to overwhelm the server with that process request or consome the bandwidth of the network. Specific UDP Flood Attacks can use: Domain Name Service (DNS) Network Time Protocol (NTP) Simple Service Discovery Protocol (SSDP) Media data such as audio or video packets Voice over IP (VoIP) telephone packets NetBIOS Peer-to-peer (P2P) networks like BitTorrent or Kad packets Simple Network Management Protocol (SNMP) Quote of the day (QOTD) Video game specific protocols like Quake and Steam Variants of the UDP Flood attack include: UDP Fragmentation Flood: This variation of the UDP Flood attack sends larger, but fragmented packets to the victim server. The server will attempt to assemble the unrelated, forged, and fragmented UDP packets and may become overwhelmed in the process. This variation of the UDP Flood attack sends larger, but fragmented packets to the victim server. The server will attempt to assemble the unrelated, forged, and fragmented UDP packets and may become overwhelmed in the process. Specific UDP Amplification Attacks: Instead of using a large number of compromised devices, attackers can send a legitimate UDP request to a large number of legitimate servers with the victim server as a spoofed IP address. The responses from these legitimate servers suddenly overwhelms the targeted device. Protocols often used in amplification attacks include: NTP, SNMP, and SSDP. CharGEN Flood Developed in 1983, the CharGEN protocol was intended for use in debugging, measuring, and testing. A requesting server triggers the protocol by sending a Transmission Control Protocol (TCP) or UDP request via port 19. The receiving device then responds to the server via the same protocol with: Replies via TCP with arbitrarily generated characters Replies via UDP with random numbers The sending device discards any received information from the host server. Attackers spoof the IP address of the target server and send a flood of requests to internet-enabled devices that run CharGEN, such as printers and copiers. These devices then respond to the request and bombard the server with port 19 traffic. If the firewall does not block port 19, then the server can become overwhelmed with trying to analyze and respond to the random traffic. ICMP (Ping) Flood The Internet Control Message Protocol consists of specific error messages and operational information commands sent between network devices such as Time Stamp, Time Exceeded error, Echo Request, and Echo Reply. Echo Request and Echo Reply combine to make the ping command. Attackers use a large number of devices to flood servers with spoofed Ping packets without waiting for replies. The protocol requires the server to receive the requests as well as respond to them which consumes both incoming and outgoing bandwidth. ICMP Fragmentation Flood A variant of the ICMP Flood attack, the ICMP Fragmentation Flood sends fragmented ICMP packets instead of fully formed commands. The victim server attempts to reconstruct valid commands from the spoofed ICMP packets and will exhaust resources attempting to make connections between intentionally unrelated fragments. Misused application attack In misused applications attacks, hackers compromise existing high-traffic applications on legitimate servers such as P2P servers. The traffic from one or more compromised machines then will be redirected to the victim server, and the hacker will exit the system and allow it to work autonomously. Since the compromised application is attempting to make a valid connection with properly formed packets, most defensive tools will allow the connection. The victim server simply will be overwhelmed with the surge in traffic. Protocol DDoS Attacks Instead of strictly using sheer volume, protocol DDoS attacks abuse protocols to overwhelm a specific resource, usually a server but sometimes firewalls or load balancers. These attacks will often be measured in packets per second. IP Null attack All packets conforming to Internet Protocol version 4 contain headers that should specify if the transport protocol used for that packet is TCP, ICMP, etc. However, attackers can set the header to a null value, and without specific instructions to discard those packets, the server will consume resources attempting to determine how to deliver those packets. TCP Flood attacks The Transmission Control Protocol requires three communication sequences to establish a connection: SYN: The requesting device (endpoint or server) sends a synchronized sequence number in a packet to a server or other destination device (endpoint). The requesting device (endpoint or server) sends a synchronized sequence number in a packet to a server or other destination device (endpoint). SYN-ACK: The server responds to the SYN packet with a response consisting of the synchronized sequence number plus an acknowledgement number (ACK). The server responds to the SYN packet with a response consisting of the synchronized sequence number plus an acknowledgement number (ACK). ACK: The requesting device sends a response acknowledgement number (original ACK number + 1) back to the server. Transmission is ended through a four-part termination sequence consisting of: FIN: The requesting device sends a session termination request (FIN) to the server. The requesting device sends a session termination request (FIN) to the server. ACK: The server responds with an ACK response to the requesting device, and the requesting device will wait to receive the FIN packet. The server responds with an ACK response to the requesting device, and the requesting device will wait to receive the FIN packet. FIN: The server responds with a FIN packet (may be nearly simultaneous) to the requesting device. The server responds with a FIN packet (may be nearly simultaneous) to the requesting device. ACK: The requesting device returns a final ACK response to the server, and the session is closed. When servers receive an unexpected TCP packet, the server will send a RST (reset) packet back to reset the communication. Flood attacks abusing the TCP protocol attempt to use malformed TCP transmissions to overwhelm system resources. SYN Flood: The attacker sends many SYN request packets either from a spoofed IP address or from a server set up to ignore responses. The victim server responds with SYN-ACK packets and holds open the communication bandwidth waiting for the ACK response. The attacker sends many SYN request packets either from a spoofed IP address or from a server set up to ignore responses. The victim server responds with SYN-ACK packets and holds open the communication bandwidth waiting for the ACK response. SYN-ACK Flood: Attackers send a large number of spoofed SYN-ACK responses to the victim server. The targeted server will tie up resources attempting to match the responses to non-existent SYN requests. Attackers send a large number of spoofed SYN-ACK responses to the victim server. The targeted server will tie up resources attempting to match the responses to non-existent SYN requests. ACK Flood: Attackers send a large number of spoofed ACK responses to a server, which will tie up resources attempting to match the ACK response with non-existent SYN-ACK packets. The TCP PUSH function can also be used for this type of attack. Attackers send a large number of spoofed ACK responses to a server, which will tie up resources attempting to match the ACK response with non-existent SYN-ACK packets. The TCP PUSH function can also be used for this type of attack. ACK Fragmentation Flood: A variation of the ACK Flood attack, this method uses fragmented packets of the maximum size of 1,500 bytes to abuse the maximum IP packet length of 65,535 bytes (including the header). When servers and other resources such as routers attempt to reconstruct the fragmented packets, the reconstruction exceeds the allocated resources and can cause memory overflow errors or crash the resource. A variation of the ACK Flood attack, this method uses fragmented packets of the maximum size of 1,500 bytes to abuse the maximum IP packet length of 65,535 bytes (including the header). When servers and other resources such as routers attempt to reconstruct the fragmented packets, the reconstruction exceeds the allocated resources and can cause memory overflow errors or crash the resource. RST/FIN Flood: Attackers use spoofed RST or FIN packets to flood servers and consume resources with attempts to match the packets to non-existent open TCP sessions. Attackers use spoofed RST or FIN packets to flood servers and consume resources with attempts to match the packets to non-existent open TCP sessions. Multiple ACK Spoofed Session Flood: In this variation attackers send multiple ACK packets followed by RST or FIN packets to more thoroughly mimic actual TCP traffic and fool defenses. Of course, the packets are spoofed, and the server will consume its resources trying to match the fake packets with non-existent open TCP sessions. In this variation attackers send multiple ACK packets followed by RST or FIN packets to more thoroughly mimic actual TCP traffic and fool defenses. Of course, the packets are spoofed, and the server will consume its resources trying to match the fake packets with non-existent open TCP sessions. Multiple SYN-ACK Spoofed Session Flood: This variation uses multiple SYN and ACK packets also followed by RST or FIN packets. As with the Multiple ACK Spoofed Session Flood, the spoofed packets attempt to mimic legitimate TCP traffic and waste server resources with attempts to match fake packets to legitimate traffic. This variation uses multiple SYN and ACK packets also followed by RST or FIN packets. As with the Multiple ACK Spoofed Session Flood, the spoofed packets attempt to mimic legitimate TCP traffic and waste server resources with attempts to match fake packets to legitimate traffic. Synonymous IP Attack: To execute this method, attackers spoof SYN packets that use the victim servers IP address for both the source and destination IP address of the packet. The nonsense packet then consumes resources as the server attempts to either respond to itself (AKA: local area network denial, or LAND, attack) or resolve the contradiction of receiving a packet from itself related to open communication with itself for TCP sessions that it cannot match. Session attack Attackers do not have to use spoofed IP addresses or spoofed packets to conduct a DDoS attack. A session attack uses a number of bots to meet or exceed the source IP range and initiates legitimate TCP sessions with the target server. The legitimate TCP session from real IP addresses avoids DDoS detection, but the attack then delays ACK packets to chew up bandwidth and exhaust resources to maintain the empty sessions. Slowloris Similar to the session attack, the Slowloris attack attempts to consume server resources with empty communication. For this attack, the attackers send partial HTTP requests to a web server to hold open as many sessions as possible for as long as possible. These attacks use very little bandwidth and can be difficult to detect. Ping of Death The Ping of Death attack abuses the maximum IP packet length of 65,535 bytes (including the header) in a fashion similar to the ACK Fragmentation Flood. Since the maximum frame size for sending data across an Ethernet network typically will be set at 1,500 bytes, the attackers will send multiple IP fragments that comply with the Ethernet limitation, but that will assemble into a packet that exceeds the maximum IP packet length. As the recipient computer reassembles the IP fragments, it can overflow memory buffers assigned to the packet or crash the computer. Smurf attack The malware program called Smurf exploits the IP and ICMP protocols to send a large number of spoofed ICMP ping requests to the broadcast address of a router with the IP address of the target device. Every device on the network responds to the ping request and may overwhelm the receiving device. Since 1999, most routers do not forward packets sent to the broadcast address by default, and this attack is not as effective. Fraggle attack Fraggle attacks are a variation of the Smurf attack that spoof UDP packets instead of ICMP packets to overwhelm the victim computer with traffic by targeting the broadcast address of a network router. Every device on the network responds to the UDP requests and may overwhelm the receiving device. By default, most modern routers since 1999 do not forward packets sent to the broadcast address, which reduces the effectiveness of this attack. Low Orbit Ion Cannon (LOIC) The Low Orbit Ion Cannon open-source software was designed to be a network stress-testing tool that sends a large number of packets (UPD, TCP, HTTP) to a target device. Unfortunately, attackers deploy this attack to botnets and use it to execute DDoS attacks. High Orbit Ion Cannon (HOIC) The High Orbit Ion Cannon application replaced the Low Orbit Ion Cannon with a publicly available application that can submit a large number of GET and HTTP POST requests to up to 256 different domains at the same time. HOIC can be more powerful and disruptive than LOIC when used by malicious attackers. Application DDoS Attacks Application DDoS attacks target vulnerabilities in applications to cause the application itself to fail. Unlike other attacks that focus on disrupting infrastructure, this attack focuses on the Layer 7 software. However, it can also result in overloaded CPUs or exhausted memory, which affect the server and other applications. The magnitude of an application DDoS attack is measured in requests per second. For example, computationally heavy processes, such as adding an item to a shopping cart or proceeding to checkout, can be abused with many concurrent requests to overwhelm the programs limits or the host computers resources. Other attacks target specific vulnerabilities in software or use SQL injections to disrupt databases. Application DDoS attacks with specific names include: HTTP Flood attacks HTTP Flood attacks abuse the HTTP commands to attempt to overwhelm websites, the servers that host them, and the bandwidth used to reach them. The bots used in these attacks can send multiple requests in sequence, so the large number of machines in the botnet exponentially increase traffic for the target website. GET Attacks: Attackers use a botnet to send a large number of concurrent GET requests for large files such as large PDF files or videos. Attackers use a botnet to send a large number of concurrent GET requests for large files such as large PDF files or videos. POST Attacks: A large number of bots send a large number of concurrent POST requests containing large files for storage on the target server. A large number of bots send a large number of concurrent POST requests containing large files for storage on the target server. Low-and-Slow POST Attacks: Often performed using the R-U-Dead-Yet? (R.U.D.Y.) tool, attackers send HTTP Post requests that indicate they will send large amounts of data but then send tiny bits of data very slowly. The attack avoids DDoS defenses looking for large volume attacks and ties up resources on the server. Often performed using the R-U-Dead-Yet? (R.U.D.Y.) tool, attackers send HTTP Post requests that indicate they will send large amounts of data but then send tiny bits of data very slowly. The attack avoids DDoS defenses looking for large volume attacks and ties up resources on the server. Single Session or Single Request Attack: Many anti-DDoS defenses now block large numbers of incoming packets, so attackers instead exploit a loophole in HTTP 1.1 to include many different requests within a single HTTP packet. Many anti-DDoS defenses now block large numbers of incoming packets, so attackers instead exploit a loophole in HTTP 1.1 to include many different requests within a single HTTP packet. Fragmented HTTP Flood: Instead of sending large numbers of valid requests, botnets establish valid HTTP connections and can split the HTTP packets into tiny fragments sent as slowly as the server will allow. This form of low-and-slow attack uses a packet rate that appears to be safe for many DDoS defenses, but the software or server keeps the session active and consumes resources with reserved bandwidth. The Slowloris tool enables this type of attack. Instead of sending large numbers of valid requests, botnets establish valid HTTP connections and can split the HTTP packets into tiny fragments sent as slowly as the server will allow. This form of low-and-slow attack uses a packet rate that appears to be safe for many DDoS defenses, but the software or server keeps the session active and consumes resources with reserved bandwidth. The Slowloris tool enables this type of attack. Recursive GET Flood: Attackers attempt to overwhelm servers by requesting long lists of pages or images. The attack appears to be normal browsing behavior, but the botnet simply is chewing up resources that now cannot be used for legitimate traffic. Attackers attempt to overwhelm servers by requesting long lists of pages or images. The attack appears to be normal browsing behavior, but the botnet simply is chewing up resources that now cannot be used for legitimate traffic. Random Recursive GET Flood: A variant of the Recursive GET Flood, this attack randomizes the requested pages to avoid detection. ReDoS The regular expression denial-of-service attempts to request algorithmically highly complex search patterns that waste resources or even cause crashes to the system. Other DDoS Attack Types Advanced persistent DoS (APDoS) APDoS is an attack type used by hackers who want to cause serious damage. It uses a variety of the styles of attacks, such as HTTP flooding, and SYN flooding, and regularly targets multiple attack vectors that send out millions of requests per second. APDoS attacks can last for weeks, largely due to the ability of the hacker to switch tactics at any moment and to create diversions to elude security defenses. Multi-vector attacks Attackers can deploy many concurrent attacks to cause DDoS. For example, an attacker might use a volumetric attack to distract defenders while simultaneously executing a low bandwidth HTTP Flood attack from a different botnet. Zero-day DDoS attacks Attackers may discover undisclosed vulnerabilities for applications, protocols, or hardware and execute a DDoS attack. When exploiting a new vulnerability, the attack is a zero-day attack. Stopping and Preventing DDoS Attacks A wide variety of resources can be vulnerable to an even wider variety of DDoS attacks. Security and operations teams need to work together to balance the accessibility and performance of the resource against its security and risks. Redundancy will be critical for defense and recovery from DDoS attacks, but dedicated attackers have been known to attack multiple web servers simultaneously, so load balancers and redundancy will be insufficient. The defense against these attacks requires an overlapping and supporting combination of device hardening, redundancy, anti-DDoS tools, and anti-DDoS services and perhaps the support of a DDoS prevention and response service. Read next: WASHINTON, D.C. - The sixth annual Golden Goose Award ceremony will recognize three teams of scientists whose silly-sounding research has returned serious benefits to society. Led by the American Association for the Advancement of Science, the award committee includes several science societies and organizations and Congressional supporters. Note: Media are welcome to attend the September 27 evening award ceremony at the Library of Congress. Please RSVP to media@aaas.org. Video footage of each of the winners is available. The 2017 Golden Goose Award winners are: The Sea Soy Solution Kaichang Li Ever wonder how mussels stick so well to varied and rough surfaces while submerged in water? Oregon State University wood chemist Kaichang Li did, and they inspired him to develop a patented soy-based adhesive for plywood, with support from the U.S. Department of Agriculture. Beginning in 2003, Columbia Forest Products worked with Li to commercialize his bio-inspired manufacturing invention, and by 2006 the company had converted all of its plants away from formaldehyde-based adhesiveswhose emissions are known to cause cancerto this new, soy-based glue. Since then, approximately 60 percent of the plywood and veneer industry has followed suit. The partnership between Kaichang Li and Columbia Forest Products shows the important relationship between the free market and scientific research, said Rep. Charlie Dent (R-PA). As a result of this partnership and federal grant money, Li developed a biologically-inspired glue for plywood, fulfilling consumer demand for a biodegradable but equally as effective product. Funding such research is crucial for scientists like Li, who allow their curiosity in the natural world around them to inspire their scientific research into practical inventions for the private sector. The Silence of the Frogs Joyce Longcore, Elaine Lamirande, Don Nichols, and Allan Pessier Joyce Longcore spent her career toiling in relative obscurity until one day two veterinary pathologists from the National Zoo in Washington, D.C. contacted her. At the time, she was one of just a few people in the world who could have answered their question: What is killing so many of our frogs? Decades of mysterious animal deaths had led to this point, when Longcores lifelong dedication to the study of an obscure branch of the tree of life chytrid fungi would prove crucial to unlocking the mystery of mass die-offs of amphibians around the globe. Thanks to her work with Allan Pessier, Don Nichols, Elaine Lamirande and many colleagues around the world, today we know that fungal infections have the potential to move great distances rapidly, assisted by human movement. Their insights have led to changes in national policies on how animals are moved around the globe and even helped us save iconic species from extinction. Fuzzy Logic, Clear Impact Lotfi Zadeh It often seems that were surrounded by fuzzy logic. We are. Fuzzy logic and fuzzy sets were the brainchild of Lotfi Zadeh, who worked for many years as a computer science professor at the University of California, Berkeley. With support from the Air Force Office of Scientific Research and the National Science Foundation, Zadeh proposed these revolutionary concepts in 1965 to deal with the mathematics and logic of imprecise information, receiving a skeptical response and howls of complete nonsense. He even drew the attention of Senator William Proxmire and the infamous Golden Fleece Award. But since the concepts debut, the original research paper has become one of the most widely cited in history, used in more than 16,000 patents and applied to efficiency improvements for HVAC systems, healthcare devices and more. This award recognizes Zadehs significant contributions to society posthumously. The Golden Goose Award reminds us why politicians must leave scientific research to the scientists, said Jim Cooper (D-TN). This years winners prove how obscure and even unbelievable studies can change the world as we know it. We must continue to support our scientists whose brilliance and ingenuity keep America the greatest nation on earth. AAAS is proud to support the Golden Goose Award, which highlights scientific success stories that would not have been possible without federal funding, said Rush Holt, chief executive officer of AAAS. These scientists have changed the world in unpredictable ways, and we applaud their curiosity, their tenacity and their achievements. About the Golden Goose Award The Golden Goose Award honors scientists whose federally funded work may have been considered silly, odd or obscure when first conducted, but has resulted in significant benefits to society. In 2012, a coalition of business, university and scientific organizations created the Golden Goose Award, conceived by Rep. Jim Cooper (D-TN) as a strong counterpoint to criticisms of basic research as wasteful federal spending such as the late Sen. William Proxmires (D-WI) Golden Fleece Award. Learn more about the award, including past winners and supporters: www.goldengooseaward.org. Awardee Contact Information Kaichang Li kaichang.li@oregonstate.edu Joyce Longcore longcore@maine.edu Elaine Lamirande elamirande@niaid.nih.gov Don Nichols nicholsdvm@aol.com Allan Pessier pessier@vetmed.wsu.edu Photos of the award recipients can be found below. Lotfi Zadeh Allan Pessier Don Nichols Elaine Lamirande Joyce Longcore Kaichang Li SAN DIEGO, September 25, 2017 - For certain patients with oropharyngeal cancer caused by the human papilloma virus (HPV), an aggressive reduction of radiation therapy after surgery may provide excellent cancer control while simultaneously reducing post-treatment side effects, improving quality of life and lowering treatment costs, according to research presented today at the 59th Annual Meeting of the American Society for Radiation Oncology (ASTRO). Patients in the phase II clinical trial received half the standard radiation dose but achieved equally high cure rates at two years following treatment. Standard treatment for oropharyngeal squamous cell carcinoma (OPSCC) can include surgery to remove the cancer followed by radiation therapy with or without chemotherapy. While cure rates are excellent following therapy, treating the sensitive throat and neck regions often causes serious and potentially life-altering side effects. Quality of life considerations have become even more salient in the past several decades, as today's average OPSCC patient is younger and will live a longer time with any side effects of treatment. Between 1988 and 2004, the rates of HPV?associated OPSCC more than doubled, while the rates of HPV?negative disease--which is typically caused by smoking and alcohol consumption--dropped by half. HPV-related disease also is biologically more responsive to radiation and chemotherapy, leading to high cure rates for these patients. "The profile of the typical oropharynx cancer patient has changed, which means that our approach to treating this disease needs to change, as well," said Daniel Ma, MD, lead author of the study and an assistant professor of radiation oncology at the Mayo Clinic in Rochester, Minnesota. "Several research groups are pursuing an incremental approach to de-escalating treatment, such as using 15 percent less radiation dose. Our trial took a different approach--testing whether we could cut the dose by half. Our findings indicate that this more aggressive approach toward treatment reduction can be viable for appropriately selected patients." MC1273 was a single-arm phase II trial for HPV-related OPSCC testing clinical outcomes and quality of life with a de-escalated course of radiation therapy following surgery to remove the disease. Patients received two weeks of twice-daily radiation therapy to the oropharynx for a total dose of 30-36 Gray (Gy), a 50 percent reduction of the standard radiation dose of 60-66 Gy. Patients also received two courses of chemotherapy (docetaxel 15 mg/m2), delivered on days one and eight. The 43 patients with extracapsular extension (ECE), a marker of particularly aggressive disease, received an additional, simultaneous radiation boost to the areas with ECE, for a total dose (including primary treatment) of 36 Gy. Eighty patients were accrued between September 2013 and June 2016 with all patients completing treatment. Eligible patients included those with HPV-related OPSCC who had no evidence of residual disease following surgery and a minimal smoking history (e.g., less than one pack per day for 10 years or less). The median patient age was 60.5 years (range 25-77 years). All patients had stage III or IV disease. The median follow-up for this report was 24 months (range 12-46 months). At a median follow-up of two years after de-escalated treatment, the rate of tumor control in the oropharynx and surrounding region was 95 percent. Of the 80 patients in the trial, three experienced a local recurrence and one patient experienced a regional recurrence. Disease-free survival (DFS) following the dose-reduced treatment was 89 percent. By comparison, the RTOG 0234 clinical trial reported a two-year DFS rate of 86.4 percent for patients with HPV-related cancers. Grade 2 or higher side effects were reported in one percent of patients at one year following treatment and ten percent at two years following treatment. By comparison, studies of adjuvant radiation for OPSCC generally report rates of late grade 2 or higher side effects at more than 50 percent (e.g., 55% on RTOG 0234). No patients had grade 3+ toxicity at one year or two years following treatment. Fourteen patients (18%) experienced cumulative grade 3+ toxicity within three months of treatment; all instances resolved by six months post-treatment. One additional patient experienced a temporary grade 4 event related to a chemotherapy reaction. Patients' ability to swallow improved slightly at one year following radiation therapy compared to pre-treatment (p = 0.03). Swallowing function was measured using the Modified Barium Swallow Impairment Profile (MBSImP). Importantly, no patients needed to have a feeding tube placed during treatment. Patient's quality of life largely improved or did not change following treatment, except for dry mouth. Patients reported somewhat worse salivary flow following treatment (p < 0.0001), as measured by the University of Michigan's Xerostomia QOL scale (XeQOLS). However, none of the other quality of life scales declined significantly--including the Functional Assessment of Cancer Therapy - Head and Neck Version 4 (FACT H&N), the EuroQol EQ-5D and the European Organisation for Research and Treatment of Cancer instrument for head and neck cancer (EORTC-HN). Each measure was assessed prior to radiation therapy and again at one, three, 12 and 24 months following treatment. "Side effects with dose-reduced treatment were dramatically less than what we usually see in treatment of adjuvant radiation therapy for oropharynx cancer. For example, no patients in this trial needed a feeding tube placed, whereas close to a third of patients had feeding tubes placed with traditional doses on other recent clinical trials," explained Dr. Ma. "The shorter course of treatment also has practical value for patients. If a patient has 20 twice-daily sessions instead of 30 daily treatment sessions, their financial cost is reduced by a third, and time away from work or family is reduced by a third--but the likelihood of cure remains the same." While the results are promising, Dr. Ma emphasized that findings from a randomized study directly comparing the dose-reduced treatment with traditional treatment are needed before the new approach can be adopted widely. "These results will require confirmation in a randomized trial, and this treatment approach should be considered investigational until confirmed in a phase III study, such as the ongoing multi-institutional DART-HPV trial that is currently open for patient accrual," he said. ### The abstract, "Two-year results for MC1273, a phase II evaluation of aggressive dose de-escalation for adjuvant chemoradiation in HPV+ oropharynx squamous cell carcinoma (OPSCC)," will be presented in detail during a news briefing and the late-breaking abstracts special session at ASTRO's 59th Annual Meeting in San Diego (full details below). To schedule an interview with Dr. Ma and/or outside experts in head and neck cancer, contact ASTRO's media relations team on-site at the San Diego Convention Center September 24 through 27, by phone at 703-286-1600 or by email at press@astro.org. ATTRIBUTION TO THE AMERICAN SOCIETY OF RADIATION ONCOLOGY (ASTRO) ANNUAL MEETING REQUESTED IN ALL COVERAGE. This news release contains additional and/or updated information from the study author(s). Full original abstract and author disclosures available from press@astro.org or at http://www.astro.org/annualmeeting. Study Presentation Details News Briefing: Monday, September 25, 11:00 a.m. - 12:00 p.m. Pacific time, San Diego Convention Center, room 24C, webcast: http://www.bit.do/astro17-2 Scientific Session: Tuesday, September 26, 7:45 - 9:15 a.m. Pacific time, San Diego Convention Center, room 5A Resources on Head and Neck Cancer and Radiation Therapy Digital brochure: Radiation Therapy for Head and Neck Cancer Videos: Radiation Therapy for Head and Neck Cancer (Spanish version), An Introduction to Radiation Therapy (Spanish version) Additional brochures, videos and information on radiation therapy from ASTRO's patient site, RTAnswers.org ASTRO's clinical practice statements and guidelines ABOUT ASTRO'S ANNUAL MEETING ASTRO's 59th Annual Meeting, the world's largest scientific meeting in radiation oncology, will be held September 24-27, 2017, at the San Diego Convention Center. The 2017 Annual Meeting is expected to attract more than 11,000 attendees from across the globe, including oncologists from all disciplines and members of the entire radiation oncology team. More than 2,800 abstracts sharing results from clinical trials and other research studies will be presented in conjunction with educational sessions and keynote addresses that underscore the meeting's theme, "The Healing Art and Science of Radiation Oncology." Led by ASTRO President Brian Kavanagh, MD, MPH, FASTRO, the 2017 meeting will feature keynote addresses from Richard D. Zane, MD, FAAEM, Chief Innovation Officer for the University of Colorado Health System; Lucy Kalanithi, MD, FACP, widow of Paul Kalanithi, MD, the best-selling author of "When Breath Becomes Air," with Heather Wakelee, MD, Paul's oncologist; and Vinay K. Prasad, MD, MPH, an assistant professor of medicine at the Oregon Health & Science University. During the four-day meeting, more than 200 exhibitors will demonstrate cutting-edge technology and medical device innovations for radiation oncology. Visit us online for more information about ASTRO's 59th Annual Meeting or press opportunities at the meeting. ABOUT ASTRO The American Society for Radiation Oncology (ASTRO) is the world's largest radiation oncology society, with more than 10,000 members who are physicians, nurses, biologists, physicists, radiation therapists, dosimetrists and other health care professionals who specialize in treating patients with radiation therapies. The Society is dedicated to improving patient care through professional education and training, support for clinical practice and health policy standards, advancement of science and research, and advocacy. ASTRO publishes three medical journals, International Journal of Radiation Oncology * Biology * Physics Practical Radiation Oncology and Advances in Radiation Oncology ; developed and maintains an extensive patient website, RT Answers ; and created the Radiation Oncology Institute , a nonprofit foundation to support research and education efforts around the world that enhance and confirm the critical role of radiation therapy in improving cancer treatment. To learn more about ASTRO, visit http://www.astro.org and follow us on our blog, Facebook and Twitter. A 45 year old woman developed a serious life threatening condition after having liposuction, reveal doctors in the journal BMJ Case Reports. The condition, known as fat embolism syndrome (FES), is a rare but very serious complication of liposuction in which fat travels through the body and blocks blood vessels, but it is notoriously difficult to recognise and diagnose. The authors stress that liposuction is generally a safe procedure, but as its popularity grows, it is important for doctors to consider a diagnosis of FES, especially in patients with underlying risk factors, such as high body mass index (BMI) and fluid retention (lymphoedema). Shortly after the procedure, the woman became drowsy and confused and had a high heart rate. Her condition worsened as she was transferred to intensive care where the doctors suspected that she had dangerously low oxygen levels in her body (acute respiratory distress syndrome). After further tests, the doctors realised that her symptoms pointed to FES. The woman remained in hospital and was given oxygen and drugs to help with her heart rate and her breathing. She was discharged from hospital after 14 days and on her check up, she had recovered well. "FES is a difficult condition to initially diagnose," say the authors. "What makes it even harder is the lack of a standardised set of diagnostic criteria to assist the clinician in making the diagnosis." Although still a rare condition, "this article emphasises the importance of thinking outside the box and how to identify and manage such a life threatening complication," they conclude. ### BINGHAMTON, NY - People who are presented with political statements contradictory to their own beliefs tend to think harder and produce better arguments, according to research from Binghamton University, State University of New York. Cengiz Erisen, a research associate in the Center on Democratic Performance at Binghamton University, along with fellow researchers David Redlawsk (University of Delaware) and Elif Erisen (Hacettepe University), looked at the effects of presenting people with information that conflicted with their political ideologies. The researchers recruited 541 subjects from the Amazon crowdsourcing marketplace Mechanical Turk who leaned either liberal or conservative politically. They introduced the subjects to statements from a mock political candidate on the topics of illegal immigration, economic crisis and the nuclear pursuits of Iran. Half of the subjects were presented with statements incongruent with their political beliefs (e.g. conservatives were given liberal statements) and the other half were given statements in line with their beliefs. Subjects were then asked to share their supporting thoughts and opposing thoughts on the candidate's statements. The results showed that incongruent information significantly alters how people think about politics. The researchers found that, far from convincing people to change their minds, the new information reinforced their existing beliefs and actually made people think longer and harder, and with more in-depth arguments, about how they defended them. "Our robust findings...suggest that resisting a counter view or supporting one's own ideological viewpoint triggers deeper and more effortful information processing, leading to recall from memory of more thoughts and rationales and recognition of different dimensions of the issue," said Erisen. "This might be telling us something about the nature of motivated reasoning: people resist other political views not by few narrow-minded utterances blaming or downgrading the 'other'; they put effort into constructing opposing thoughts that are rich in content and volume. Whether they are opposing the counter ideological statement or supporting a statement in line with their own ideology, people produce thoughts of better quality when they defend their views." Erisen believes that policymakers need to be aware of the results of the rhetoric they use. "The more they disregard the other side or oppose the contradictory or opposing policy statement, the public will follow that. The less exchange of information, the more the conflict will be," he said. ### The paper, "Complex Thinking as a Result of Incongruent Information Exposure," was published in American Politics Research. On Feb. 11, 2016, an international team announced the first direct detection of gravitational waves. These tiny ripples in spacetime, produced by the final spinning 'dance' of two black holes on the point of merging, were captured on 14 September 2015 by the twin LIGO detectors located in the US. It required several months of analyses by the scientists at LIGO and their colleagues in the Virgo collaboration (formed around the eponymous European detector) to confirm the existence of gravitational waves, a century after they were predicted by Albert Einstein in his general theory of relativity. Today, by awarding two Gold Medals to Thibault Damour and Alain Brillet, the CNRS pays tribute to the excellence of the theoretical and instrumental work that made this direct detection possible. Alain Brillet, one of the fathers of the Virgo detector Born on 30 March 1947 at Saint-Germain-en-Laye (France), Alain Brillet received his engineering degree from ESPCI in 1970. He joined the CNRS the same year as a research engineer at the Laboratoire de l'Horloge Atomique in Orsay, where he defended his doctoral thesis in 1976. Once back in France after a post-doctorate in the team of John Hall (2005 Nobel Prize in Physics) in Boulder (Colorado, USA), he was appointed senior researcher by the CNRS in 1982. Together with the Italian scientist Adalberto Giazotto, he devoted himself to the design and development of the Virgo gravitational wave detector, now installed at Cascina, near Pisa (Italy). From 1989 to 2003, he first headed and then jointly led the consortium formed around this major instrument. From 2008, he devoted his time to the design of the optics and laser system of Advanced Virgo, a next-generation detector. He is currently senior researcher emeritus at the CNRS, assigned to the Artemis laboratory (CNRS/Universite Nice Sophia Antipolis/Observatoire de la Cote d'Azur). Brillet is a Knight of the Legion of Honor (2005) and in 2016 was awarded the Ampere Prize of the French Academy of Sciences for his work. As a member of the LIGO-Virgo collaboration, he also received the Special Breakthrough Prize in Fundamental Physics. From the beginning of his career, Brillet focused on lasers stabilized to atomic or molecular references, a subject that was at that time completely new in France, with the aim of establishing ultra-stable frequency and length standards. As early as 1970, thanks to his exceptional experimental and instrumental skills, he was able to develop techniques based on laser beam optics (the laser was invented in the early 1960s). During his post-doctorate, he put together and operated an improved version of the Michelson-Morley experiment entirely on his own, with a view to testing the isotropy of space with ultra-stabilized lasers. The results he obtained were unparalleled for more than 25 years, and made Brillet internationally renowned. Today, they are still frequently cited by researchers in the field of relativity. Attracted very early on by the detection of gravitational waves and by the scale of the scientific and instrumental challenges involved, he called upon other instrumentation specialists (Catherine-Nary Man) and experts in gravitation (Philippe Tourrenc and Jean-Yves Vinet), while his team trained scientists including David Shoemaker and Peter Fritschell, who now play a major role in the LIGO collaboration. While taking part in designing Virgo, he developed innovative solutions in the field of lasers and optics, while his colleague Adalberto Giazotto worked on suspension systems that enabled mirrors to be decoupled from terrestrial vibrations. In 1989, the project, supported by around thirty French and Italian theorists and experimenters, was submitted to the CNRS and to the Italian National Institute for Nuclear Physics (INFN). Once it was approved, Brillet coordinated the eleven French and Italian teams involved, as well as the continuous discussion among theorists, signal analysts and experimenters, including both researchers and engineers. The quality of his work was instrumental in strengthening the links between the LIGO and Virgo teams (exchange of technical solutions, joint analysis of collected data). Brillet's ideas, such as spatial filter cavities, the addition of a few atoms to the final thin films on mirrors to compensate for flatness defects (in collaboration with Jean-Marie Mackowski), and transfer of stability from one laser to another (injection-locked lasers) were taken up in the LIGO and Virgo interferometers, as well as in the University of Tokyo's planned gravitational wave detector, KAGRA. From the very first day, Brillet has co-authored all the publications of the LIGO-Virgo collaboration. Thibault Damour, an internationally renowned theorist Thibault Damour, born on 7 February 1951 in Lyon, joined the Ecole Normale Superieure in 1970. He passed the 'agregation' (France's highest teaching diploma) in physics in 1974, and in the same year defended his doctoral thesis in theoretical physics. After two years at Princeton University (US) and carrying out his National Service at the Centre d'Etudes Theoriques de la Detection et des Communications, he joined the CNRS Department of relativistic astrophysics and cosmology at the Observatoire de Paris in 1977. Since 1989, he has been a tenured professor at the Institut des Hautes Etudes Scientifiques, at Bures-sur-Yvette, near Paris. World famous for his innovative work on black holes, pulsars, gravitational waves and quantum physics, he is an expert at popularizing science, through his lectures and books, including a comic strip on quantum physics. A member of the French Academy of Sciences and of the American Academy of Arts and Sciences, laureate of the CNRS Bronze Medal (1980) and the Einstein Medal (1996), and a Knight of the Legion of Honor (2010), he is also one of the seven visiting scientists in the LIGO-Virgo team who have been awarded the 2016 Special Breakthrough Prize in Fundamental Physics. Damour's work focuses on Einstein's general theory of relativity, cosmology, and new ideas in gravitation emerging from the unification of general relativity and quantum theory through string theory. In the field of the physics of black holes, Damour has for example introduced new concepts related to the surface of these objects. In string theory, he has in particular studied the chaotic dynamics in the vicinity of a big bang or a big crunch , as well as the bursts of gravitational waves emitted by cosmic superstrings. Damour played a role both in the indirect detection of gravitational waves in the 1980s, and more recently, in their direct detection. The first evidence for the existence of gravitational waves was obtained through the observation of PSR B1913+16, a binary system made up of a pulsar in orbit around a companion neutron star, discovered in 1974 by Russel Hulse and Joseph Taylor, who received the Nobel Prize in Physics in 1993. Work carried out by Damour and Nathalie Deruelle showed that in general relativity, the gravitational force acting on the pulsar propagated from its companion at light speed, in the form of waves, and that this propagation caused a slow decrease in its orbital period . Observations of PSR B1913+16 over three decades turned out to be in very good agreement with this direct consequence of propagation by gravitational waves. Damour also played a crucial role in the direct detection of gravitational waves. Understanding the theoretical signal emitted by sources of gravitational waves is key to detecting such signal in the raw data from instruments such as LIGO and Virgo. Together with Luc Blanchet, Damour described the motion of two black holes as they approach each other. In addition, with Alessandra Buonanno, he developed a new theoretical approach to describe the final merger between two black holes and the emission of gravitational waves that accompanies it. This work was used in the process of analyzing the data from the LIGO detector and, now, from the Virgo detector. ### Recent laureates of the CNRS Gold Medal: Claire Voisin, mathematician, in 2016; Eric Karsenti, biologist, in 2015; Gerard Berry, computer scientist, in 2014; Margaret Buckingham, developmental biologist, in 2013; Philippe Descola, anthropologist, in 2012; Jules Hoffmann, biologist, in 2011; Gerard Ferey, chemist, in 2010; Serge Haroche, physicist, in 2009; Jean Weissenbach, geneticist, in 2008; Jean Tirole, economist, in 2007. Find out more about all the CNRS Gold Medal laureates (in French): http://www.cnrs.fr/fr/recherche/prix/medaillesor.htm CLEVELAND--A Case Western Reserve University researcher has turned the origami she enjoyed as a child into a patent-pending soft robot that may one day be used on an assembly line, in surgery or even outer space. Kiju Lee, the Nord Distinguished Assistant Professor of Mechanical and Aerospace Engineering, and her lab have moved from paper robots to 3-D-printed models that bend, contract, extend and twist. This novel mechanism is called TWISTER (TWISted TowEr Robot). TWISTER was inspired by an origami twisted tower originally designed by Japanese artist Mihoko Tachibana, which uses multiple origami segments to form a tower structure. This origami design was then reinvented for various potential applications in robotics and manufacturing. In her earlier work using paper-folded structures, Lee's team added three small versions of the towers to one end of the larger tower and manipulated them to grasp like three opposing fingers. While picking up and moving eggs and ripe fruit, Lee's team found that when excessive force was applied, the fingers absorbed the extra force by distributing it and deforming. That quality, the researchers say, demonstrates the design's potential for manipulating all kinds of fragile objects without requiring force-based sensing and interacting with humans, without safety concerns. Recently, Lee successfully converted the TWISTER designs into 3-D printable models. This work enabled fabrication of complex origami-inspired designs via 3-D printing. "Among the possibilities for this robot are fragile-object manipulation and direct human-robot interaction, because these robots are soft and safe," said Lee, who will present her latest study at the IEEE/RSJ International Conference on Intelligent Robots and Systems in Vancouver today (Sept. 27). "TWISTER is very different from rigid body robots," she said. TWISTER is made from multiple layers of regular polygons--triangles, hexagons or octagons, forming a tube-like shape of a tower. Lee used cable-based actuation to control the robot, while different approaches, such as using Shape-Memory-Alloys, are also being explored. The motions can make a tower lying on its side crawl. For safety reasons, hard-bodied robots are typically separated from people in manufacturing processes, Lee said. "Because this robot can be made with soft materials," she said, "it could be safe to use on an assembly line right next to people." Lee and physicians have also been discussing ways to miniaturize the robot to insert in the body for minimally invasive surgeries. "Laproscopic surgery often requires some rigid pieces, and movement to control them from the outside causes stress on the tissues," Lee said. She's also been exploring space robotic applications, particularly for a space arm. "To put anything into space, volume and weight are critical, because of the cost of rocket transport," Lee said. "This robot is fully collapsible and, compared to a rigid arm, light and compact." ### Current and former undergraduate researchers Yanzhou Wang and Evan Vander Hoff, and PhD students Donghwa Jeong and Tao Liu contributed to this project. Here is a video link: http://case.edu/mae/robotics/videos/OrigamiBot_IEEERA-L.mp4 Lawrence Livermore National Laboratory researchers have dived down to the atomic scale to resolve every "jiggle and wiggle" of atomic motion that underlies metal strength. In a first of its kind series of computer simulations focused on metal tantalum, the team predicted that, on reaching certain critical conditions of straining, metal plasticity (the ability to change shape under load) meets its limits. One limit is reached when crystal defects known as dislocations are no longer able to relieve mechanical loads, and another mechanism - twinning, or the sudden reorientation of the crystal lattice - is activated and takes over as the dominant mode of dynamic response. The research appears in the Sept. 27 edition of Nature as an Advance Online Publication. Strength and plasticity properties of a metal are defined by dislocations, line defects in the crystal lattice whose motion causes material slippage along crystal planes. The theory of crystal dislocation was first advanced in the 1930s, and much research since then has focused on dislocation interactions and their role in metal hardening, in which continued deformation increases the metal's strength (much like a blacksmith pounding on steel with a hammer). The same simulations strongly suggest that the metal cannot be strengthened forever. "We predict that the crystal can reach an ultimate state in which it flows indefinitely after reaching its maximal strength," said Vasily Bulatov, LLNL lead author of the paper. "Ancient blacksmiths knew this intuitively because the main trick they used to strengthen their metal parts was to repeatedly hammer them from different sides, just like we do in our metal kneading simulation." Due to severe limits on accessible length and time scales, it was long thought impossible or even unthinkable to use direct atomistic simulations to predict metal strength. Taking full advantage of LLNL's world-leading HPC facilities through a grant from the Laboratory's Computing Grand Challenge program, the team demonstrated that not only are such simulations possible, but they deliver a wealth of important observations on fundamental mechanisms of dynamic response and quantitative parameters needed to define strength models important to the Stockpile Stewardship Program. Stockpile Stewardship ensures the safety, security and reliability of nuclear weapons without testing. "We can see the crystal lattice in all details and how it changes through all stages in our metal strength simulations," Bulatov said. "A trained eye can spot defects and even characterize them to an extent just by looking at the lattice. But one's eye is easily overwhelmed by the emerging complexity of metal microstructure, which prompted us to develop precise methods to reveal crystal defects that, after we apply our techniques, leave only the defects while completely wiping out the remaining defect-less (perfect) crystal lattice. The research team developed the first fully dynamic atomistic simulations of plastic strength response of single crystal tantalum subjected to high-rate deformation. Unlike computational approaches to strength prediction, atomistic molecular dynamics simulations rely only on an interatomic interaction potential, resolve every "jiggle and wiggle" of atomic motion and reproduce material dynamics in full atomistic detail. ### Other Livermore researchers include Luis Zepeda-Ruiz and Tomas Oppelstrup, and former LLNL postdoc Alexander Stukowski, now at Darmstadt University in Germany. Founded in 1952, Lawrence Livermore National Laboratory provides solutions to our nation's most important national security challenges through innovative science, engineering and technology. Lawrence Livermore National Laboratory is managed by Lawrence Livermore National Security, LLC for the U.S. Department of Energy's National Nuclear Security Administration. The Saturn Nebula is located approximately 5000 light years away in the constellation of Aquarius (The Water Bearer). Its name derives from its odd shape, which resembles everyone's favourite ringed planet seen edge-on. But in fact, planetary nebulae have nothing to do with planets. The Saturn Nebula was originally a low-mass star, which expanded into a red giant at the end of its life and began to shed its outer layers. This material was blown out by strong stellar winds and energised by ultraviolet radiation from the hot stellar core left behind, creating a circumstellar nebula of dust and brightly-coloured hot gas. At the heart of the Saturn Nebula lies the doomed star, visible in this image, which is in the process of becoming a white dwarf [1]. In order to better understand how planetary nebulae are moulded into such odd shapes, an international team of astronomers led by Jeremy Walsh from ESO used the Multi Unit Spectroscopic Explorer (MUSE - http://www.eso.org/public/teles-instr/paranal-observatory/vlt/vlt-instr/muse/ ) to peer inside the dusty veils of the Saturn Nebula. MUSE is an instrument installed on one of the four Unit Telescopes of the Very Large Telescope at ESO's Paranal Observatory in Chile. It is so powerful because it doesn't just create an image, but also gathers information about the spectrum -- or range of colours -- of the light from the object at each point in the image. The team used MUSE to produce the first detailed optical maps of the gas and dust distributed throughout a planetary nebula [2]. The resulting image of the Saturn Nebula reveals many intricate structures, including an elliptical inner shell, an outer shell, and a halo. It also shows two previously imaged streams extending from either end of the nebula's long axis, ending in bright ansae (Latin for "handles"). Intriguingly, the team also found a wave-like feature in the dust, which is not yet fully understood. Dust is distributed throughout the nebula, but there is a significant drop in the amount of dust at the rim of the inner shell, where it seems that it is being destroyed. There are several potential mechanisms for this destruction. The inner shell is essentially an expanding shock wave, so it may be smashing into the dust grains and obliterating them, or producing an extra heating effect that evaporates the dust. Mapping the gas and dust structures within planetary nebulae will aid in understanding their role in the lives and deaths of low mass stars, and it will also help astronomers understand how planetary nebulae acquire their strange and complex shapes. But MUSE's capabilities extend far beyond planetary nebulae. This sensitive instrument can also study the formation of stars and galaxies in the early Universe, as well as map the dark matter distribution in galaxy clusters in the nearby Universe. MUSE has also created the first 3D map of the Pillars of Creation in the Eagle Nebula (eso1518 - http://www.eso.org/public/news/eso1518/ ) and imaged a spectacular cosmic crash in a nearby galaxy (eso1437 - http://www.eso.org/public/news/eso1437/ ). ### Notes [1] Planetary nebulae are generally short-lived; the Saturn Nebula will last only a few tens of thousands of years before expanding and cooling to such an extent that it becomes invisible to us. The central star will then fade as it becomes a hot white dwarf. [2] The NASA/ESA Hubble Space Telescope has previously provided a spectacular image (https://www.spacetelescope.org/images/opo9738g/ ) of the Saturn Nebula -- but, unlike MUSE, it cannot reveal the spectrum at each point over the whole nebula. More information ESO is the foremost intergovernmental astronomy organisation in Europe and the world's most productive ground-based astronomical observatory by far. It is supported by 16 countries: Austria, Belgium, Brazil, the Czech Republic, Denmark, France, Finland, Germany, Italy, the Netherlands, Poland, Portugal, Spain, Sweden, Switzerland and the United Kingdom, along with the host state of Chile. ESO carries out an ambitious programme focused on the design, construction and operation of powerful ground-based observing facilities enabling astronomers to make important scientific discoveries. ESO also plays a leading role in promoting and organising cooperation in astronomical research. ESO operates three unique world-class observing sites in Chile: La Silla, Paranal and Chajnantor. At Paranal, ESO operates the Very Large Telescope and its world-leading Very Large Telescope Interferometer as well as two survey telescopes, VISTA working in the infrared and the visible-light VLT Survey Telescope. ESO is also a major partner in two facilities on Chajnantor, APEX and ALMA, the largest astronomical project in existence. And on Cerro Armazones, close to Paranal, ESO is building the 39-metre Extremely Large Telescope, the ELT, which will become "the world's biggest eye on the sky". Links * Photos of the VLT - http://www.eso.org/public/images/archive/category/paranal/ * Photos of MUSE - http://www.eso.org/public/images/archive/search/?adv=&subject_name=MUSE * Press release on first light of MUSE - http://www.eso.org/public/news/eso1407/ Contacts Jeremy Walsh ESO Garching bei Munchen, Germany Email: jwalsh@eso.org Richard Hook ESO Public Information Officer Garching bei Munchen, Germany Tel: +49 89 3200 6655 Cell: +49 151 1537 3591 Email: rhook@eso.org Cameron Immunization offers flu shots ANGOLA The Cameron Immunization Clinic is pleased to offer flu shots to the community. In addition to appointments, the Cameron Immunization Clinic will hold walk-in clinics on the following days at its location at 1381 N. Wayne St.: Friday from 8 a.m. to noon; and Friday, Oct. 6, from 8 a.m. to noon. For questions or to make an appointment to receive a seasonal flu shot, call 667-5622. Steuben offering free HIV, hepatitis testing ANGOLA The Steuben County Health Department will offer free HIV and hepatitis C testing on Wednesday, Oct. 4, from 9 a.m. to noon. No appointments are necessary for the confidential testing. For information, call 668-1000, ext. 1500. State senator wont seek another term INDIANAPOLIS (AP) Indiana state Sen. Doug Eckerty says he wont run for another term in 2018. The Yorktown Republican made the announcement in a statement issued Tuesday. Eckerty did not indicate why he is ruling out another run. But the senator says he is looking forward to spending more time with his time with his family, including his grandkids. Eckerty says he will finish out the remainder of his term representing Madison, Delaware and Henry counties. Republican Senate leader David Long, of Fort Wayne, praised Eckerty, saying the GOP caucus will miss him when hes gone. Eckerty dealt extensively with workforce development issues during his time in the Indiana Senate. He also helped write the states budget. The fauna of deep seabed tends to be relatively unknown due to the difficulty of collecting samples at great depths. A research team from the A Grana Marine Biology Station in Galicia undertook four oceanographic expeditions in the waters off the northwest coast of the Iberian Peninsula that have led to the discovery of several new species that inhabit the abyssal plains. Now they describe two eyeless species of millimetric proportions. The seabed of the continental shelf and slope is home to rich communities of fauna. In 2002, 2003, 2008 and 2009, the A Grana Marine Biology Station of the University of Santiago de Compostela (USC) undertook various oceanographic expeditions to study these ecosystems. While each of the different campaigns had different objectives, they all sought to identify and categorise these benthic fauna -- animals that live on the seabed -- as they are very rare and not well known. As a result of these searches, at a depth of a thousand metres, several new species have been discovered. A study from the Galician university has just described two of them as new crustaceans belonging to the families Photidae and Corophiidae, which they have named Photis guerrai and Pareurystheus vitucoi. Both are small, blind species measuring just a few millimetres. "This group of crustaceans is very important in oceans because they represent the base of the trophic chain in many marine ecosystems. Some of the most common adaptations of animal species at these depths include, among many others, the absence of vision structures and a smaller size, which enables them to withstand the high pressures", Ramiro Rodriguez, the USC researcher leading the study published by the journal Zootaxa, in collaboration with the Autonomous University of Madrid, tells Sinc. Deep ecosystems are very different from those found in more superficial coastal waters. This medium does not receive sunlight and, as a result, there are no macroalgae, so primary production is limited to chemosynthesis -- produced by a chemical energy source. Despite what was initially believed, however, abyssal plains are not lifeless zones. These areas are home to rich animal communities that feed on the organic material deposited gradually from the water column", adds Rodriguez Tato. Two crustaceans, both without eyes but very different These two marine animals have in common their lack of eyes. In an environment not reached by sunlight -- that is, in perpetual darkness -- for many species, the orientation systems are centred more on chemical sensory receptors than on visual organs. But because they belong to different families, the two species are very distinct. The first, a member of the Photis genus -- which is very common in coastal waters, with highly characteristic lateral cephalic protrusions called cephalic lobes -- is one of the few species in this group that lacks eyes. "Only three other of the 69 species in existence lack this visual organ", according to the scientist. Furthermore, the cephalic lobes in Photis guerrai are pointed rather than rounded. The Pareurystheus genus, on the other hand, is much less common, with most members found in the waters of Japan. Pareurystheus vitucoi is the first to be recorded in the northwest Atlantic. This animal has a fifth pair of highly modified and developed thoracic appendages, unlike P. vitucoi. It is small-sized and white in colour. "It is unique in its genus, as it is the first to be described as lacking eyes", states the scientist. However, the scientists find it hard to explain their behaviour, as it is difficult to observe these animals in situ. "They are probably detritivorous species that live on the seabed by digging galleries in which to find shelter and food, the most common method used by animals in this group that inhabits these depths", notes Rodriguez Tato. Different types of dredges were used to collect samples, in this case three trawlers, each designed to extract a particular type of sample on a specific type of seabed. "The communities on our country's abyssal plains are not yet very well known, as these two species are just a small fraction of the results of these campaigns. I found ten new species that I am still working on. These are just two of them", the researcher concludes. ### Bibliographic reference: Ramiro Tato y Juan Moreira. "Two new species of the Suborder Senticaudata (Crustacea: Amphipoda) from the upper continental slope off Galicia (NW Iberian Peninsula)" Zootaxa 4300 (2): 217-237. https://doi.Org/10.11646/zootaxa.4300.2.4. Kyoto, Japan -- Someday a health checkup may be as easy as switching on the living room light. In early 2016, researchers from Kyoto University's Center of Innovation and Panasonic Corporation developed a radar-based device that could instantaneously and accurately measure the body's vital signals --and now they've made it even better. The sensor combined a radar with signal analysis algorithms to measure how the body moves as the heart beats. Body movements vary considerably, so the software filters isolate just the heart's minute motions. "Measuring respiration and heart rate -- without attaching cumbersome wires to the body -- will greatly benefit modern medicine and home healthcare," explains Toru Sato, lead researcher and Kyoto University professor of communications and computer engineering. "Moreover, it will reduce stress by not subjecting the individual to a feeling of being monitored." While the original technology showed promise, there was a major problem: the prototype was the size of a microwave oven. To improve prospects for implementation, the group shifted their focus toward refining the device. "After extensive testing we achieved great improvements," continues Sato. "The device now utilizes the 79 GHz frequency band, instead of the previous 60 GHz. We also incorporated CMOS semiconductors. As a result, range and resolution improved, and it's now only about one tenth the size --as big as a smoke detector." Moreover, because of the new frequency band, the sensor can now measure the heart rates of multiple individuals in the same room, separated by as little as 7.5 cm (about 3 inches). The team hopes that the improved specs will allow such sensors to be installed in a variety of household appliances -- such as lighting -- to safely monitor the vitals of residents. "This technology holds great promise for the future development of devices to monitor health remotely," concludes Sato. "We are currently considering test sites for observing the multiple applications of our sensor." ### Kyoto University is one of Japan and Asia's premier research institutions, founded in 1897 and responsible for producing numerous Nobel laureates and winners of other prestigious international prizes. A broad curriculum across the arts and sciences at both undergraduate and graduate levels is complemented by numerous research centers, as well as facilities and offices around Japan and the world. For more information please see: http://www.kyoto-u.ac.jp/en Panasonic Corporation is a worldwide leader in the development of diverse electronics technologies and solutions for customers in the consumer electronics, housing, automotive, and B2B businesses. Celebrating its 100th anniversary in 2018, the company has expanded globally and now operates 495 subsidiaries and 91 associated companies worldwide, recording consolidated net sales of 7.343 trillion yen for the year ended March 31, 2017. Committed to pursuing new value through innovation across divisional lines, the company uses its technologies to create a better life and a better world for its customers. To learn more about Panasonic: http://www.panasonic.com/global. ANN ARBOR, MI - Sleep doesn't come easily for nearly half of older Americans, and more than a third have resorted to some sort of medication to help them doze off at night, according to new results from the National Poll on Healthy Aging. But most poll respondents said they hadn't talked to their doctor about their sleep, even though more than a third said their sleep posed a problem. Half believe -- incorrectly -- that sleep problems just come naturally with age. The poll was conducted by the University of Michigan Institute for Healthcare Policy and Innovation, and is sponsored by AARP and Michigan Medicine, U-M's academic medical center. Those who turn to medications may not realize that prescription, over-the-counter and even "natural" sleep aids carry health risks, especially for older adults, either alone or in combination with other substances. In fact, national guidelines strongly warn against prescription sleep medicine use by people over age 65. Despite this, the nationally representative poll of people ages 65 to 80 finds that 8 percent of older people take prescription sleep medicine regularly or occasionally. Among those who report sleep troubles three or more nights a week, 23 percent use a prescription sleep aid. Most who use such drugs to help them sleep had been taking them for years. Manufacturers and the U.S. Food and Drug Administration say such drugs are only for short-term use. Medication: not the only option "Although sleep problems can happen at any age and for many reasons, they can't be cured by taking a pill, either prescription, over-the-counter or herbal, no matter what the ads on TV say," says poll director Preeti Malani, M.D., a U-M physician trained in geriatric medicine. "Some of these medications can create big concerns for older adults, from falls and memory issues to confusion and constipation," even if they're sold without a prescription. "The first step for anyone having trouble sleeping on a regular basis should be to talk to a doctor about it," she continues. "Our poll shows that nearly two-thirds of those who did so got helpful advice - but a large percentage of those with sleep problems simply weren't talking about it." She notes that non-medication-based sleep habits are the first choice for improving sleep in older people. Sleep and health In all, 46 percent of those polled had trouble falling asleep one or more nights a week. Fifteen percent of the poll respondents said they had trouble falling asleep three or more nights a week. Other health conditions can contribute to sleep difficulties. Twenty-three percent of poll respondents who had trouble sleeping said it was because of pain. And 40 percent of those with frequent sleep problems said their overall health was fair or poor. Other reasons for sleep troubles included having to get up to use the bathroom at night, and worry or stress. Insomnia and other irregular sleep patterns can interfere with daytime functioning, and are associated with memory issues, depression and an increased risk of falls and accidents. Even so, many said they didn't see sleep issues as a health problem - in fact, this belief was the most common reason that poll respondents said they didn't talk to their doctor about sleep. This also highlights the need for doctors to ask their older patients about their sleep habits and what they're doing to address any issues they may be having "We know that sleep is a critical factor for overall health as we age, and this new research highlights sleep problems as both a significant health issue for older adults and an underacknowledged one both by patients and their providers," says Alison Bryant, Ph.D., senior vice president of research for AARP. "We need to help people understand that lack of sleep is not just a natural part of aging." More about medication use In all, 14 percent of the poll respondents said they regularly took a prescription sleep medication, prescription pain medication, OTC sleep aid or herbal supplement to help them sleep. Another 23 percent took one of these options occasionally; most of the occasional users said they chose OTC sleep aids. The most recent Beers Criteria established by the American Geriatrics Society, which guides the use of medications among older people, gives a strong warning against use of prescription sleep drugs, which are sold under such names as Ambien, Lunesta and Sonata. Meanwhile, even though OTC sleep aids can be purchased without a doctor's guidance or prescription, they still carry health risks for older people, Malani notes. Most of them contain diphenhydramine, an antihistamine that can cause side effects such as confusion, urinary retention and constipation. Among poll respondents with frequent sleep problems who took something occasionally to help them sleep, OTC sleep remedies were the most common choice. But among those with frequent sleep issues who took something on a regular basis to try to sleep, prescription sleep medications were the most common option, with 17 percent reporting use. Use of melatonin and other herbal remedies may be perceived as safer, but less is known about their potential side effects and they are not subject to the FDA's approval process for medications, says Malani. But any issue that prompts someone to buy an OTC or herbal remedy on a regular basis is something they should discuss with their doctor, she adds. The poll results are based on answers from a nationally representative sample of 1,065 people ages 65 to 80, who answered a wide range of questions online. Questions were written, and data interpreted and compiled, by the IHPI team. Laptops and Internet access were provided to poll respondents who did not already have it. ### A full report of the findings and methodology is available at http://www.healthyagingpoll.org. The poll will issue its next findings in late October; sign up for email notifications on the website. After a nine-week voyage to study the lost, submerged continent of Zealandia in the South Pacific, a team of 32 scientists from 12 countries has arrived in Hobart, Tasmania, aboard the research vessel JOIDES Resolution. Researchers affiliated with the International Ocean Discovery Program (IODP) mounted the expedition to explore Zealandia. IODP is a collaboration of scientists from 23 countries; the organization coordinates voyages to study the history of the Earth recorded in sediments and rocks beneath the seafloor. "Zealandia, a sunken continent long lost beneath the oceans, is giving up its 60 million-year-old secrets through scientific ocean drilling," said Jamie Allan, program director in the U.S. National Science Foundation's Division of Ocean Sciences, which supports IODP. "This expedition offered insights into Earth's history, ranging from mountain-building in New Zealand to the shifting movements of Earth's tectonic plates to changes in ocean circulation and global climate," Allan said. Earlier this year, Zealandia was confirmed as Earth's seventh continent, but little is known about it because it's submerged more than a kilometer (two-thirds of a mile) under the sea. Until now, the region has been sparsely surveyed and sampled. Expedition scientists drilled deep into the seabed at six sites in water depths of more than 1,250 meters (4,101 feet). They collected 2,500 meters (8,202 feet) of sediment cores from layers that record how the geography, volcanism and climate of Zealandia have changed over the last 70 million years. According to expedition co-chief scientist Gerald Dickens of Rice University in the U.S., significant new fossil discoveries were made. They prove that Zealandia was not always as deep beneath the waves as it is today. "More than 8,000 specimens were studied, and several hundred fossil species were identified," said Dickens. "The discovery of microscopic shells of organisms that lived in warm shallow seas, and of spores and pollen from land plants, reveal that the geography and climate of Zealandia were dramatically different in the past." The new discoveries show that the formation 40 to 50 million years ago of the "Pacific Ring of Fire," an active seafloor zone along the perimeter of the Pacific Ocean, caused dramatic changes in ocean depth and volcanic activity and buckled the seabed of Zealandia, according to Dickens. Expedition co-chief scientist Rupert Sutherland of Victoria University of Wellington in New Zealand said researchers had believed that Zealandia was submerged when it separated from Australia and Antarctica about 80 million years ago. "That is still probably accurate, but it is now clear that dramatic later events shaped the continent we explored on this voyage," Sutherland said. "Big geographic changes across northern Zealandia, which is about the same size as India, have implications for understanding questions such as how plants and animals dispersed and evolved in the South Pacific. "The discovery of past land and shallow seas now provides an explanation. There were pathways for animals and plants to move along." Studies of the sediment cores obtained during the expedition will focus on understanding how Earth's tectonic plates move and how the global climate system works. Records of Zealandia's history, expedition scientists said, will provide a sensitive test for computer models used to predict future changes in climate. ### Rochester Institute of Technology researchers helped pinpoint the precise location of a gravitational wave signal -- and the black hole merger that produced it -- detected by gravitational wave observatories in the United States and in Europe. For the first time, LIGO and the French-Italian Virgo were used to triangulate the position in the universe where the binary black hole merger occurred 1.8 billion years ago. The black holes are 25 and 31 times the mass of the sun before the collision and 53 times the sun mass after, when a merged black hole formed. The signal was detected on Aug. 14 by the LIGO detectors in Louisiana and Washington and the Virgo detector near Pisa, Italy. The findings were announced today in a news conference in Turin, Italy, and will appear in Physics Review Letters. The addition of the third observatory has widened the window on the universe, said RIT professor Carlos Lousto. "We now can pinpoint where those black holes collided in the universe with 10 times higher precision than we had with only two detectors," Lousto said. "Astronomers can look more accurately toward this direction in sky with conventional telescopes to see if there is an electromagnetic counterpart to such cosmic collisions." John Whelan, RIT associate professor and the principal investigator of RIT's LIGO group, said, "Our Virgo colleagues, who have been collaborating on the analysis since our first joint initial detector runs 10 years ago, have now joined the advanced detector network. We now have, for the first time, three advanced gravitational wave detectors observing together." Richard O'Shaughnessy, RIT assistant professor, adds that, "with Virgo, we can now reliably point to where a gravitational wave signal came from. We can tell astronomers when and where to point their telescopes." Scientists will gain a deeper understanding of astrophysical phenomena by combining gravitational wave astronomy with traditional methods using the electromagnetic spectrum. "Precision pointing makes multimessenger astronomy possible," O'Shaughnessy said. The current study cites 2005 breakthrough research by Lousto; Manuela Campanelli, RIT professor and director of the Center for Computational Relativity and Gravitation; and Yosef Zlochower, RIT associate professor, which solved Albert Einstein's strong field equations. The group was one of the first to simulate a black hole on a supercomputer. Their "moving puncture approach" has been adopted by other research groups and helped lay the foundation for gravitational wave astronomy. "Our supercomputer simulations of black-hole collisions continue to be crucial to determine the astrophysical parameters of those extreme objects and they provide important information for modeling their history, from the death of their progenitor stars to their final merger into a larger black hole," Lousto said. The new detection also cites a 2017 paper written by Lousto and James Healy, RIT postdoctoral researcher, and a 2014 paper by Lousto and Zlochower studying extreme black hole spins and mass ratios. RIT students listed as authors on the LIGO-Virgo paper include Monica Rizzo, an undergraduate physics major; John Bero, an MS student in the astrophysical sciences and technology graduate program; and astrophysical sciences and technology Ph.D. students Jacob Lange, Jared Wofford, Daniel Wysocki and recent Ph.D. recipient Yuanhao Ahang. Educating the next generation of gravitational wave astronomers is taken seriously at RIT's Center for Computational Relativity and Gravitation. "We perform top research integrating faculty, students and postdocs," Campanelli said. "With RIT and National Science Foundation support, we are upgrading our supercomputer capabilities to solve Einstein equations for binary black holes." ### The collaboration of researchers from RUDN University (Russia), Centro de Quimica Estrutura (Portugal) and Baku State University (Azerbaijan) proposes a new potential way to produce initial compounds for many chemical industries, including pharmacy, cosmetics, dyes and liquid crystals production. The new method of synthesis at a room temperature with high yields described in two articles published in Journal of Organometallic Chemistry and in Inorganica Chimica Acta. Cyanosilylation is the addition of cyanogroups - NC to silyl groups, which include silicon and another inconstant component called radical, labeled with 'R' on the scheme below. Assymetric addition of these groups to chemical compounds with =C=O groups leads to the formation of a variety of enantiomerically enriched compounds. These may act as the new prospective materials and initial substances for the chemical industry. Enantiomers are optical isomers that contain the same atoms and that are mirror images of each other, but despite that are not identical and may have different chemical and physical properties. Precisely these properties make them so promising. The process of cyanosilylation is driven by additional agents called catalysts. Catalysts are mediating the reaction path, but they do not change themselves, and quit the process without any transformations at the end. Catalysis allows the reaction to proceed faster and more intensively even at lower temperatures or over a wider pressure range. Catalytic asymmetric cyanosilylation has been extensively studied in recent years due to the significant utility of the products of this reaction -- cyanohydrin trimethylsilyl ethers. They are the key starting materials in the syntheses of substantial chemical products, e.g., -hydroxy aldehydes, -hydroxy acids, -amino alcohols, etc. The first group is used in colourants, pharmaceutical, fungicide and odourant synthesis, the second is essential forl food production and pharmaceuticals, and the third group is useful for the household chemicals and cosmetics. It's notable that all these compounds are easy to produce from this type of ethers through only one-step synthesis. The main synthetic route for the preparation of cyanohydrin trimethylsilyl ethers is the addition reaction of trimethylsilyl cyanide (TMSCN) that contains both cyanogroup and silyl component to carbonyl compounds (those with =C=O groups, as mentioned earlier). Trimethylsilyl cyanide is a source of cyanide that is safe and easy to handle, if compared to HCN, NaCN and KCN. "Currently a variety of organo- and metal catalysts have been employed in this reaction. These protocols have many disadvantages, such as low yield, long reaction time, harmful solvents, etc. Thus, in this project we have introduced new types of catalysts for cyanosilylation of aldehydes" - says Atash Gurbanov, Organic Chemistry Department, RUDN University, the leading author of the paper. The proposed suggestion is arylhydrazone in complex with Cu(II) and Co(II/III). Apart fro the radicals (and again we will see the 'R' letter) arilhydrazone contains aril group (aromatic ring where one hydrogen is lacking) and two atoms of nitrogen, one of which is in double chemical bond with carbon. Arilhydrazones are easy to produce and they are extensively studied by chemists. Below you may see the complexes they form with cobalt and copper. These complexes act as homogeneous catalysts for the cyanosilylation of aldehydes (both aromatic ones and those without aromatic rings) with trimethylsilyl cyanide. The researchers argue that this reaction proceeds even "at room temperature in methanol, providing cyanohydrin trimethylsilyl ethers with good yields (77?89 %)." The ways to promote the reaction yield are also discovered for those two groups of aldehydes, the chemists say. ### WASHINGTON--When expectant mothers have elevated blood pressure during pregnancy, it may raise their children's risk of developing childhood obesity, according to a study published in the Endocrine Society's Journal of Clinical Endocrinology & Metabolism. Childhood obesity has become an international public health problem. An estimated 42 million children ages 5 and younger met the criteria for having obesity or being overweight, according to the World Health Organization's Commission on Ending Childhood Obesity. "Our study is the first to demonstrate that among pregnant women, elevated blood pressure is associated with a greater risk of overweight and obesity for their children," said the study's first author, Ju-Sheng Zheng, Ph.D., of Qingdao University in Qingdao, China, and the University of Cambridge in Cambridge, U.K. "The risk still existed for children of women who didn't have hypertension, but whose blood pressure during pregnancy was at the high end of the normal range." The prospective cohort study examined blood pressure levels and weight in 88,406 mother-child pairs who participated in the Jiaxing Birth Cohort in southeastern China between 1999 and 2013. The researchers analyzed the women's blood pressure results from the three trimesters of pregnancy. During follow-up visits, the children were weighed when they were between the ages of 4 and 7. Among women who were hypertensive during the second trimester, their children were 49 percent more likely to be categorized as overweight or to have obesity compared to children of mothers who had lower blood pressure levels. Children of women with high blood pressure during the third trimester were 14 percent more likely to meet the criteria for overweight or obesity. The mother's body size prior to pregnancy did not affect the association. "The results indicate that all pregnant women and their doctors should monitor and try to limit a substantial increase in blood pressure in mid-to-late pregnancy," Zheng said. "This may help reduce the likelihood of their children being affected by obesity." ### Other authors of the study include: Huijuan Liu and Yuhong Guan of the Jiaxing Maternity and Child Health Care Hospital in Jiaxing, China; Ken K. Ong and Yuan Huang of the University of Cambridge in Cambridge, U.K.; Tao Huang of the National University of Singapore in Singapore; Bo Yang of Wenzhou Medical University in Wenzhou, China; Fenglei Wang of Zhejiang University in Hangzhou, China; and Duo Li of Qingdao University and Zhejiang University. The research was supported by the National Basic Research Program of China, National Natural Science Foundation of China, and the Ph.D. Programs Foundation of Ministry of Education of China. Zheng is supported by the Marie Sk?odowska-Curie Fellowships, and Ong is supported by the Medical Research Council. The study, "Maternal Blood Pressure Rise During Pregnancy and Offspring Obesity Risk at 4-7 Years Old: The Jiaxing Birth Cohort," will be published online at https://academic.oup.com/DocumentLibrary/ENDO/JCEM/jc.2017-01500_promo.pdf, ahead of print. Endocrinologists are at the core of solving the most pressing health problems of our time, from diabetes and obesity to infertility, bone health, and hormone-related cancers. The Endocrine Society is the world's oldest and largest organization of scientists devoted to hormone research and physicians who care for people with hormone-related conditions. The Society has more than 18,000 members, including scientists, physicians, educators, nurses and students in 122 countries. To learn more about the Society and the field of endocrinology, visit our site at http://www.endocrine.org. Follow us on Twitter at @TheEndoSociety and @EndoMedia. New research published in The Journal of Physiology today suggests that enhancing breathing via the brain may limit deficiencies in respiratory capacity in Duchenne muscular dystrophy (DMD) patients. Duchenne muscular dystrophy (DMD) is a fatal genetic neuromuscular disease, which can lead to respiratory failure. Respiratory muscle dysfunction is recognized in DMD, however a thorough assessment of nervous system control of respiratory muscles is lacking. Lead investigators David Burns and Ken O'Halloran at University College Cork, in conjunction with collaborator labs at the University of Calgary and Trinity College Dublin, performed experiments in mice lacking dystrophin, the muscle protein that malfunctions in DMD. These mice have been shown to be a useful pre-clinical model of DMD as they demonstrate many of the hallmark features of respiratory muscle dysfunction in DMD patients. In the young dystrophin-deficient mice, the respiratory control system was impaired on multiple levels. Importantly, the researchers found that the brain was compensating for this by increasing activation of the diaphragm muscle. This study only offers a snapshot of the deficits and compensations at one time point in the progression of the disease. It is essential the findings from the study in the dystrophin-deficient mice are confirmed in human DMD patients before its potential applications in these patients can be considered. David Burns, one of the lead investigators on the study, said: 'Further study of physiological neuromuscular mechanisms that compensate for the absence of dystrophin is needed. A better understanding may provide insight with potential applications to a range of neuromuscular diseases, beyond DMD.' ### The silting of rivers and streams leads to problems for fish, mussels, and other aquatic organisms because their habitats disappear. However, not only intensive agriculture and erosion are destroying these habitats. Now a study conducted by researchers at the Technical University of Munich (TUM) refutes this wide-spread view. In order to save the species living in the river basin - and protect people from the threat of devastating floods - rivers need more space, diversity, and freedom. The subject of the study was the Moosach, a tributary of the Isar and located right at the Weihenstephaner "doorstep" of the TUM. The Moosach largely flows between the Munich gravel plain and tertiary hill country in an artificial bed. Every few years the river has to be excavated to remove several thousand cubic meters of mud. The tertiary hill country, 65 million years old, is among the areas with the highest erosion rates. However, less than one percent of the erosion material remains on the ground and the siltation problem cannot be solved by reducing the erosion. This result was provided by the analysis of riverbed samples over the course of several years by Professor Karl Auerswald from the Chair of Grassland Studies and Professor Jurgen Geist from the Chair of Aquatic Systems Biology. "The prevention of erosion alone, as water and fisheries management have long demanded, does not then help river beds," says Professor Auerswald. Fortified and dammed as well as straightened and deepened over many decades, the rivers lack their natural flow behavior. Likewise, the floodplain landscape is lacking buffer function and interplay with the river during flooding. The Moosach diagnosis: "a channel, no longer a river" can be transferred to all rivers in Bavaria and worldwide, says the TUM professor. The Disappearance of Natural Change The two TUM scientists just published the results of their study in the international journal Land Degradation & Development. The title, "Extent and causes of siltation in a headwater stream bed: catchment soil erosion is less important than internal stream processes," shows how important the throughflow is for the riverbed. Namely the cavities between the gravel filled with oxygen-containing water gravel constitute the primary refuge of small and micro-organisms as well as the egg-laying site for various river fish. Even a thin sediment layer suffices to seal these interstices. "The entry of erosion material also occurs under natural conditions," Auerswald explains. "Under natural conditions, however, the riverbed is constantly being relocated and the cavity system is cleared from the inundated floodplain by the groundwater flow." Because rivers have been straightened and channeled, these floodplain dynamics disappear just as the natural inflow from below has greatly decreased. Humankind initially intervened in the course of the rivers with good reason: In order to protect cities from flooding, to drain swamps, and to push back cholera and typhus, at the start of the 19th century, rivers began to be straightened and forced into canals. Thus, land was also won for further settlement. The floodplain landscapes, important for sediment retention and natural flood protection, became dysfunctional more and more. Thus, the rivers lacking in shores and natural water inflow lack the possibility of change. But it is precisely these differences that are decisive for the biodiversity of a body of water and for its wealth of species in the water and below. Auerswald warns: "River floodplains must be off-limits" The right measure is lacking for Auerswald: "As is so often the case, humans continue down a path that was initially correct, even if he's already well past the goal." In the case of local planning and construction decisions, the floodplain is "always the loser." Auerswald advises, as he has for many years, to once again give the rivers the freedom to determine their own shape. This means, consequently, that the river could shape its bed during renaturation measures. "Whatever floodplains are still around must absolutely be off-limits," he says, warning against the unchecked need of the cities for land to develop - and in view of his model calculations on future flood events: "We would do well to allow the rivers to meander on their own again." ### Publication: Karl Auerswald und Jurgen Geist: Extent and Causes of Siltation in a Headwater Stream Bed: Catchment Soil Erosion is Less Important than Internal Stream Processes, Land Degradation & Development, 6 September 2017. DOI: 10.1002/ldr.2779 Link: http://onlinelibrary.wiley.com/doi/10.1002/ldr.2779/full Kontakt: Prof. Dr. Karl Auerswald Technical University of Munich Chair of Grassland Studies Phone: 0049/8161/71-3965 Mail: karl.auerswald@mytum.de A genetic fault has been identified in people with an aggressive type of leukaemia that can significantly affect how they respond to treatment. The findings come from a clinical trial led by the University of Birmingham that examined whether survival times for people with acute myeloid leukaemia (AML) or myelodysplastic syndrome (MDS) could be improved by adding a biological drug called vorinostat to the current standard treatment, a drug called azacitidine. Although no additional benefit was seen by the new combination, people had a significantly worse outcome if their cancer cells carried a mutation to the CDKN2A gene. The results may help doctors tailor treatment to improve the outlook for patients. The trial, called RAvVA, was funded by the blood cancer research charity Bloodwise, and was delivered at 19 hospitals across the UK through the charity's 'Trials Acceleration Programme' (TAP). The results of the trial have now been published in the journal Clinical Cancer Research. For those who are fit enough to tolerate it, the best chance of a long-term cure for AML involves intensive chemotherapy followed by a stem cell transplant. However high dose chemotherapy is poorly tolerated by older patients for whom the recently developed drug azacitidine, which can be delivered as an out-patient, represents an important new treatment option. Although the exact way azacitidine works is unknown, it is believed to interfere with DNA in cancer cells and restore the activity of genes that control the rate of cell growth. Not everyone will respond, however, and all people eventually relapse. Its effectiveness varies greatly from person to person, and it is hard to identify who will benefit most before treatment begins. Previous smaller clinical trials had suggested that outcomes for people with AML or MDS could be improved by combining vorinostat, which blocks cancer growth, with azacitidine. The RAvVA trial treated 259 people with AML or MDS, with half the participants receiving a combination of azacitidine and vorinostat, and half receiving azacitidine alone. It was found that adding vorinostat to azacitidine did not significantly improve treatment response or survival rates in people with AML or MDS. Those receiving the combination treatment survived for 11 months after diagnosis on average, compared to 9.6 months for people only treated with azacitidine. While this result was disappointing, the study provides important new information that can be used to identify which patients are most likely to derive a clinical benefit from azacitidine therapy. By correlating the depth of response of patients treated with azacitidine on the trial with the genetic makeup of their cancer cells at diagnosis, they identified that people who had faults in CDKN2A, IDH1 and TP53 genes had significantly reduced overall survival times. Importantly, CDKN2A is a gene that regulates the cell cycle by making several proteins that control cell growth. As people who had mutations in this gene had a poorer outcome, the Birmingham team believe that one of the ways that azacitidine works is by causing cell cycle arrest. This information will guide the choice of new drug partners with the potential to increase azacitidine's clinical activity. This is the first time that mutations in the CDKN2A gene mutation have been linked to poorer survival in people with AML treated with azacitidine and strikingly patients with the mutation survived on average for 4.5 months, compared to an average of 11 months for people without it. The team believe that testing people newly diagnosed with AML and MDS for CDKN2A, IDH1 and TP53 genetic mutations could help doctors tailor treatment for people who are less likely to do well. The trial was led by Professor Charles Craddock, a Professor of Haemato-oncology at the University of Birmingham and Director of the Centre for Clinical Haematology run by University Hospitals Birmingham NHS Foundation Trust. He said: "This important trial, delivered through the Bloodwise Trials Acceleration Programme, has rapidly answered the important question of whether combining azacitidine with vorinostat improves outcomes for people with AML and MDS and emphasises the need for further studies with new drug partners for azacitidine. "Importantly, the linked molecular studies have shed new light on which people will benefit most from azacitidine. Furthermore discovering that the CDKN2A gene mutation affects treatment response may be hugely valuable in helping doctors to design new treatment combinations in the future." Dr Alasdair Rankin, Director of Research at Bloodwise, said: "This study demonstrates how important clinical trials are to help us understand not just whether a possible new treatment approach works or not, but why it succeeds or fails. By using samples from people with MDS and AML on this clinical trial, we have been able to understand the biology of blood cancer better. As a result, this trial has taught us much more about how doctors might treat individual people living with MDS and AML differently, so we can improve their care." ### For further information, please contact: 1. Emma Mckinney, University of Birmingham's Press Office, on 0121 414 6681 or email e.j.mckinney@bham.ac.uk 2. Henry Winter at the Bloodwise Press Office on 020 7269 9019, press mobile 07824 375880, or email: press@bloodwise.org.uk NOTES TO EDITORS Craddock et al (2017). 'Outcome of Azacitidine Therapy in Acute Myeloid Leukemia is not Improved by Concurrent Vorinostat Therapy but is Predicted by a Diagnostic Molecular Signature'. Clinical Cancer Research . DOI: 10.1158/1078-0432.CCR-17-1423 . DOI: 10.1158/1078-0432.CCR-17-1423 Read the paper at http://clincancerres.aacrjournals.org/content/early/2017/08/01/1078-0432.CCR-17-1423.long RAvVA is the Randomised Trial of 5-Azacitidine versus 5-Azacitidine in combination with Vorinostat in patients with Acute Myeloid Leukaemia or High Risk Myelodysplastic Syndromes Ineligible for Intensive Chemotherapy. Acute myeloid leukaemia (AML) is a form of cancer that affects blood cells called myeloid cells, which include red blood cells, platelets and certain types of white blood cells. Patients experience uncontrolled growth of immature myeloid cells and do not produce enough healthy blood cells. Over 2,400 people are diagnosed with AML each year in the UK. It can affect anyone of any age, but the majority of patients are over 60. Chemotherapy and stem cell transplantation offer the best chance of a permanent cure. Many patients are too elderly to undergo intensive treatment, however, and overall fewer than one in five patients will survive for longer than five years after diagnosis. Myelodysplastic syndromes (MDS) is a type of blood cancer, in which the production of blood cells in the bone marrow is faulty. Just one type of blood cell can be affected or in some cases, MDS can cause a reduction in all types of blood cells. In addition to low blood counts, MDS share a common tendency to develop into acute myeloid leukaemia (AML) over time. The risk of this occurring depends on the type of MDS. Around 2,200 people are diagnosed with MDS each year in the UK. The University of Birmingham is a truly vibrant, global community and an internationally- renowned institution, in the top 100 globally. With approximately 28,000 students and 6,000 members of staff, its work brings people from more than 150 countries to Birmingham. The Trials Acceleration Programme (TAP) was launched in 2011 by Bloodwise to speed up blood cancer clinical trials. TAP is organised from a central hub at the University of Birmingham, which supports the efficient running of trials in hospitals, reducing the time it takes to open clinical trials in locations around the country. Bloodwise have a network of 13 TAP centres where they support a research nurse or other staff that help with clinical trials. Seven further hospitals are affiliated to TAP. These centres benefit from full access to the network, and can contribute to recruitment to individual TAP trials. Bloodwise is the UK's specialist blood cancer research charity dedicated to improving the lives of people living with and beyond blood cancer. The charity, which was formed in 1960, changed its name from Leukaemia & Lymphoma Research in September 2015. Around 39,000 people of all ages, from children to adults, are diagnosed with blood cancers and related disorders every year in the UK. It is a complex disease area made up of over 100 individual diseases. Some affect thousands of people, such as common forms of leukaemia, lymphoma and myeloma. Others affect only a handful. But together, blood cancers are the fifth most common form of cancer, and the third largest cause of cancer death in the UK. The charity's research is targeted at understanding more about blood cancer, finding causes, improving diagnosis and treatments, and running ground breaking clinical trials for patients. The charity champions patients' needs by influencing relevant decision makers and influencers, and seeking to raise awareness of the issues faced by patients. Their patient services provide information, support and assistance to patients at every stage of their journey. For more information visit http://www.bloodwise.org.uk University Hospitals Birmingham (UHB) NHS Foundation Trust runs the Queen Elizabeth Hospital Birmingham (QEHB) and the original Queen Elizabeth Hospital (Heritage Building) and hosts the Institute of Translational Medicine (ITM). The Trust has approximately 1,400 beds, 32 theatres and a 100-bedded critical care until - the largest in Europe. QEHB is a Major Trauma Centre treating the most severely injured casualties from across the region. The hospitals are a regional centre for trauma, burns, plastics, neurosciences and cancer and in 2014 became a lead genomics centre as part of the NHS 100,000 Genomes Project. UHB has the largest solid organ transplantation programme in Europe. In 2016/17, UHB cared for over 1 million patients and currently employs over 9,500 members of staff. UHB is proud to host the Royal Centre for Defence Medicine (RCDM). The RCDM provides dedicated training for defence personnel and is a focus for medical research. UHB also holds the contract for providing medical services to military personnel evacuated from overseas via the aero medical service. UHB is one of only a small number of hospitals that can provide the full range of medical specialties - trauma, burns, plastics, orthopaedics, neurosurgery, critical care - needed to treat the complex nature of conflict injuries, all under one roof. Kendallville, IN (46755) Today Cloudy. A few flurries or snow showers possible. Low 28F. Winds ENE at 5 to 10 mph.. Tonight Cloudy. A few flurries or snow showers possible. Low 28F. Winds ENE at 5 to 10 mph. Microbes are everywhere -- in humans they protect us from harmful bacteria and help us digest food; in soils, they provide nutrients and encourage growth of plants. Microbes even live in sediments below the seafloor where they play a key role in the underwater ecosystem. Scientists are identifying and characterizing more microbes each year using DNA sequencing technologies. As each new species is sequenced, scientists add it to the microbial "tree of life," creating a virtual census of what's there. Turns out it's not an easy job. To put things in perspective, scientists aren't sure how many microbes even exist. Estimates vary widely from millions to trillions. University of Delaware professor Jennifer Biddle and Rosa Leon-Zayas, who completed post-doctoral work at UD earlier this year, recently described new details about microbes known as Parcubacteria in a paper published in Environmental Microbiology. The Parcubacteria were found in sediment samples collected by James Cameron within the Challenger Deep region of the Mariana Trench during the Deepsea Challenge Expedition. Leon-Zayas' doctoral advisor, Doug Bartlett at Scripps Institution of Oceanography, was a chief scientist on the expedition. "From a scientific perspective, Challenger Deep was an invaluable opportunity to collect samples from the deepest part of the ocean," said Leon-Zayas, the paper's lead author, now an assistant professor at Willamette University. Scientists traditionally have learned how microbes work by growing and studying them in petri dishes and beakers. It wasn't until DNA sequencing advanced to include the ability to separate and test microbes present in environmental samples (such as soils or sediments) that scientists realized they had missed a huge portion of bacteria now called the Candidate Phyla Radiation (CPR). One group of CPR microbes called the Parcubacteria had been seen in the groundwater and shallow sediments of a few places on land, but it had only been intensively studied in sediment samples from an aquifer near Rifle, Col. When Cameron collected sediment samples at the bottom of the trench, the scientists discovered that many different species of Parcubacteria live there, too. "We were interested in seeing if the microbes living at the bottom of the ocean had the same lifestyle as the microbes living in soils in Rifle, Colorado," said Biddle, a marine microbiologist and associate professor in the College of Earth, Ocean, and Environment's School of Marine Science and Policy. Leon-Zayas used a sorting technique to separate the microbial cells from the sediment particles so that scientists could amplify and sequence the microbe DNA. The researchers then characterized the individual microbial genomes. Based on the genes that are present in the genome -- sections of DNA that define what metabolisms a cell is capable of -- scientists can infer what the bacteria is doing. This genomic sequencing revealed that Parcubacteria from the deep sea have a fairly simple metabolism; but the genomes were larger than that of their terrestrial cousins and even had a few extra features. In particular, these features indicated the bacteria may be able to perform anaerobic respiration, using things like nitrate to breathe instead of oxygen. Parcubacteria also seemed to have more proteins and enzymes associated with cold environments, not surprising since the bottom of the Mariana Trench is cold and dark. "It makes sense that organisms at the bottom of the ocean might have to be more self-sufficient. The environment is extreme and there isn't as much food," Biddle said. While the discovery adds a new branch on the microbial family tree, many unanswered questions remain. According to Biddle, who is part of a UD team that recently earned a Keck Foundation grant to dive deep into microbial research, DNA sequencing has revealed a huge new area of microbiology that was unknown a decade ago. Rapid technology development has been key to the field's advancement, she said, from the development of submersibles capable of transporting scientists to the bottom of the trench, to new sophisticated instruments, like flow cytometers, that help scientists sort, sequence and analyze the tiniest of organisms. The more scientists discover, however, the more they realize there is to learn. "It's a huge area for discovery right now," Biddle said. ### In addition to Biddle and Leon-Zayas, other co-authors on the paper included Douglass H. Bartlett, Logan Peoples and Sheila Podell from Scripps Institution of Oceanography at University of California, San Diego; Roger S. Lasken and Mark Novotny from J. Craig Venter Institute; and James Cameron of Earthship Productions. The project was supported by the National Science Foundation, the National Aeronautics and Space Administration, National Institutes of Health Marine Biotechnology Training, Prince Albert II Foundation and Earthship Productions. Scientists have made a crucial step towards unlocking the "holy grail" of computing - microchips that mimic the way the human brain works to store and process information. A research team, including Professor C. David Wright from the University of Exeter, have made a pioneering breakthrough by developing photonic computer chips - that use light rather than electricity - that imitate the way the brain's synapses operate. The work, conducted by researchers from Oxford, Munster and Exeter Universities, combined phase-change materials - commonly found in household items such as re-writable optical discs - with specially designed integrated photonic circuits to deliver a biological-like synaptic response. Crucially, their photonic synapses can operate at speeds a thousand times faster than those of the human brain. The team believe that the research could pave the way for a new age of computing, where machines work and think in a similar way to the human brain, while at the same time exploiting the speed and power efficiency of photonic systems. The research is published in Science Advances on Wednesday, September 27 2017. Professor Harish Bhaskaran from Oxford University and who led the team said "The development of computers that work more like the human brain has been a holy grail of scientists for decades. Via a network of neurons and synapses the brain can process and store vast amounts of information simultaneously, using only a few tens of Watts of power. Conventional computers can't come close to this sort of performance." Professor C David Wright, co-author from the University of Exeter, also explained: "Electronic computers are relatively slow, and the faster we make them the more power they consume. Conventional computers are also pretty 'dumb', with none of the in-built learning and parallel processing capabilities of the human brain. We tackle both of these issues here - not only by developing not only new brain-like computer architectures, but also by working in the optical domain to leverage the huge speed and power advantages of the upcoming silicon photonics revolution." Professor Wolfram Pernice, a co-author of the paper from the University of Munster added: "Since synapses outnumber neurons in the brain by around 10,000 to 1, any brain-like computer needs to be able to replicate some form of synaptic mimic. That is what we have done here." On-chip photonic synapse by Zengguang Cheng, Carlos Rios, Wolfram Pernice, C David Wright and Harish Bhaskaran is published in Science Advances. ### The work was supported by the UK's Engineering and Physical Sciences Research Council (EPSRC). For decades, astronomers have tried to pin down why two of the most common types of active galaxies, known as Type I and Type II galaxies, appear different when observed from Earth. Although both galaxy types host voracious supermassive black holes known as active galactic nuclei, which actively swallow matter and emit massive amounts of radiation, Type I galaxies appear brighter to astronomers' telescopes. New research from an international team of astronomers, with contributions from the University of Maryland, makes a major modification to a popular theory called the unified model. According to this model, the active nuclei of Type I and Type II galaxies have the same fundamental structure and energetic profile, but appear different solely because the galaxies point toward Earth at different angles. Specifically, Type II galaxies are tilted such that they are obscured by their own rings of dust, making Type I galaxies appear brighter by comparison. The new results, published September 28, 2017, in the journal Nature, suggest that Type I and Type II galaxies do not just appear different--they are, in fact, very different from each other, both structurally and energetically. The key factor that distinguishes Type I and Type II galaxies is the rate at which their central black holes consume matter and spit out energy, according to the researchers. "The unified model has been the prevailing wisdom for years. However, this idea does not fully explain the differences we observe in galaxies' spectral fingerprints, and many have searched for an additional parameter that fills in the gaps," said Richard Mushotzky, a professor of astronomy at UMD and a co-author of the study. "Our new analysis of X-ray data from NASA's Swift Burst Alert Telescope suggests that Type I galaxies are much more efficient at emitting energy." To conduct the study, Mushotzky and his colleagues re-examined data from 836 active galaxies detected by NASA's Swift Burst Alert Telescope that strongly emit high-energy, or "hard," X-rays--the same X-rays that medical technicians use to visualize the human skeleton. To measure the mass and growth rate of these galaxies' active nuclei--the supermassive black holes at the galaxies' centers-- the researchers used data from 12 different ground-based telescopes spread across the globe to complement the data from the Swift satellite. "This project began in 2009, as part of my doctoral work at UMD, and has radically grown with the help of more than 40 researchers across the globe," said Michael Koss (M.S. '07, Ph.D. '11, astronomy), a research scientist at Eureka Scientific, Inc. and a co-author of the paper. "When I started out, I spent a month of lonely nights by myself at the Kitt Peak National Observatory observing a few dozen galaxies. I never dreamed we would eventually expand to such a large sample, enabling us to answer many amazing scientific questions for the first time." By comparing differences in the X-ray spectra between Type I and Type II galaxies, the researchers concluded that, regardless of which way the galaxy faces Earth, the central black holes in Type I galaxies consume matter and emit energy much faster compared with the black holes at the center of Type II galaxies. "Our results suggest this has a lot to do with the amount of dust that sits close to the central black hole," said Mushotzky, who is also a fellow of the Joint Space-Science Institute. "Type II galaxies have a lot more dust close to the black hole, and this dust pushes against the gas as it enters the black hole." For decades, astronomers preferentially studied Type II galaxies, largely because the active nuclei of Type I galaxies are very bright, making it difficult to see the stars and gas clouds that constitute the rest of the galaxy. Because the unified model suggested that all active galaxies were fundamentally the same, astronomers focused their efforts on the galaxies that host Type II active nuclei because they are easier to observe. "But now, because our results suggest that the two types of galaxies are indeed fundamentally different, it is likely that a lot of researchers will re-evaluate their data and take another look at Type I galaxies," Mushotzky said. "By putting us on a path to better understand the differences between the galaxies that host Type I and Type II active nuclei, this work will help us better understand how supermassive black holes influence the evolution of their host galaxies." ### This research was led by Claudio Ricci of the Pontificia Universidad Catolica de Chile and the Chinese Academy of Sciences South America Center for Astronomy. The data was collected by a team led by UMD alumnus Mike Koss (M.S. '07, Ph.D. '11, astronomy), who is currently a research scientist at Eureka Scientific, Inc. For more information on the survey and the research team, please visit http://www.bass-survey.com This research was supported by NASA (Award No. NNH16CT03C); the Chinese Academy of Sciences (CAS; Award No. XDB09030102); the Swiss National Science Foundation (Award Nos. PP00P2 138979, PP00P2 166159, and PZ00P2 154799/1); the National Natural Science Foundation of China (Award No. 11473002); the Ministry of Science and Technology of China (Award No. 2016YFA0400702); the Chilean Ministry of Economy, Development, and Tourism (Award No. IC120009); the Chilean Fondo Nacional de Desarrollo Cientifico y Tecnologico (FONDECYT; Award Nos. 1141218 and 1160999); the Chilean Centro de Astrofisica y Tecnologias Afines (CATA; Award No. Basal-CATA PFB-06/2007); the Ministry of Education, Culture, Sports, Science and Technology of Japan (MEXT; Award No. 17K05384); the European Research Council (Award No. 340442); and the China-CONICYT fund. The content of this article does not necessarily reflect the views of these organizations. The research paper, "The close environments of accreting massive black holes are shaped by radiative feedback," Claudio Ricci et al., was published in the journal Nature on September 28, 2017. Media Relations Contact: Matthew Wright, 301-405-9267, mewright@umd.edu University of Maryland College of Computer, Mathematical, and Natural Sciences 2300 Symons Hall College Park, MD 20742 http://www.cmns.umd.edu @UMDscience About the College of Computer, Mathematical, and Natural Sciences The College of Computer, Mathematical, and Natural Sciences at the University of Maryland educates more than 7,000 future scientific leaders in its undergraduate and graduate programs each year. The college's 10 departments and more than a dozen interdisciplinary research centers foster scientific discovery with annual sponsored research funding exceeding $150 million. North Carolina Research Campus - Sept. 26, 2017- Dr. Robert Reid, Research Assistant Professor with UNC Charlotte's Bioinformatics Services Division at the North Carolina Research Campus, has been awarded a $25,000 grant through the Bill and Melinda Gates Foundation for the "Improvement of Banana for the Smallholder Farmers in the Great Lakes Region of Africa". The goal of the Gates Foundation is to reduce hunger and poverty for millions of farming families in Sub-Saharan Africa and South Asia by increasing agricultural productivity in a sustainable way. Dr. Reid will be working with Dr. Al Brown of the International Institute of Tropical Agriculture (IITA). The IITA, celebrating its 50th year, is a non-profit organization that generates agricultural innovations to meet Africa's most pressing challenges of hunger, malnutrition and poverty. Improving crops in sub-Saharan Africa is one of IITA's top priorities. In sub-Saharan Africa, where millions depend on agriculture not only for food but also for their livelihoods, IITA's research provides solutions to hunger, poverty and natural resource degradation. Using sophisticated genetic engineering or selective breeding, IITA develops a wide range of staple crop varieties for different situations and purposes. Improved crops can have more farmer-preferred traits like higher yields or desired coloration. In addition, IITA scientists produce biofortified crops that address hunger and micronutrient deficiencies particularly in children and women. These diverse crops can also have a longer shelf life, need less time to grow, or have better disease and pest resistance making them highly valuable to farmers. Banana and plantain crop improvement is crucial to IITA's research mandate. Their work to fight major banana and plantain pests and diseases is producing impressive results and securing one of the continent's primary food sources. IITA scientists have introduced high-yielding, disease and pest resistant varieties with durable fruit quality. The final objective is to create high-yielding banana hybrids by 2019 that can be multiplied for large-scale distribution. Uganda and Tanzania consume as much as 50% of all bananas in Africa, but only yield 9% due to disease and pests. IITA's genetic research aims to improve resistance and boost banana yields by 30%. Such tools and strategies enhance the capacity of smallholders throughout sub-Saharan Africa to produce enough banana and plantain to meet demand. Drs. Brown and Reid project is to improve genomic breeding approaches for the East African Banana. Dr. Brown, who obtained his PhD from the University of Illinois, has considerable experience with both conventional and marker-assisted breeding of several vegetable and fruit crops. At North Carolina State University, he was the lead PI on an international collaborative project to generate the first genomic draft sequence of the blueberry. He was also the first researcher to use high density SNP arrays of rapeseed to generate saturated genetic linkage maps of related plant species. As an inaugural member of NCSU's Plants for Human Health Institute, (PHHI) at the North Carolina Research Campus, Brown conducted collaborative research with industry partners to identify genetic factors in broccoli and blueberry, enhancing nutritional profiles and phytochemicals that are associated with human health. He is a believer in translational science and believes that we can and should bridge the gap between basic and applied research to find real-world solutions to agricultural and health concerns. Dr. Reid received his PhD in Bioinformatics from UNC Charlotte. Through various projects at PHHI, Drs. Reid and Brown began their collaboration work on the blueberry genome assembly, followed by the genetic analysis of glucosinolate variability in broccoli florets. Focusing mainly on genomics, Dr. Reid has been involved sequence assembly projects include the assembly and analysis of the oat and blueberry genomes, the transcriptome assemblies of various plants as well as echinoderms, assay development for genotyping and marker mapping, genome annotating, gene expression studies and characterizing plant pathways using a variety of bioinformatics approaches. For this project, Dr. Reid will be sequencing selected varieties of the East African highland banana for the purpose of developing an Illumina SNP microarray, specific for banana genotyping. Further research will compare and contrast the sequencing results to the current banana reference genome to identify single nucleotide polymorphisms (SNPs), which will be used in collaboration with Illumina to facilitate construction of a banana SNP chip. These efforts will be used to identify genetic marker regions on interest. Ultimately, this will guide and accelerate breeding strategies to develop new varieties of crops that are more resistant to disease, provide more nutrition for consumers and better yield for farmers, stimulating local economies. ### Are we are living in a computer simulation? Intriguingly, the crux of this question may be hiding in an exotic quantum phenomenon which shows up in metals as a response to twists of space-time geometry. A recurring theme in science fiction, most famously popularised by the "Matrix' film trilogy, is whether our physical reality is a computer simulation. While this seems to be a rather philosophical idea, in theoretical physics it has an interesting twist when applied to computer simulations of complex quantum systems. How can one even attempt to give an answer to this question? In new research published in Science Advances magazine, a team of theoretical physicists from the University of Oxford and the Hebrew University, may have found a way to approach this answer. While trying to address a computer simulation of a quantum phenomenon occurring in metals, the researchers, Zohar Ringel and Dmitry Kovrizhin, found proof that such a simulation is impossible as a matter of principle. More precisely, they showed how the complexity of this simulation, - that can be measured in a number of processor hours, memory size, and electricity bills, - increases in line with the number of particles one would have to simulate. If the amount of computational resources required for a quantum simulation increases slowly (e.g. linearly) with the number of particles in the system, then one has to double a number of processors, memory, etc. in order to be able to simulate a system twice as large in the same amount of time. But if the growth is exponential, or in other words if for every extra particle one has to double the number of processors, memory, etc., then this task becomes intractable. Note, that even just to store the information about a few hundred electrons on a computer one would require a memory built from more atoms than there are in the Universe. The researchers identified a particular physical phenomenon that cannot be captured by any local quantum: Monte-Carlo simulation. It is a curious effect, which has been known for decades, but has only ever been measured indirectly. In the field of condensed matter physics, it is called the "thermal Hall conductance" and in high-energy physics it is known as a "gravitational anomaly". In plain words, thermal Hall conductance implies a generation of energy currents in the direction transverse to either temperature gradient, or a twist in the underlying geometry of space-time. Many physical systems in high magnetic fields and at very low temperatures are believed to exhibit this effect. Interestingly such quantum systems have been evading efficient numerical simulation algorithms for decades. In their work, the theorists showed that for systems exhibiting gravitational anomalies the quantities which are involved in quantum Monte-Carlo simulations will acquire a negative sign or become complex. This ruins the effectiveness of the Monte-Carlo approach through what is known as "the sign-problem". Finding a solution to "the sign problem" would make large-scale quantum simulations possible, so that the proof that this problem cannot be solved for some systems, is an important one. 'Our work provides an intriguing link between two seemingly unrelated topics: gravitational anomalies and computational complexity. It also shows that the thermal Hall conductance is a genuine quantum effect: one for which no local classical analogue exists', says Zohar Ringel, a professor at Hebrew University, and a co-author of the paper. This work also brings a reassuring message to theoretical physicists. It is often said in society that machines are taking the place of people, and will eventually takeover human jobs. For example, in the event that someone, for instance, creates a computer powerful enough to simulate all the properties of large quantum systems, in the blink of an eye. Clearly the appeal of hiring a theoretical physicist to do exactly the same job (with the overhead considerations of office space, travel money, pension etc.) would be greatly diminished. But, should theoretical physicists be alarmed by this possibility? On the bright side, there are many important and interesting quantum systems, some related to high-temperature superconductivity, and others related to topological quantum computation, for which no efficient simulation algorithms are known. On the other hand, perhaps such algorithms are just waiting to be discovered? Professor Ringel and Kovrizhin argue that, when it comes to a physically important subset of complex quantum data, a class of algorithms as broad as Monte-Carlo algorithms, cannot outsmart us and are not likely to in the near future. In the context of the original question of whether our perceived reality is really just a part of an advanced alien experiment, this work may provide extra reassurance to some of us. ### Notes to editors The full citation for this paper is: "Quantized gravitational responses, the sign problem, and quantum complexity", Science Advances, http://advances.sciencemag.org/content/3/9/e1701758 PHILADELPHIA - A pilot program that uses big data to predict which lung cancer patients will require a trip to an emergency department (ED) successfully anticipated a third of all ED visits over a two week trial period, and was further able to identify which patients were at high risk and low risk of requiring such care. The predictive model was designed by researchers at the Perelman School of Medicine at the University of Pennsylvania with the eventual goal of developing a tool for early intervention that will help patients avoid ED visits. They will present their data as an oral abstract at the American Society of Therapeutic Radiation Oncology (ASTRO) 2017 Annual Meeting in San Diego (Abstract #2022). Lung cancer is the most common diagnosis among cancer patients who visit emergency departments, most frequently because of infection, pain management, or other symptoms related to their disease. Roughly 40 percent of lung cancer patients will visit the ED during the course of their treatment, and 60 percent of those visits result in hospital admission. In addition, reports have shown lung cancer dwarfs other cancer types in terms of ED visits among cancer patients, making up 33 percent of all such visits according to one recent study. These visits come with a cost for patients - financially and psychologically - as well as for the healthcare system itself. The cost of lung cancer care overall in America is expected to increase to $14.73 billion by 2020, according to the National Cancer Institute. "The need to be able to anticipate these visits is crucial, but there are very few studies that assess risk factors in a way that allows for early intervention by a clinician," said the study's lead author Jennifer Vogel, MD, a resident in Radiation Oncology at Penn. The model developed by Penn uses patient information pulled from electronic medical records. It identified key comorbidities like hypertension, liver disease, and cardiac arrhythmia. It also flagged specific symptoms like nausea, vomiting, and weight loss, as well as the values of lab results, such as abnormal platelet count, creatinine, and white blood cell count. "Our model pulls all of this together and weighs each factor to determine a personalized risk for each patient at any given point in time," said senior author Abigail T. Berman, MD, MSCE, an assistant professor of Radiation Oncology at Penn and the associate director of the Penn Center for Precision Medicine. "It also gives physicians real-time alerts when a patient is deemed to be at high risk." After developing the model with data from 2,500 patients and validating it with a second set, the researchers put it to use during a two-week pilot program. During that time, the model was able to anticipate 68 of the 207 ED visits (33 percent) required by lung cancer patients. The predictions also showed promise in categorizing patients into risk levels. Of the 131 patients identified as "high-risk", 13 (10 percent) presented to the ED. For the 678 patients grouped as "low-risk", only 10 (1.5 percent) required an ED visit. This demonstrates that the model successfully differentiates between high and low risk patients, as patients designated as high risk were 6.6 times more likely to visit the ED compared to those designated as low risk. "Our hope is that triage nurses and physicians will be able to use this information to intervene before an ED visit is necessary," Berman said. These interventions can include reaching out to the patient to preemptively schedule an outpatient visit, taking action to better manage the symptoms that would lead to the ED visit, or other proactive measures. Researchers say the next step is to categorize the reasons for each ED visit and the actions physicians took during the pilot phase. They also plan to incorporate natural language processing elements into the model in order to improve its predictive value. ### Penn Medicine is one of the world's leading academic medical centers, dedicated to the related missions of medical education, biomedical research, and excellence in patient care. Penn Medicine consists of the Raymond and Ruth Perelman School of Medicine at the University of Pennsylvania (founded in 1765 as the nation's first medical school) and the University of Pennsylvania Health System, which together form a $6.7 billion enterprise. The Perelman School of Medicine has been ranked among the top five medical schools in the United States for the past 20 years, according to U.S. News & World Report's survey of research-oriented medical schools. The School is consistently among the nation's top recipients of funding from the National Institutes of Health, with $392 million awarded in the 2016 fiscal year. The University of Pennsylvania Health System's patient care facilities include: The Hospital of the University of Pennsylvania and Penn Presbyterian Medical Center -- which are recognized as one of the nation's top "Honor Roll" hospitals by U.S. News & World Report -- Chester County Hospital; Lancaster General Health; Penn Wissahickon Hospice; and Pennsylvania Hospital -- the nation's first hospital, founded in 1751. Additional affiliated inpatient care facilities and services throughout the Philadelphia region include Good Shepherd Penn Partners, a partnership between Good Shepherd Rehabilitation Network and Penn Medicine. Penn Medicine is committed to improving lives and health through a variety of community-based programs and activities. In fiscal year 2016, Penn Medicine provided $393 million to benefit our community. NEW YORK (September 26, 2017) - A new WCS study, published in the journal Ecosystem Health and Sustainability, of fish traders in coastal Kenya shows that women largely occupied fisheries with the lowest profits and are not saving money while working in these fisheries. Management actions that intend to increase profits and sustainability, such as restrictions on use of gear that catch the smallest fish, have the potential to exclude female traders unless management also promotes social equity and gender coexistence. The study, by Tim McClanahan and Caroline Abunge of WCS Kenya Marine Program, suggests that women have difficulties persisting in the more profitable fisheries, which along the coast of Kenya are often those where low numbers of larger fish are caught. Men largely occupy the profitable fisheries and women are more likely to fill trader roles in fisheries with the lowest profits. These low-profit fisheries generally focus on the catch of a large variety of small fish, often at unsustainable levels. The authors' findings result from a study of 142 traders in 19 Kenyan coral reef fisheries that varied in their management and profitability. The authors argue that if promoting sustainability and profits are not managed to promote female inclusion, women can easily and unintentionally be excluded. Further, in the absence of good management and social equity programs, women can become the dominant traders and yet fail to make profits or achieve sustainability. This follows increasing awareness on the roles that gender and management can play in fisheries, which is expressed in recent UN-FAO fisheries development themes. Said lead author, Senior Conservation Zoologist Tim McClanahan: "Ignoring gender in fisheries has the potential to undermine efforts to achieve two social goals: gender equity and fisheries sustainability. Both goals are best achieved when addressed together." Maintaining resources at intermediate levels where overall production, catch, and fish body size diversity are high, and increasing gear and market diversity will help achieve gender coexistence and sustainability according to the authors. Participating in profitable fisheries requires traders to have capital, use cell phones to communicate with distance markets, and take risks; behaviors that were more common among the male traders in this study. Female traders need capital and greater mobility in order to reduce their chances of exclusion from more profitable and sustainable fisheries. Women in coastal Kenya also need better access to fisheries knowledge and general education to help them take more active roles in fisheries management interventions. ### This work was made possible by The Tiffany & Co. Foundation, a longstanding supporter of WCS's marine conservation program since 2000. Kenya's Office of Science and Technology provided research clearance. WCS (Wildlife Conservation Society) MISSION: WCS saves wildlife and wild places worldwide through science, conservation action, education, and inspiring people to value nature. To achieve our mission, WCS, based at the Bronx Zoo, harnesses the power of its Global Conservation Program in nearly 60 nations and in all the world's oceans and its five wildlife parks in New York City, visited by 4 million people annually. WCS combines its expertise in the field, zoos, and aquarium to achieve its conservation mission. Visit: newsroom.wcs.org Follow: @WCSNewsroom. For more information: 347-840-1242. From: American Evaluation Association (AEA) For Immediate Release: Dateline: Washington , DC Wednesday, September 27, 2017 Xiaoxia Newton, co-Chair of ICCE and an Associate Professor at College of Education, UMass Lowell. Im happy to promote our international awardees sessions and encourage you to attend their presentations. Our awardees spanning three continents (Southeast Asia, Latin America, and Africa). Hot Tip: Enhance the quality of evaluation work through capacity building among diverse stakeholder groups The role for an evaluator is a hotly debated issue. Our conceptions of what roles evaluators ought to play reflect a mixture of factors. These factors include our own disciplinary training, the context in which we conduct most of our evaluation work, the nature and types of programs and/or policy we typically are asked to evaluate, what we believe about who ought to be the primary audience of the evaluation findings (e.g., decision makers vs. program managers or participants), etc. Our evaluation approaches reflect our value systems concerning evaluator roles, explicitly or implicitly (e.g., evaluators as educators, as objective technicians or methodologists, as impartial external judges, as advocates for the least powerful stakeholders such as program participants, etc.). Our awardees work provides an excellent opportunity for examining the assumptions and values evaluators bring to the table when designing and conducting an evaluation. The evaluative work presented by these awardees takes place in diverse communities, though they share a common theme. The context of their work often presents varying degrees of complexities and challenges, including a lack of skills among program participants implementing what the program wants them to do, inadequate outcome indicators that are meaningful and useful, limited resources, and insufficient capacity among evaluators. Our awardees will share how they overcame these challenging and complex issues through their evaluative work. One practice we could learn from is the importance of capacity building among diverse stakeholder groups. The capacity building can take the form of forging partnerships between the evaluation team and local communities or among different organizations involved in the evaluation work. Capacity building can mean educating researchers who might not have in-depth knowledge or skills of evaluation. Capacity building can also mean providing direct training of program participants on what they are supposed to implement before evaluating the program impact. Hot Tip: Here are a few sessions of our international travel awardees: Thursday Concurrents 8:00am-9:00am 2797:All About Action: Evaluation Methods in the International Development Context at the Peace Corps Thursday Concurrents 1:15pm-2:00pm APC2:Evaluation to inform public-interest decisions: Examples from the US and Tanzania Friday Concurrents 8:00am-9:30am 3063:Modern Slavery and Human Trafficking: Filling the M&E Gaps for Effective Interventions Thursday Concurrents 11:30am-12:15pm ToE1:International Evaluation Perspectives Rad Resources: The TIG meeting will take place on Thursday, November 9 between 6:00 and 6:45p.m. (meeting place TBD). Attending the TIG meeting is a great way to network, learn about each others work, and get involved with the ICCE and AEA. The TIG meeting is also a great place to learn A to Z about the international travel award application process and support we offer to those who are interested in applying. The American Evaluation Association is celebrating International and Cross-Cultural (ICCE) TIG Week with our colleagues in the International and Cross-Cultural Topical Interest Group. The contributions all this week to aea365 come from our ICCE TIG members. Do you have questions, concerns, kudos, or content to extend this aea365 contribution? Please add them in the comments section for this post on the Hi, Im, co-Chair of ICCE and an Associate Professor at College of Education, UMass Lowell. Im happy to promote our international awardees sessions and encourage you to attend their presentations. Our awardees spanning three continents (Southeast Asia, Latin America, and Africa).The role for an evaluator is a hotly debated issue. Our conceptions of what roles evaluators ought to play reflect a mixture of factors. These factors include our own disciplinary training, the context in which we conduct most of our evaluation work, the nature and types of programs and/or policy we typically are asked to evaluate, what we believe about who ought to be the primary audience of the evaluation findings (e.g., decision makers vs. program managers or participants), etc. Our evaluation approaches reflect our value systems concerning evaluator roles, explicitly or implicitly (e.g., evaluators as educators, as objective technicians or methodologists, as impartial external judges, as advocates for the least powerful stakeholders such as program participants, etc.).Our awardees work provides an excellent opportunity for examining the assumptions and values evaluators bring to the table when designing and conducting an evaluation. The evaluative work presented by these awardees takes place in diverse communities, though they share a common theme. The context of their work often presents varying degrees of complexities and challenges, including a lack of skills among program participants implementing what the program wants them to do, inadequate outcome indicators that are meaningful and useful, limited resources, and insufficient capacity among evaluators.Our awardees will share how they overcame these challenging and complex issues through their evaluative work. One practice we could learn from is the importance of capacity building among diverse stakeholder groups. The capacity building can take the form of forging partnerships between the evaluation team and local communities or among different organizations involved in the evaluation work. Capacity building can mean educating researchers who might not have in-depth knowledge or skills of evaluation. Capacity building can also mean providing direct training of program participants on what they are supposed to implement before evaluating the program impact.The TIG meeting will take place on Thursday, November 9 between 6:00 and 6:45p.m. (meeting place TBD). Attending the TIG meeting is a great way to network, learn about each others work, and get involved with the ICCE and AEA. The TIG meeting is also a great place to learn A to Z about the international travel award application process and support we offer to those who are interested in applying.The American Evaluation Association is celebratingwith our colleagues in the. The contributions all this week to aea365 come from ourmembers. Do you have questions, concerns, kudos, or content to extend this aea365 contribution? Please add them in the comments section for this post on the aea365 webpage so that we may enrich our community of practice. Would you like to submit an aea365 Tip? Please send a note of interest to aea365@eval.org . aea365 is sponsored by the American Evaluation Association and provides a Tip-a-Day by and for evaluators. SALEM, Ohio The Columbiana County Farm Bureau hosted their annual meeting Sept. 26 at the Winona Friends Church in Salem. The event served as a year-in-review and celebration of the past years activities. Dave Cattrell read an extensive biography to honor the 2017 Distinguished Service Award winner, Kasey Hudson. Hudson was raised in New Waterford, Ohio, and is a sixth generation dairy farmer. Hudson She is the daughter of Kevin and Debra Baker and has three brothers; Kurt, Keith and Kaleb. Hudson was the 2006 Columbiana County Dairy Princess. This is where she got her start in promoting the dairy industry. She was a 13 year member of 4-H, junior fairboard member and selected as the 2007 Columbiana County 4-H Queen. She was also active in high school track and currently holds the Crestview High School discus record. After her high school graduation she went on to Youngstown State University to be a nurse, after just one year she decided the animals and farming were too dear to heart and started attending OSU ATI for dairy management. While at ATI she did a project on how to mange a dairy processing plant. The idea gained momentum as she set up her virtual business. She headed back to the farm in 2010 to make it a reality. Now she works with her family to manage and market Bakers Golden Dairy. She has introduced customers to more than 30 flavors of milk and has added ice cream to the offerings. Hudson has been educating and advocating in the community about dairy, giving tours of their dairy and speaking at various events to help people better understand the agricultural industry. She married Jason Hudson in 2012 and they have a daughter Justyce, 3, and a son Jett, 6 months. Hudson is happiest out in an open field on a tractor, she said. She brings her children to work with her every day and is proud to show them what farming and family is all about. Beaver Creek The county Farm Bureau hosted an event Sept. 9 at the Greenisen Farm, Farm to Forrest. The event was an eloquent dinner to support wildlife conservation and eating locally grown food. About 100 people attended, plus the volunteers. Profits from the event were donated to Beaver Creek Wildlife Education Center. Phil Greenisen presented a check for $5,000 to Cathy Cattrell representing Beaver Creek. Cattrell shared with the group that the education center started in 2002 as a 501c3 an has continued to grow, making two additions to their facility. These funds will be used to renovate the oldest part of the building, making some capital improvements, Cattrell said. Scholarships The Columbiana County Farm Bureau awarded four $1,000 scholarships this year. Nora Yankovich, a graduate of Minerva High School, now attending OSU majoring in agricultural/biological engineering; Ashley Hahn, a graduate of United Local Schools, and now attending Bowling Green State University majoring in business finance; Jarod Herron, a graduate of United Local Schools and now attending OSU, majoring in dairy science; and Michael Estock, a West Branch Local School graduate now in the OSU School of Veterinary Medicine. Trustees New trustees were elected for a two-year term: Fred Hippley, District 1; David Vollnogle, District 3; and Jay Cole, District 4. Four at-large trustees were also elected for a two-year term; Danielle Burch, Keith Baker, Herb Eglie and Dave Scharf. The county will be represented by David Vollnogle, Phil Greenisen, Herb Eglie, and Andy and Danielle Burch at the 2018 state annual meeting. Passing the gavel. Lastly, David Vollnogle was honored for his 5 years of service as the Columbiana County Farm Bureau president. He handed the gavel to incoming president Danielle Burch. Columbiana County Farm Bureau Kasey Hudson of Baker's Golden Dairy accepts her plaque as the 2017 Distinguished Service award winner. (Katy Mumaw photo) < > < > 1 View Columbiana County Farm Bureau Kasey Hudson of Baker's Golden Dairy accepts her plaque as the 2017 Distinguished Service award winner. (Katy Mumaw photo) 2 View Columbiana County Farm Bureau Columbiana County Farm Bureau hosted a Farm to Forrest dinner Sept. 9, profits from the event were present to the Beaver Creek Wildlife Education Center. (Katy Mumaw photo) 3 View Columbiana County Farm Bureau The new Columbiana County Farm Bureau President Danielle Burch thanked Dave Vollnogle for his 5 years of service as the county president. 4 View Columbiana County Farm Bureau Ohio Farm Bureau President Frank Burkett III talks with Ohio District 5 Representative Tim Ginter. (Katy Mumaw photo) 5 View Columbiana County Farm Bureau Kasey Hudson was honored as the 2017 Distinguished Service Award winner, presented to her by Dave Cattrell. (Katy Mumaw photo) The sheep industry has reacted with worry after rumours have surfaced that Defra Secretary Michael Gove may be prepared to fast-track a decision on lynx release. The National Sheep Association (NSA) is calling on representative farming bodies to unite to voice concerns over the proposals. NSA said it is aware that Lynx UK Trust, the organisation behind lynx re-introduction proposals, is continuing its campaign work while the application is being considered. But sheep farmers, who are worried re-introducing lynx will negatively impact on sheep farming, have called on Mr Gove to appreciate the "substantial and widespread" concerns rural communities have around the proposed lynx release. It comes as news that Lynx UK Trust has announced an agreement that will insure the UK's whole sheep population against lynx attacks. Phil Stocker, NSA Chief Executive, said: I know Mr Gove is interested in these proposals and I am certain now is the time for individual farmers, land managers and their representative organisations to make their feelings heard. I would go as far as urging every farmer who has views over this to write to the Secretary of State so he can appreciate the strength of stakeholder concerns, which go way beyond the losses that will be suffered by sheep farmers. Verdict A verdict on whether lynx should be released in Kielder Forest, Northumberland, is still pending after Lynx UK Trust submitted a formal application to Natural England earlier this year. The Government advisory body is currently reviewing information, and is expected to announce a decision in the coming months. NSA has been gathering industry and local opinion at a series of meetings in recent months, working with the National Farmers Union (NFU) and British Deer Society (BDS) as well as several hundred local stakeholders involved in fields such as farming, tourism, animal welfare, land management and conservation. Mr Stocker said: A connected approach, but in an individual capacity, is what is needed if we are to relay the true scale of our concerns. The risks to landscape and wildlife, heavily invested in for years, are real. Alongside disease and welfare risks, coupled with concerns around whether any lynx population could be genetically sustainable on our heavily populated island. This of course in addition to the resultant losses and stress on farmers. Losses Mr Stocker said a compensation package proposed by the Lynx UK Trust won't put everything right. We know from sheep farmers in Finland, Norway and elsewhere that losses go way beyond those predicted. I simply cannot accept that the conscious release of a high-level predator is compatible with the high level of animal welfare expected of British farmers, he said. With the proposed release site close to the Scottish border, NSA has been assured that no decision would be made without agreement from relevant Scotland authorities. Mr Stocker concludes: There can be no unilateral decision taken on this matter. With concerns in the devolved nations around a power grab being brought about by the Great Repeal Bill, it would be unbelievable if the devolved powers of Scotland were challenged in this way. Epic Systems Corp. is one of the nations biggest providers of electronic health records systems, but CEO Judy Faulkner is calling on her companys customers including some of the biggest health care organizations in the U.S. to think about their patients as more than just a collection of data. Electronic health records are so last year, Faulkner told Epics annual users group meeting on Tuesday. You have to look at who you are, she said, and consider a patients eating habits, sleep patterns, education, habitat and even issues such as loneliness. They are all factors in a persons health, she said. Faulkner attired in a red wizards gown and peaked hat, in keeping with the conferences theme, World of Wizards struck a wistful note in her address to health care executives. Dont we wish we could wave a magic wand? she said. Its just us people, working together, trying to make things better every day. On the practical side, Faulkner said Epic technology in the coming year will be more accessible on mobile devices and through voice command, and will give patients more say over their health history. She also touted Epics programs that let health care providers share information about a patient a process called interoperability. The Verona company has taken heat in recent years from some who claim Epic has not gone far enough in that direction. Faulkner said Epic exchanges 2 million records a day using its Care Everywhere program, many more than its competitors who formed a record-sharing alliance in 2013 called CommonWell. What CommonWell has done in a lifetime, you folks do every 12 minutes, Faulkner said. Epics customers serve 66 percent of U.S. patients and are used by hospitals in 11 other countries. Switzerland is the latest country with an Epic presence with the recent addition of Luzerner Kantonsspital in Lucerne, and Epic systems will go live at facilities in Canada, the Netherlands, Finland and Saudi Arabia in the coming months, Faulkner said. She said health care groups with Epics electronic systems have used the programs to improve patient health and to cut costs, including reducing deaths from sepsis, a potentially life-threatening complication from an infection; screening patients for potential suicide risk; and slashing the wait time to get an appointment. Faulkner suggested, though, that U.S. providers follow the lead of other countries and incorporate social care, such as linking low-income patients to food pantries and child services, helping to prevent opioid addiction and providing a bridge to end-of-life care. I wish there was magic. We have to be wizards, Faulkner said, closing her speech to the John Lennon song Imagine. Advances in technology Sumit Rana, Epics senior vice president of research and development, said Epic will offer more options for tele-health in 2018, with on-demand video visits for patients and the possibility for several people, even from different organizations, to participate in the video appointments. He also said Epics long-awaited App Orchard went live this week, offering a marketplace for applications that mesh with Epic systems. Some of the apps have been created by Madison-area startups. Other speakers pointed to Epics machine learning algorithms an approach to artificial intelligence saying they have been used on 1.6 million patients to help predict conditions such as diabetes. After the mornings sessions, several attendees had enthusiastic reactions to Epics announcements. Christopher Longhurst, a chief information officer at UC San Diego Health and a pediatrician, said machine intelligence in health care cant come fast enough, and he praised Epics advances in mobile computing and analytics. As far as interoperability, Longhurst said Epics Care Everywhere has been a critical foundation in letting health care groups share a patients records, a practice that has transformed health care. The fact that more than 400 Epic clients have agreed to exchange data, even though some are competitors, is really quite magical, Longhurst said. I think the technical challenges of interoperability are solved, he said. But, he added, the challenge will be getting all health care groups to participate. Dr. Glen Geiger, chief medical information officer for The Ottawa Hospital in Canadas capital, said the small sessions among Epic users have been very helpful. People are trying to solve problems like we have, he said. The Ottawa Hospital just signed a contract with Epic three weeks ago, Geiger said. He said he knew Epics culture is different from some other electronic health care providers, but he was impressed by Faulkners broad vision. No other health IT vendor would have set a goal of improving health care as the focus of their meeting, Geiger said. Thats pretty visionary. Epic, founded in 1979, has about 9,600 employees and had $2.5 billion in 2016 revenue. About 17,000 health care executives and Epic staff are attending the users group meeting, which concludes on Thursday. Editor's note: This story has been updated to correct the performer of "Imagine." The Government has created a list of native farm animal breeds considered to be at particular risk of an outbreak of exotic disease. The list has been determined from expert advice of the UK Farm Animal Genetic Resources Committee (FAnGR). Disease outbreaks among farm animals can cause significant economic damage. Farmers are thus urged by the Government to follow biosecurity procedures, such as cleaning and disinfecting premises and vehicles. If there is an outbreak, Government contingency plans will be followed. These plans include designating affected premises, setting up protection and surveillance zones, and controls on livestock movements. Exotic diseases are those not normally found in the UK, such as avian influenza and zoonoses. By contrast, endemic diseases - such as tuberculosis in cattle - are always present. Defra has prepared a framework contingency plan to control exotic animal diseases with significant health or economic impact, for example, foot and mouth disease, African swine fever and avian influenza. The native farm animal breed list for cattle includes breeds such as the iconic Aberdeen Angus, Hereford, Shetland and British White. Sheep breeds at risk include the Balwen, Manx Loaghtan and the Shropshire breed. Pig breeds at risk include British Saddleback, Gloucestershire Old Spots and Tamworth. African Swine Fever Defra has recently raised the risk level of exotic pig disease African Swine Fever following cases discovered in Romania the Czech Republic and Poland. The risk level rating will raise from very low to low. Nevertheless, it is a cause for concern for many British pig farmers. The pig industry has produced some new materials urging the general public and farmers to do everything to keep African Swine Fever (ASF) out of the UK. The National Pig Association (NPA), the country's leading pig industry voice, has also warned of the dangers of wild boar in the UK transmitting the disease to domestic pigs. Survey figures last year estimated there were 1,562 feral wild boar roaming the forest of Dean, which is near Gloucester, with populations spreading to new areas. British wheat is on display at a trade delegation in Cairo, the worlds largest importer of the grain, in a bid to tap into the market. Millers and bakers from four private and three government-controlled Egyptian companies who together control 70-80 per cent of the North African countrys wheat imports will sample UK flour at an event in Cairo. It is part of a broad UK effort to tap into the worlds largest wheat import market. Egypt has a requirement of around 11 million tonnes a year and does not currently import any grain from the UK. This represents a significant opportunity for British agriculture, which typically produces a surplus of wheat and exports more than 80 per cent of this to the European Union. Egyptian bakers try out flour milled from UK-grown wheat at the AHDB workshop in Cairo Around 70 percent of Egypt's wheat imports are currently sourced from Russia and other Black Sea countries such as Romania. The remainder is sourced from France, Germany, Australia and USA. 'Ukp and uks' The aim of the event, which is hosted by the AHDB, is to demonstrate the suitability of ukp and uks for a range of biscuits and baked goods. Established over 10 years ago, the ukp and uks classifications were developed to make it easy for overseas customers to choose milling wheat for bread or biscuits at the specification they require without having to have detailed knowledge of individual varieties. With a population of 94 million growing at an estimated rate of 2-3 per cent annually, Egyptian wheat imports are projected to grow consistently in the coming years. Dorit Cohen, Export Marketing Executive (Cereals), said: In a post-Brexit environment the ability to be fleet of foot when export opportunities arise is key and soft wheat looks like a very real example of where collaboration across the supply chain could yield significant benefits. UK wheat is not widely known in the Egyptian market. Educating Egyptian millers and bakers on how to use UK flour to obtain the best results for their products will enable them to gain the confidence required and facilitate trade with the UK. Priyanka Chopra met the gorgeous South Indian actress Nayanthara in the US and the duo called themselves 'The sunshine girls'. The backdrop looks like they're in a restaurant and they look as cool as ever.PeeCee is in the US for the shoot of her upcoming Hollywood film 'A Kid Like Jake' and the filming began two months ago in New York City. Apart from that, she also interacted with kids at the UN Headquarters as part of her mission to provide quality and equal education to immigrant children. Check out the picture of sunshine girls Priyanka and Nayanthara below... Their Secret Holiday According to Mumbai Mirror, Sunny Deol took off for a week to London last month to be with actress and close friend, Dimple Kapadia. They Were Spotted At A Bus Stop ''The duo was spotted at a bus stop by a fan, Nisha Pal.'' Sunny & Dimple Were Waiting For Their Transport ''Sunny and Dimple looked comfortable in each other's company, chatting away as they waited for their transport to arrive.'' Sunny Deol's Affairs After Marriage According to a report in TOI, ''Despite married to Pooja Deol, Sunny allowed his reel affairs to spill out to real life.'' Sunny Dated Amrita Singh Too ''Even Amrita Singh was often heard saying that the only 'real man' in her life was Sunny Deol. Unfortunately, she had no idea then about Sunny's hidden relationship.'' Soon Sunny Started Dating Dimple ''After the revelation of Sunny's married life, Amrita moved on and soon Sunny's relationship with Dimple Kapadia started making the rounds.'' Sunny Gave Dimple The Status Of A Wife? ''Reports were rife that Sunny Deol had even given Dimple Kapadia the status of a wife, while still having a wife at home!' They Tried To Hide Their Relationship But... ''Even though Sunny and Dimple fiercely guarded their personal lives, their involvement was evident.'' When you travel, there are certain things you should consider when deciding which credit cards you should take with you on your trip. For international travel, such as to Europe, there are a few different things you should consider. For example: Which payment network -- Visa, MasterCard, American Express, or Discover? Does the card have foreign transaction fees? Does the card have good travel rewards, perks, or an introductory bonus? This isn't an exhaustive list, and there are certainly other factors that could be important to you. Having said that, let's take a closer look at the three major considerations listed here, as they can help the majority of consumers decide which cards are best. Visa, MasterCard, American Express, or Discover? The short answer is that Visa and MasterCard credit cards are generally the better choice when traveling abroad. While many smaller businesses in Europe don't accept card payments at all, among those that do, Visa and MasterCard have nearly universal acceptance. American Express cards are accepted at many places throughout Europe, especially at international hotel chains, in major cities, or other locations frequented by travelers, but AmEx isn't as widely accepted in Europe as it is in the United States. If an American Express credit card is your personal favorite, in terms of rewards or other benefits, bring it on your trip -- just be sure that you have a Visa or MasterCard credit card for situations where AmEx isn't accepted. Discover cards are even worse for foreign travel. Simply put, Discover cards are not widely accepted in foreign countries. While Discover's credit card products have some excellent reward programs and don't have any foreign transaction fees, they're best reserved for domestic use. Foreign transaction fees If you don't have much experience traveling outside the U.S., you may not be aware that many credit cards charge foreign transaction fees if you use them for any international purchases. Foreign transaction fees can vary depending on the credit card issuer and the particular credit card product, but a 3% fee is rather common. That means that for every $100 you charge overseas, an additional $3 will be tacked on to your bill. As you can probably imagine, for a long European vacation where you're spending thousands of dollars, this can certainly add up. The good news is that most major credit card issuers offer at least one credit card product that doesn't charge a foreign transaction fee. As of this writing, none of Capital One's credit cards charge foreign transaction fees, which is why the company's products regularly appear on our list of the best travel credit cards. Several cards issued by American Express, Barclaycard, Chase, and Citibank also have no foreign transaction fees, especially those that are co-branded airline and hotel credit cards. Travel rewards, perks, and introductory offers Competition among credit card issuers has never been higher than it is now. This situation has resulted in some of the best credit card reward programs, perks, and introductory offers that there have ever been. For example, there are many credit cards that earn cash back or miles at a 2% rate on all purchases, which was unheard of until a few years ago. Others offer excellent travel-specific perks, such as baggage insurance, airline incidental reimbursement, free TSA Pre-Check, and more. As far as introductory offers go, many credit cards offer new cardholders lucrative sign-up bonuses after spending a minimum amount. Others offer 0% intro APR periods of as long as 21 months, which can save you lots of money if you're planning to charge most of your expenses on your trip and pay them off gradually. The Foolish bottom line In a nutshell, there's no perfect travel card for everyone, although there are some that are better suited to European travel than others. Your goal should be to find a credit card that will be accepted everywhere you'll need to use it, doesn't charge foreign transaction fees, and has the perks and rewards that matter to you the most. The White House and congressional Republicans just released their long-anticipated framework for tax reform, and there are many significant changes for both corporations and individuals contained in the nine-page document. Here's a rundown of the major changes that Americans should know about as the tax reform process gets underway. Corporations will get a big tax break The cornerstone of President Trump's tax agenda has always been a massive tax cut for corporations. The logic behind this is that our corporate tax rate is not globally competitive -- the top rate of 35% is well above the 22.5% global average for the industrialized world. In fact, even many Democrats (including former President Obama) have said that the corporate tax structure in the U.S. needs to be reformed. According to the GOP tax reform framework, the corporate tax rate will be reduced to 20%. This isn't quite as aggressive as the 15% rate the president has been pushing for, but it's still low enough to achieve the objective of boosting our global competitiveness. For many American companies, this could also mean billions more in profits. In addition, there will be incentives for companies to repatriate cash that is currently stashed overseas, although the framework didn't mention any specific rates. The framework also allows corporations to immediately write off new investments in depreciable assets, but limits the deduction for interest expense and says that several other business exclusions and deductions will be repealed. Business credits for research and development, as well as for low-income housing, will be preserved. As you might expect, corporations seem to be happy with the plan. For one example, "The National Restaurant Association applauds the tax reform framework released moments ago. We look forward to engaging with the President and Congress as the negotiations regarding tax reform continue," according to Cicely Simpson, the executive vice president of public affairs for the National Restaurant Association Individual tax rates: From seven tax brackets to three (or maybe four) On the individual side of the tax code, the current seven-bracket structure with rates from 10% to 39.6% will be consolidated into just three brackets with 12%, 25%, and 35% tax rates, which is mostly in line with previous GOP proposals. The tax framework also provides for the creation of a fourth tax bracket with a higher rate, in order to ensure the tax system remains sufficiently progressive. While the lowest tax rate would increase by 2 percentage points, the proposed higher standard deduction (more on this in a bit) should help to offset the change for most lower-income Americans. Do you have "pass-through" income? For small businesses conducted as sole proprietorships, partnerships, and S corporations, which have "pass-through" income, a newly created tax rate of 25% would apply. There is some concern that wealthy individuals would attempt to recharacterize their income to take advantage of this, but the framework says that measures should be put in place to prevent this from occurring. A higher standard deduction During the presidential campaign, then-candidate Trump's tax plan included a much higher standard deduction, and this is included in the GOP framework. The plan would include a standard deduction of $12,000 for single filers and $24,000 for married taxpayers filing jointly -- nearly double the current amounts. However, it's important to mention that this amount includes the personal exemption, which is currently $4,050 per person. While this certainly simplifies the tax structure, it could actually result in some people getting a lower net deduction, especially larger families. In addition, the deduction would likely mean that fewer middle-income families would be able to take advantage of the mortgage interest and charitable contribution deductions, since the threshold where itemizing would become worthwhile will be much higher. Which deductions will stay, and which will go? As I just mentioned, the mortgage and charitable deductions would remain, but would likely become less useful to many taxpayers. Other than those, the framework calls for the elimination of many others. As it's written in the framework, "In order to simplify the tax code, the framework eliminates most itemized deductions, but retains tax incentives for home mortgage interest and charitable contributions." While the framework doesn't specify exactly which deductions are on the chopping block, one that's widely expected to go is the deduction for state and local taxes, which could be worth roughly $1 trillion over the next decade, and is currently the most used deduction by high-income households. Many people have been concerned that tax breaks for retirement savings or education might be going away, and while we don't know anything for sure, the plan calls for retaining tax benefits "that encourage work, higher education, and retirement security." Expanded tax breaks for families Since the higher standard deduction replaces the personal exemption, the framework proposes significantly increasing the Child Tax Credit and increasing the income limits for its phaseout, although it doesn't give any specific numbers. In addition, the plan would also create a new nonrefundable $500 credit for non-child dependents, regardless of their age. Two big tax breaks for the wealthy Finally, there are two major tax breaks included in the GOP framework that could greatly benefit the wealthiest American households. The first is the elimination of the estate tax, which is also known as the death tax. As of 2017, the estate tax is only imposed on estates valued at $5.49 million or more. Republicans have wanted to repeal this for a long time, so this shouldn't come as a surprise. The second is the proposed repeal of the alternative minimum tax, or AMT. The AMT was created to ensure that high-income Americans paid their fair share of taxes, but as time went on, the tax has added unintended complexity, and has started to affect the middle class more and more. So, while this is certainly a tax break for the wealthy, it could actually be a welcome tax break for many middle-income households as well. The bottom line on the GOP tax framework To be clear, there weren't many big surprises in the GOP tax framework, although it did finally provide some much-needed specifics. Most of the framework was consistent with previous tax proposals by Republicans in Congress or with President Trump's tax agenda. Also, there aren't nearly enough specifics to say whether the plan will actually result in a middle-class tax cut or if the wealthy will have to pay as much or more than they do now. The mentioned "fourth tax bracket" could be a rate of 40% or more on high earners, or it could be excluded from a final bill just as easily. We simply don't know yet. Finally, it's important to point out that there are likely to be significant changes when a final tax reform bill is drafted, so take the framework with a grain of salt. Two La Crosse area grocers are filing objections to the recent auction of some Gordys County Market locations, including La Crosse. The motions were filed Tuesday and a hearing is set for Thursday morning in Chippewa County Circuit Court to finalize the results of Mondays auction of Gordys properties held in Milwaukee. In one of the filings, attorneys for Quillins Quality Foods argue the winning bidders for stores in La Crosse, Arcadia and Galesville also needs to receive the blessing of the properties landlord, Hegenbarth Investments LLC. Gordys, a Chippewa Falls-based grocery chain, announced in September that it was heading into receivership after Nash Finch, a Michigan-based food supplier, brought a lawsuit in Chippewa County Court claiming Gordys owed $86 million. The troubled chain has sold several of its locations to Festival Foods as well as closing a number of others in recent weeks. Quillins bid against Nash Finch in the auction, with Quillins bid coming in at $450,000 and Nashs winning bid at $550,000. The filing states Quillins has come to an agreement with Hegenbarth on assigning terms of the lease of the properties to Quillins, and the lawyers stated their belief that Hegenbarth will not come to an agreement with Nash on the sale. The filing goes on to state that Quillins is willing to be the backup bidder for the Hegenbarth stores at the higher $550,000 price tag. Messages left at Quillins offices in La Crosse were not immediately returned Wednesday. A similar filing was made by lawyers for Hansens IGA, who objected to the auction results for the sale of Gordys Neillsville Foods. Hansens IGA bid $125,000, which came in second to bidder Randy Goetz offer of $150,000. Hansens lawyers argue Goetz also needs to get the consent of the stores landlord, Schafer Properties of Chippewa County, and that Hansens would be willing to match the $150,000 offer as a backup bidder. Goetz was allowed to increase his bid to an amount greater than Hansens bid, but subject to Schafers consent to an assignment of the lease, Hansens attorney Andrew Bosshard of La Crosse stated in the motion. This unfair change in auction procedures created an uneven playing field because Goetz could continue raising his offer with a contingency that he cannot satisfy, thereby compelling Hansen to effectively bid against itself, and creating the illusion of a fair auction. Quillins started in a single store in La Crosse in 1949 with founders Ed and Greta Quillin and later added locations in Minnesota and Iowa. The stores remain family owned by Tim and Mike Quillin, third-generation descendants of Ed and Greta. Hansens IGA operates nine store locations in western Wisconsin. The family-owned grocery chain started in 1968 with a small store on Commercial Street in downtown Bangor. UK oilseed rape prices found strength in the week to 27 September, gaining 3.10/t to 310.50/t ex-farm for spot delivery. Prices were supported by firmer global values, driven by a strong export demand for US soya beans. This was despite reports of limited UK trade following the arrival of a rapeseed cargo from Romania last week and on-farm attention focused on field work. In addition, a stronger sterling against the euro should have weighed on markets, but they appear to have held firm, said grain traders. See also: All the latest prices and trends After two weeks of consecutive declines, caused by the stronger pound and rapeseed imports earlier this month, UK delivered prices (November 2017, Erith) were back above last years level, said Helen Plant, AHDB senior analyst. As of last Friday (22 September), November values had climbed to 324.50/t, compared with 319.00/t in November 2016. The future direction of UK rapeseed prices would ultimately depend on global prices, influenced by the size of US soya bean crop, global supplies and South American soya bean planting progress, added Ms Plant. Planting of the 2017-18 soya bean crop was now under way in Brazil, with the country predicted to plant a record-breaking 34.7m hectares, according to Reuters. However, concerns about dry weather delaying activity could support UK prices. Sony's next-generation phones will get a complete makeover News oi -Chandrika Sony has recently launched the Xperia XZ1 in India. Up until now, Sony has made all of its smartphones based on a single set of design principles, which is officially known as OmniBalance. Although Sony devices are surely good to look at, they have retained the same design for quite a while now. However, the Japanese OEM is soon going to change that. Kenichiro Hibi, the managing director of Sony India has said so in an interview with The Indian Express. To quote him, "We have deployed an OmniBalance design as long as the X series continues to be available in the market. Also, we are planning to launch new generation of products and you can expect a complete new design from the devices." Well, we are not really surprised with the announcement though. The rumor mill has been suggesting that instead of using the old OmniBalance design, Sony will take up a new design, allegedly called Mirai. However, it is always better to get the information straight from the horse's mouth. Talking about the new design, Kenichiro Hibi was pretty reluctant to delve into the details. That being said, he acknowledged the recent trend of bezel-less displays with high aspect ratio. Hence, we are assuming that the upcoming Sony devices may also come with full-screen design and minimal bezels. Unfortunately, it was not clear from the interview, when exactly will the Sony device featuring a new design will get launched. Our best bet is Q1 2018, since around that time the company releases its first flagship. Well, as of now, we have no option but to wait. Meanwhile, Sony has recently launched the Xperia XZ1 in India. You can check out the first impression of the smartphone here. Best Mobiles in India Facebook, To stay updated with latest technology news & gadget reviews, follow GizBot on Twitter YouTube and also subscribe to our notification. Allow Notifications Hundreds Feared Dead, Tens of Thousands Displaced in Ethnic Clashes in Ethiopia Sputnik News 16:26 26.09.2017(updated 18:35 26.09.2017) Inter-ethnic clashes in southern Ethiopia have led to widespread bloodshed amid the struggle for arable land over the past month, the country's authorities have said. "We can say hundreds from the Oromo ethnicity were killedand there were also deaths on the Somali side, we don't know exactly how many," government spokesman Negeri Lencho told reporters at a press conference on Monday, AFP reports. This month's clashes are part of a longstanding conflict over disputed arable lands claimed by both nationalities, which has intensified following the killing of two local administrators in Oromia region earlier this month. The murders provoked violent protests among ethnic Oromos. Last week, Oromia head Lemma Megersa estimated that 50,000 people had been displaced by the clashes. Lenco said that authorities have established an emergency headquarters to help deal with the refugees in the region and mediate efforts to resolve the conflict. Federal police and military units have been dispatched to the conflict zone to ensure order. Open clashes have been quelled on the Oromia-Somali regional borders. The spokesman confirmed that the government would probe the bloodshed. Ethiopia is divided into 11 ethno-linguistically based regional states and separate chartered cities. The Oromo, who make up a 35% plurality of the country's population, and the ethnic Somalis have a long history of clashes about rights to arable land. In 2004, a referendum was carried out to settle the issue, but disputes have persisted, with each side accusing the other of the use of local armed groups. Recently, Oromos accused the Somali region's Liyu special police force of being involved in some of the incidents. The heads of each region signed an agreement meant to settle the unrest earlier this year. Mediation efforts are underway. Ethiopia's Somali region has borne the brunt of a massive drought this year, which has resulted in nearly 8 million people requiring emergency food aid. Sputnik NEWS LETTER Join the GlobalSecurity.org mailing list Enter Your Email Address Denmark Builds Warship Using N Korean Forced Labor Sputnik News 12:36 26.09.2017(updated 15:51 26.09.2017) After it was revealed that construction of Denmark's new warship, the Lauge Koch, was built using North Korean forced labor, suspicions were raised that Danish taxpayer funds may have ended up in Pyongyang's nuclear and missile programs. Barely a week after Denmark condemned North Korea for its continued nuclear tests in a meeting with North Korean ambassador to the Nordic country, a documentary by Danish Radio has revealed that Copenhagen may have indirectly financed Pyongyang's nuclear ambitions. In the documentary "The Warship's Secret" aired today, on September 26, Denmark's state-of-the-art warship the Lauge Koch was reported to have been built in Poland using North Korean forced labor workers. The accusations were substantiated by contracts, receipts and eye witnesses. The Lauge Koch, which has cost the Danish state over 500 million DKK ($80 million) and will be unveiled in December, was partially outsourced by the Danish ship builder Karstsensens Skibsvrft to Crist, Poland, which was found to have hired a Polish subcontractor that used North Korean workers employed via the company Rungrado. North Korea's state-owned Rungrado is now hit by sanctions for alleged trafficking in missile technology. So far, it is unclear how many Danish tax kronor have ended up in North Korea. However, according to UN figures, Pyongyang earns up to $2 billion through its foreign workers, fueling its need for hard currency due to heavy sanctions. Since Kim Jong-un's rise to power, the number of North Korean workers abroad has risen and is now estimated at around 100,000. "North Korean workers abroad are an important source of hard currency, used for developing the North Korean nuclear and missile programs," Jai-chul Choi, South Korea's ambassador to Denmark, said in the DR documentary. "If Danish taxpayer funds were to be used for the nuclear and missile programs, it would be catastrophic," he added. Several Danish parties, including the Social Democrats, the Red-Green Alliance and the Social Liberal Party, demanded an explanation from Defense Minister Claus Hjort Frederiksen. "We need to get to the bottom of this, especially to prevent it from ever happening again in the future," Social Democrats defense spokesman Henrik Dam Kristensen told Danish Radio, calling the incident "grotesque." Red-Green Alliance foreign spokesman Nikolaj Villumsen called this "unacceptable" and ventured that it is completely incomprehensible how it could have happened at all. "This is an embarrassing case for the Polish authorities, but it is also an embarrassing case for the Danish Defense," Social Liberal Party foreign spokesman Martin Lidegaard said. The Armed Forces and Karstsensens Skibsvrft initially denied any North Koreans having been involved in the construction of the Lauge Koch. However, Brigadier General Anders Mrkedahl of the Defense Materiel and Purchasing Board admitted that it was not possible to completely rule out their participation. In the documentary, a number of Polish shipyard workers confirmed that the North Koreans had worked as welders on the Danish ship. "It would be completely outrageous if it were really true that North Korean forced labor has been used in an EU country like Poland. But I find it hard to see what we could possibly do to investigate the allegations about the construction of the Lauge Koch now, several years after the ship has been completed," Defense Minister Claus Hjort Frederiksen wrote in an e-mail to Danish Radio. According to the documentary, the North Korean foreign workers live under slave-like conditions, being deprived of their passports and free movement, living under constant surveillance and working up to 20 hours a day. Of their wages, they are only allowed to retain a small amount, if anything at all. Several NGOs have previously described the North Koreans as "modern slaves." "For years, Pyongyang has exploited North Korean workers in Poland with the blessings of the political authorities in Warsaw, who have generously granted working visas while turning a blind eye to the inhumane conditions that these modern slaves suffer from," Willy Fautre, the director of Human Rights Without Frontiers (HRWF) claimed earlier this year in Parliament Magazine. Sputnik NEWS LETTER Join the GlobalSecurity.org mailing list Enter Your Email Address US Defense Chief in Afghanistan for First Visit Since New Strategy Announced By William Gallo September 26, 2017 U.S. Defense Secretary Jim Mattis landed in Afghanistan Wednesday on an unannounced visit his first since the White House unveiled a revised plan for the U.S.-led war here. Mattis landed in Kabul, his second stop on a South Asia tour that began in New Delhi. President Donald Trumps Afghanistan plan, announced last month, envisions a greater role for regional players, including India, to help break the deadlock with Taliban insurgents. During his stop in the Indian capital, Mattis praised Indias invaluable contributions to Afghanistan, and welcomed further efforts to promote Afghanistans democracy, stability, and security. Mattis Indian counterpart, Defense Minister Nirmala Sitharaman, promised to strengthen cooperation with Kabul, though he ruled out sending any Indian troops there. More troops The U.S. plan calls for a larger military presence in Afghanistan. Mattis recently announced the U.S. would send another 3,000 American troops, bringing the total number in the country to over 14,000. Trumps plan also calls for more bombs. Official military figures show the U.S. dropped more weapons (503) on Afghanistan during August than in any other single month since 2012. In a stalemate after 16 years of fighting, U.S. troops are involved primarily in a non-combat role, providing advice and assistance to Afghan defense forces and institutions. Trump has stressed that the U.S. troops will only be withdrawn based on conditions on the ground, and has refused to set fixed withdrawal dates, as did his predecessor, Barack Obama. The conditions-based approach has been welcomed by Afghan officials, who say it provides more certainty and wont allow the Taliban to wait out the timelines. They havent given timelines or withdrawal dates, which is a positive thing, said Ahmad Shah Katawazai, a senior Afghan diplomat in Washington. I am very optimistic about this, and we welcome the current strategy, he told VOA. But Trump officials have refused to say exactly what metrics they will use to define success in Afghanistan, leading some to worry about the threat of a perpetual war. Thats what Im afraid of, said Shamila Chaudhary, who worked on Afghanistan and Pakistan policy in Obamas National Security Council. That without actually announcing or detailing what the conditions are, that there will always be enough of a reason for us to stay in Afghanistan. The Trump administration hopes its more assertive stance in Afghanistan will result in enough military gains to pressure the Taliban to the negotiating table. But for now, there seems to be little reason for the insurgents to lay down their weapons. Currently, the U.S.-backed Kabul government controls only around 60 percent of the country; the Taliban controls or contests the other 40 percent. Pakistan Another key part of the White House strategy is putting pressure on Pakistan to end its alleged support for Afghan militant groups. Like the Obama administration, Trump officials have put increasing pressure on Pakistan a continuity welcomed by Afghan officials. We didnt put enough pressure on Pakistan to prevent them from supporting militant groups, says Katawazai. I hope the current administration uses more of a stick policy instead of a carrot. Mattis and Sitharaman addressed that issue on Tuesday. The very same forces which find safe haven in Pakistan have been the ones who have hit New York, as much as Mumbai, Sitharaman said, adding she raised the matter directly with Mattis. Though Mattis did not mention Pakistan directly, he added: There can be no tolerance of terrorist safe havens. Mattis flew directly over Pakistan on his flight from New Delhi to Kabul. U.S. officials denied that was meant as a slight to Pakistan, and insisted Islamabad should not worry about expanded Indian involvement in Afghanistan. Pakistan has come out recently again, saying they are fighting the terrorists, Mattis told reporters. I think Pakistan will find nothing out of line with India and the United States alignment in the same fight. NEWS LETTER Join the GlobalSecurity.org mailing list Enter Your Email Address Coalition Strikes Continue Against ISIS in Syria, Iraq From a Combined Joint Task Force Operation Inherent Resolve News Release SOUTHWEST ASIA, Sept. 27, 2017 U.S. and coalition military forces continued to attack the Islamic State of Iraq and Syria yesterday, conducting 48 strikes consisting of 54 engagements, Combined Joint Task Force Operation Inherent Resolve officials reported today. Officials reported details of yesterday's strikes, noting that assessments of results are based on initial reports. Strikes in Syria In Syria, coalition military forces conducted 37 strikes consisting of 38 engagements against ISIS targets: -- Near Dayr Az Zawr, a strike engaged an ISIS tactical unit and destroyed five vehicles. -- Near Raqqa, 35 strikes engaged 15 ISIS tactical units and destroyed 26 fighting positions, four vehicles, four ISIS supply routes and a heavy machine gun and suppressed five ISIS tactical units. -- Near Shadaddi, a strike engaged an ISIS tactical unit. Strikes in Iraq In Iraq, coalition military forces conducted 11 strikes consisting of 16 engagements against ISIS targets: -- Near Huwijah, three strikes engaged two ISIS tactical units and destroyed four fighting positions, two vehicle-borne bombs, two vehicles and two improvised explosive devices. -- Near Qaim, three strikes engaged an ISIS tactical unit and destroyed an ISIS headquarters, an IED and a vehicle. -- Near Rawah, five strikes destroyed two ISIS-held buildings, a vehicle-borne bomb, a vehicle-borne-bomb factory and a vehicle-borne-bomb storage facility and damaged an ISIS supply route. Previous Strikes Additionally, five strikes consisting of 14 engagements were conducted in Syria and Iraq on Sept. 25, for which the information was not available in time for the Sept. 26 report: -- Near Dayr Az Zawr, Syria, three strikes engaged an ISIS tactical unit and destroyed a vehicle, a fighting position, a heavy machine gun and an IED. -- Near Huwijah, Iraq, two strikes destroyed 10 vehicles, six ISIS boats, three fighting positions, a command-and-control node, a tactical vehicle and a dump truck and damaged a fighting position. Part of Operation Inherent Resolve These strikes were conducted as part of Operation Inherent Resolve, the operation to destroy ISIS in Iraq and Syria. The destruction of ISIS targets in Iraq and Syria also further limits the group's ability to project terror and conduct external operations throughout the region and the rest of the world, task force officials said. The list above contains all strikes conducted by fighter, attack, bomber, rotary-wing or remotely piloted aircraft; rocket-propelled artillery; and some ground-based tactical artillery when fired on planned targets, officials noted. Ground-based artillery fired in counterfire or in fire support to maneuver roles is not classified as a strike, they added. A strike, as defined by the coalition, refers to one or more kinetic engagements that occur in roughly the same geographic location to produce a single or cumulative effect. For example, task force officials explained, a single aircraft delivering a single weapon against a lone ISIS vehicle is one strike, but so is multiple aircraft delivering dozens of weapons against a group of ISIS-held buildings and weapon systems in a compound, having the cumulative effect of making that facility harder or impossible to use. Strike assessments are based on initial reports and may be refined, officials said. The task force does not report the number or type of aircraft employed in a strike, the number of munitions dropped in each strike, or the number of individual munition impact points against a target. NEWS LETTER Join the GlobalSecurity.org mailing list Enter Your Email Address Virginia National Guard sends troops to Virgin Islands By Cotton Puryear, Virginia National Guard September 26, 2017 BLACKSTONE, Va. -- The first group of Virginia National Guard Soldiers assigned to the Staunton-based 116th Infantry Brigade Combat Team departed Sunday for the U.S Virgin Islands from Blackstone Army Airfield in Blackstone, Virginia, to join a multi-state, multi-agency response effort to recent hurricanes. The Soldiers will serve as a mission command headquarters and synchronize all National Guard operations assisting with recovery effort, and additional Soldiers from multiple units from across the commonwealth will continue to deploy in the coming days to provide additional assistance. "I am incredibly proud of how quickly and safely the Soldiers of the 116th Infantry Brigade Combat Team have come together in order to get much-needed assistance to the U.S. Virgin Islands, and that pride is amplified by the fact that these Soldiers volunteered to go," said Maj. Gen. Timothy P. Williams, the adjutant general of Virginia. "This has been an extremely complex operation that required the skills and experience from Army and Air Guard personnel from across the state, and a magnificent team effort has pulled together the people and equipment we need to do the mission. In many ways, the most important members of the team that makes all this work are our families and employers. Our Soldiers have left their jobs and their loved ones on very short notice to undertake a noble cause, and they couldn't do that without the critical support at home and at work. I want to extend a very special thanks for their continued support that is so important to what we do." Virginia Gov. Terry McAuliffe authorized the Virginia National Guard support Sept. 22 to join other state organizations providing assistance in the region. Advance teams from the 116th have been on the ground since Sept. 18 working with the Virgin Islands National Guard in determining what capabilities are needed and where they need to go. About 50 Soldiers departed Sunday, and another 350 Soldiers from multiple Virginia National Guard units from across the commonwealth and the remaining 50 Soldiers from the brigade headquarters are scheduled to depart in the next few days. "I feel privileged to be part of the mission going in to help the citizens of the Virgin Islands," said Lt. Col. Jared Lake, executive officer for the 116th IBCT who departed with the first group. "It is not often that you get the opportunity to do a humanitarian service mission, and everyone is motivated to get there and start helping the Virgin Islands with their recovery." Based on the current conditions, Lake said the Virginia Soldiers will most likely be distributing food, water and other supplies, helping clear debris and providing security. Soldiers assigned to 116th IBCT units stationed in Hamptons Roads, Northern Virginia, the Shenandoah Valley and the Lynchburg / Roanoke area are taking part in the mission. Soldiers from nearly every other major command in the Virginia National Guard are also providing personnel including the Fort Belvoir-based 29th Infantry Division, the Virginia Beach-based 329th Regional Support Group, the Bowling Green-base 91st Cyber Brigade, the Fort Pickett-based Medical Command, the Sandston-based 2nd Battalion, 224th Aviation Regiment as well as Joint Force Headquarters-Virginia and Virginia Air National Guard. Going into a area that has damaged infrastructure and short on supplies created a significant logistics challenge with the 116th needing to take everything it would need to conduct operations, Lake explained. Basic needs like food and water had to be packed, as well as computers, maps, overlay material, tables, chairs, generators and tents to conduct mission command. They also had to prepare vehicles and equipment for the support mission as well as taking repair parts and other maintenance items. Soldiers started preparing vehicles and equipment for air transport Friday and worked late into the night on Saturday to make sure everything was ready to fly, Lake said. An air transportation craftsman from the Virginia Air National Guard's 203rd RED HORSE Squadron helped unit movement personnel conduct final technical inspections on all the vehicles and pallets for shipment. On Sunday, Air National Guard crews from the New York and Kentucky National Guard flying C-130 transport aircraft arrived to transport all the Soldiers and equipment to begin the mission. The National Guard is responding to Hurricane Maria's devastation with more than 1,600 Soldiers and Airmen. Priorities for the Guard are moving food and water to those in need, augmenting local law enforcement to ensure community safety and engineer support to help rebuild essential infrastructure. In the U.S. Virgin Islands, the National Guard has reopened St. Croix's airfield to receive critical resupply and is facilitating reopening of sea ports as well. We are also clearing and repairing roads, manning and securing distribution points and shelters, and providing power generators to support critical infrastructure. NEWS LETTER Join the GlobalSecurity.org mailing list Enter Your Email Address Iraqi Kurdistan's independence push could spark ethnic war: Turkey's Erdogan Iran Press TV Tue Sep 26, 2017 03:08PM Turkish President Recep Tayyip Erdogan has warned Massoud Barzani, the president of Iraq's Kurdistan Regional Government (KRG), that the current push for the independence of the KRG could spark an "ethnic war" in northern Iraq. "If Barzani and the Kurdish Regional Government do not go back on this mistake as soon as possible, they will go down in history with the shame of having dragged the region into an ethnic and sectarian war," Erdogan said in a speech addressing academics at his palace in the capital Ankara on Tuesday. The Turkish president's comments came a day after the KRG held a provocative independence plebiscite in the Iraqi Kurdish region despite fierce opposition from Baghdad and neighboring countries Iran and Turkey. Ankara has already warned that disintegration of Iraq has the potential to turn into a major conflict. The contentious non-binding vote, which was announced by the KRG earlier in the year, was also held in the region much to the consternation of the international community that warned it could most likely throw the already violence-weary Arab country into more trouble. According to Iraqi Kurdish authorities, the turnout was 76 percent, with 3.3 million of the total 4.58 million registered voters having participated in the plebiscite. The results were expected to be announced within 24 hours following the referendum. Elsewhere in his remarks, Erdogan described the Kurdish referendum as "treason to our country," since it had come at a time of warm relations between Ankara and Erbil, the capital of the KRG. The Turkish president also strongly urged Barzani to "give up on an adventure, which can only have a dark end." "Until the very last moment, we weren't expecting Barzani to make such a mistake as holding the referendum; apparently we were wrong. This referendum decision, which has been taken without any consultation, is treachery," the Turkish president said. On Monday, Erdogan said he would seal the Turkish border with the Iraqi Kurdish region over the controversial plebiscite, threatening the Kurdish leaders with blocking their key oil exports. He also did not rule out military intervention in the region to counter the creation of a Kurdish state on its southeastern border, hinting that the would-be state could become a safe haven for Kurdish militants, notably the Kurdistan Workers' Party (PKK) militants, who fight against Ankara. On Tuesday, Erdogan reiterated that Turkey, which fears the effects of the referendum on its large Kurdish population, would consider all options, including economic sanctions and military measures, regarding the KRG, warning the Iraqi Kurds that they would go hungry if Ankara decided to stop the flow of trucks and oil across its border with northern Iraq. "All options are on the table right now and being discussed. You (the KRG) will be stuck from the moment we start implementing the sanctions," said Erdogan in Ankara, warning, "It will be over when we close the oil taps, all (their) revenues will vanish and they will not be able to find food when our trucks stop going to northern Iraq." 'Israeli flag will not save you' Elsewhere in his remarks, the Turkish president said only the Tel Aviv regime would recognize independence of the Iraqi Kurdistan Region. "Who will recognize your independence? Israel. The world is not about Israel. You should know that the waving of Israeli flags there will not save you" from regional isolation, Erdogan said, referring to some Israeli flags waved by a number of people in the streets of Erbil during the celebrations last night. On Monday, the Iraqi Defense Ministry announced that the country's army had begun large-scale military drills with the Turkish army along the common border. Earlier in the day, Iraqi legislators had called for the deployment of army troops to areas disputed with Kurds. Iran, for its part, has announced that it is opposed to the "unilateral" scheme for the independence of the Iraqi Kurdistan, underlining the importance of maintaining the integrity and stability of Iraq and insisting that the Kurdistan region is part of the majority Arab country. On Sunday, Iran also closed its airspace to all flights to and from the Kurdish region at the request of the Iraqi government. NEWS LETTER Join the GlobalSecurity.org mailing list Enter Your Email Address Iraq's Kurds Say 'Yes' to Creation of Independent State - Electoral Commission Sputnik News 17:26 27.09.2017(updated 20:13 27.09.2017) Iraqi Kurds have voted in favor of the creation of an independent state amid high tensions with the Iraqi government over the issue. The High Elections and Referendum Commission said on Wednesday that more than 92.73 percent of voters supported the idea of Iraqi Kurdistan's independence from Baghdad. The voter turnout was 72 percent, with 3.35 million people taking part in the referendum, according to official data. Some 2.8 million people voted for independence, while only 224,000, or 7.2 percent voted against it. The chairman of the election commission stated that the results of the referendum are legitimate and no violations were registered during the vote. "We carried out our work in all parts of Kurdistan. The process was very successful. Many international observers participated. The referendum was held without violations," the commission's spokesman said at a press conference. The central government in Baghdad has been pressing Erbil to cancel the results of the referendum over the past few days. Earlier on Wednesday, the Iraqi parliament instructed the government not to engage in a dialogue with Iraqi Kurds until the results of the referendum are canceled and gave Prime Minister Haider Abadi a "mandate" to send troops to the oil province of Kirkuk that is claimed by both Baghdad and Erbil. Baghdad also decided to ban flights to and from the airports of the autonomous region starting on Friday. Iraqi Kurdistan made the decision to hold the independence referendum in June. Following the announcement, the Iraqi government, as well as a number of foreign countries, including Turkey and the United States, have criticized the move. Sputnik NEWS LETTER Join the GlobalSecurity.org mailing list Enter Your Email Address Sewer rate hike coming? Here's why and how much it would cost you. CBU Director Vic Kelson said the additional dollars would allow the utility to pay for upgrades to reduce flooding and increase sewer capacity. PITTSBURGH Accurate, next day financial reporting is essential for proactive profitability-focused operators. Comprehensive operations reports with dynamic drill down capability are like headlights that examine the factors that impact performance. They show managers and owners where their business is, how it got there, and illuminate what they need to change to make it better. TPG Hotels & Resorts operates a portfolio of more than 50 hotels nationwide. Understanding what drives our profitability is essential, said Michael Brown, VP business intelligence for TPG. We use an Execuvue Hospitality Business Intelligence (BI) system to generate a variety of reports that detail expenses and revenue sources by property and brand. TPGs evaluation compares every aspect of hotel performance. Execuvue reports let us benchmark each property against others within its brand for comparisons that spotlight specific expenses that are outside nominal performance. Once we identify these exceptions we can reduce the specific costs before they impact property performance. Execuvue hospitality business intelligence also features an ad hoc report tool that lets TPG create custom company reports with percentage and dollar measurements that show 10 key metrics over the past five years compared to revenue. The ad hoc tool lets users manipulate items in their database to identify and understand potential problems and changes within the business. By looking at our historic expense trends on one page we can forecast where they will be in the coming year, Brown said. We use many standard Execuvue reports. I also create our own custom reports and dashboards on the fly. Our EOM numbers are essential and I generate them as needed at the touch of a button to evaluate performance of properties and our entire portfolio. TPG Hotels & Resorts is a top-ranked hospitality management company and fully accredited operator of the industrys most respected brands including Marriott (Starwood), Hilton, Hyatt, IHG and others. Aptech Computer Systems is a leading provider of hotel accounting software, hospitality enterprise accounting, budgeting, forecasting, and business intelligence systems. Click here for more on Aptechs products and services. Our company is unique. Our owners and managers have a wealth of experience and want to see property performance from different angles, said Monica Nichols, controller for Pinnacle Hotel Management which operates 26 major brand and independent properties. We leverage all our Execuvue BI systems reporting capability. Along with standard financial reporting, we use the systems ad hoc report building tool to drag and drop raw data elements to create custom reports that our regional directors request. This takes about a minute. Nichols said Pinnacle also turns to Aptechs professional team to create custom reporting. We let Aptech build several individual reports for us with unusual metrics like T/A fees as a percentage of revenue for hotels and across our portfolio. Once Aptech creates them, the reports reside on our system with easy pull-down functionality. In budget season we will send our properties custom reports with profitability based on specific expenses. This will save lots of time over previous years when I prepared property data manually. Execuvue provides information from prior years to simplify budgeting. The system lets us provide reports in PDF for fast viewing, or in an Excel format for managers that want to do their own what-if calculations. About Aptech Computer Systems Inc. Aptech Computer Systems, Inc., based in Pittsburgh, Pennsylvania, is the only provider of a fully integrated enterprise accounting, business intelligence and planning ecosystem to the hospitality industry. All clients are companies like yours, which own or manage hotels. Its solutions help customers at both the corporate and property levels understand their financial and operational data for faster goal achievement. The company is renowned for introducing business intelligence into the hotel industry and offers a solid resource of hospitality professionals. Aptech is an IBM Software Value Plus partner and Premier Solution Provider, as well as a Prophix Premier Business Partner. Incorporated in 1970, Aptech's state-of-the-art back office, true business intelligence and enterprise planning solutions are 100% hotel specific. Solutions include PVNG, Execuvue and Targetvue. Clients comprise more than 4,000 properties including large chains, multiple-property management companies and single-site hotels. Execuvue is registered to Aptech Computer Systems Inc. All other trademarks are owned by their respective holders. For more information, please visit www.aptech-inc.com. Cam Troutman Vice President +1 800 245 0720 Jericho, NY -- For hotels that are among the 65% planning to invest in location-based technologies in 2018, Kube Systems has some big news! The provider of mobile device charging solutions has partnered with Gimbal to bring location-based marketing to the guestroom via its Kube Essentials multi-device charger. This technology initiative will enable hotels to engage with guests by offering promotions and other contextual notifications to their mobile devices when in the room. The service enables hotels to drive revenue by vastly improving the consumer journey, both inside and outside the hotel room. "Thanks to smartphones, the hotel industry is in a period of tremendous change, and the way guests are engaging with hotels is undergoing a dramatic shift," said Dave Weinstein, Kube Systems vice president. "Advances in Beacon technology (via Bluetooth low energy) are enabling hotels to know exactly where a guest is on property at any given moment even inside the guestroom. With this level of intelligence, hotels can send contextualized messages to guests. "In many hotels today, when a guest walks past a beacon in a public area, he or she may be prompted to head to the lounge for a complementary cocktail or stop in the restaurant for the nightly special," Weinstein said. "With Kube Essentials in the guestroom, the same messaging can be used to lure guests out of their rooms and spend money in other outlets. It can also push messaging that encourages use of in-room services, such as in-room dining. Not only are we bringing location-based marketing services to the room, but it will give guests a place to charge ALL their mobile devices, including laptops. As more hotels invest in this technology, keeping guests' mobile devices charged will be more important than ever." According to Hospitality Technology's 2017 Customer Engagement Technology Study, 21% of hotels are already using beacons, and an additional 44% plan to implement a location-based marketing strategy for customer engagement next year. Essential to Mobile Marketing Kube Essentials is an all-in-one charging station with built-in cables, alarm clock and modular expansion options, including the addition of the Gimbal SDK inside. It's an affordable unit that still packs a punch with unmatched charging capabilities, versatility, and an engaging design. Kube Essentials charges ALL mobile electronics, including laptops with an AC power outlet. The option of a wireless Qi charging pad enables guests to "drop and charge" smartphones. Kube Essentials ensures investment protection with built-in charging cables that are completely upgradeable to next generation charging formats, including USB Type-C (reversible plug capability). As a clock, the LCD is large and easily seen from across the room. It features simple dimming controls, a straightforward alarm set and snooze button. With a compact and sleek design, the unit won't clutter the bedside table and blends with any guestroom decor. Best of Breed Beacons Since 2011, Gimbal has been helping brands across a range of industries reach their mobile advertising and marketing goals. In the hotel environment, Gimbal will deliver custom content to guests' using a smart combination of mobile apps, beacons, and geofences. "At Gimbal, we enable best-in-class location technology to power mobile marketing," said Paul Malcangio, Gimbal Senior Director of Enterprise Sales. "Our goal through this partnership is to help hotel marketers communicate to specific individuals with contextually relevant messaging. By connecting to the hotel's mobile app which includes the Gimbal SDK inside the Kube Essentials solution we can send targeted offers to guests that will enhance their stay experience." For details on Kube Systems products, visit www.kubesystems.com. For more information on Gimbal solutions, visit www.Gimbal.com. About Gimbal Gimbal is the industry's only open and independent platform for the aggregation and execution of consumer data. Through a combination of proprietary hardware and software, Gimbal enables brands, media agencies, marketers and enterprise clients to substantially improve the relevancy and effectiveness of their marketing communications. Visit www.Gimbal.com. About Kube Systems Kube Systems (www.kubesystems.com) was born from more than 50 years of experience by renowned hospitality brand Ramler International. Kube Systems designs, manufactures and markets unique technology solutions focused on the hospitality industry. Its solutions blend innovation with intuitive technology to enhance the guest experience. The Kube Systems suite of products combine the convenience of multi-device charging with portability, streaming audio playback and time keeping. Visit Kube Systems at CES January 6 to 9 at the Las Vegas Convention Center in SL-4. Dave Weinstein When Ebola struck the Sub-Saharan continent in the summer of 2014, thousands of travelers canceled their safari plans in South Africa, resulting in an immediate decline of multimillions of dollars given the tourist cancelations. Truth be told, South African cities such as Johannesburg and Cape Town were more than 2,000 miles from the epicenter of the outbreak, unlike the wildly successful summer destinations of the South of France and England, which were actually far closer to the sources of the viral outbreak. Unfortunately, the geographically challenged visitors, who could have seamlessly enjoyed their intended holidays, altered their plans, and the destinations that relied heavily on the bookings and inbound travel suffered economically, and greatly. And now, three years later, the Caribbean is feeling the effects of its own chain-reaction of natural disasters, while also trying to educate visitors with the topic of geography. In what appears to be a dynamic and active hurricane period, one of the busiest and most destructive season in decades, some of the islands of the Caribbean have witnessed destruction and evacuations like they've never seen before. And yet, despite these events, many more of the 32 island nations were actually not impacted at all, at least not by the hurricanes. Rather, these islands were affected by the immediate wave of cancelations and bookings, leaving hotel rooms unoccupied and inbound revenue absent. Geography Education is Key Which nations need recovery and support? The recent weeks have proven difficult for much of the Caribbean. The world has intently watched on as a series of destructive hurricanes have barreled through much of the region, leaving behind great devastation. While some islands escaped relatively unscathed, many were not as lucky. September 5, 2017, marked the beginning of the Caribbean destruction as Irma, an extremely dangerous Category 5 hurricane, made landfall on the island of Barbuda. The destruction continued as the storm, with maximum winds of 185 mph, passed over much of the Leeward Islands, including St. Martin/Maarten, St. Barthelemy, Anguilla, and the British and U.S. Virgin Islands. Also impacted by Irma's wrath were the Turks & Caicos and Cuba, as well as the Dominican Republic and Haiti to a lesser extent. After days of intense rain, violent wind, and dangerous storm surges, the Caribbean region was left with a devastating aftermath. Islands like Barbuda experienced virtually complete destruction of physical structures, while most others sustained severe damage to landscape, as well as physical structures, and many were left without power. The Prime Minister of Antigua and Barbuda, Gaston Browne, reported that roughly 90% of homes on his island of Barbuda were destroyed. Additionally, the hotel infrastructure on the island was damaged. These islands, which rely heavily on tourism, have been left with massive cleanup as they try to rebuild. Most recently, before reconstruction efforts could even begin to take place, the Caribbean was faced with yet another dangerous hurricane. Hurricane Maria took another hit at the already overwhelmed Leeward Islands, this time focusing its destruction on Dominica. Guadeloupe too fell victim to Maria, as well as both the British and U.S. Virgin Islands again, before the hurricane made landfall in Puerto Rico as a Category 4 hurricane with 155 mph winds. Dominica and Puerto Rico were severely impacted by the storm, both left with intense structural damage, as well as being entirely left without power. Specifically, Hartley Henry, Principal Advisor to Prime Minister Roosevelt Skerrit of Dominica, reported "tremendous loss of housing and public buildings." According to updates provided by CaribbeanTravel.com, the islands in most desperate condition are Barbuda, Dominica, St. Martin/Maarten, St. Thomas, St. John, and Puerto Rico. Still, much of the damage on these islands has yet to be completely assessed. An unfortunately active hurricane season has left much to be repaired in the region, but as many political leaders of the region have expressed, the Caribbean people are strong, and with support from around the world, they will rebuild. Which nations can welcome guests as others repair? Although many Leeward Islands have been devastated by these storms, there are still many Caribbean islands that have not been affected and are happily accepting visitors. According to Caribbean Travel Update, the following Leeward Islands, located between the northeastern Caribbean Sea and the western Atlantic Ocean, are open for business: Antigua: As of September 16, the island reports being open for business, with tours, restaurants, and hotels fully operating. More than 150 other dining locations are welcoming visitors. Around 2,000 of Antigua's hotel room inventory will be available for tourists by the end of October, following summer renovations. However, hotels open year-round are accepting travelers. Nevis: According to a September 22 update from Caribbean Travel Update, Nevis announced that the island did not suffer any significant damage post-Hurricane Maria, and hotels will reopen to guests as early as Friday, September 29. Kitts: Following investigations, the island is reopening to visitors, as it was not affected by Hurricane Maria. Hotels open year-round are completely operational. The island's international airport, Robert L. Bradshaw, resumed flights on September 20. Also available to welcome guests: While Hurricane Maria impacted many of the Leeward Islands because of their location in the path of the storm, the Windward Islands, situated in the West Indies (including Barbados, Grenada, Martinique, St. Lucia, St. Vincent, Trinidad & Tobago, and others), remain unharmed and are welcoming visitors. The Leeward Antilles, including Aruba, Bonaire, and Curacao, are islands that are situated along the southeastern Caribbean Sea and did not suffer hurricane damage. Other unharmed island options for tourists include the main islands of the Bahamas (New Providence and Grand Bahama), Cayman Islands, Jamaica, and the main tourist regions of the Dominican Republic (such as Punta Cana, as the Dominican Republic did not experience a direct hit). Bermuda, located in the Atlantic Ocean more than 1,000 miles out of the recent storms' paths, is also happily welcoming visitors at this time. What should hospitality developers know about climate-change impacts on the region? The Caribbean Basin is dependent on tourism. Unfortunately, the region is vulnerable to climate change and damage to natural resources due to the rising sea levels, erosion of beaches, and extreme weather events. Because of this, many entities and organizations throughout the region were founded on the premise of focusing their attention on improving the region's activities that involve climate change due to the significance of tourism to the national GDP of many of island nations. Instead of hiding from the facts, each island nation has taken the initiatives to develop new construction concepts to make hotel developments more resistant to climate change. A focus on energy production, land-use planning, regulations, and more stringent building codes has helped developers create new hotel products that are prepared for the changing times. Looking Forward Despite the tragic events of this year, the Caribbean will rebuild, as tourism remains the lifeline for many of these island nations. In the wake of the devastating impact of Hurricanes Irma and Maria on various Caribbean island nations, HVS CHICOS, the Caribbean Hotel Investment Conference and Operations Summit (www.hvschicos.com ), will work with the Rotary Foundation to provide necessities such as water, canned food, and clothing to residents throughout the Caribbean that were affected by these tragic events. The Rotary Foundation has local expertise and a long history associated with operating in the region, specifically on the islands impacted by the hurricanes. The organization has stellar ratings as one of the "Top 10 Charities in the World," according to CNBC, as well as a high Charity Navigator score. Beneficiaries receive 100% of funds donated. HVS CHICOS has made a donation to the Rotary Foundation. The Bermuda Tourism Authority, representing a nation not impacted by the storms, but an island that wants to help its brothers and sisters in the region, has generously matched the HVS CHICOS donation. Given its Atlantic location, Bermuda is more than 1,000 miles out of recent storms' paths, and is fortunately safe and sound, welcoming visitors. Bermuda is also eager to welcome HVS CHICOS conference attendees in November. Those who wish to also contribute to the Rotary Foundation click here. HVS CHICOS Chairman Mr. Parris E. Jordan will serve on the Rotary Foundation's Advisory Committee to ensure that the funds donated will be put to the use they are intended. The authors wish to thank both Catherine Ostuni and Tara Tempesta from Boston Universitys School of Hospitality Administration for their research and contributions to this article. Hilton Worldwide Holdings Inc. (NYSE: HLT) today announced the appointment of Raymond E. Mabus, Jr., and Zhang Ling to its board of directors, effective immediately. Mr. Mabus, an independent director, and Mr. Zhang were nominated for election by HNA Group following the tourism leaders strategic investment in Hilton. We welcome the addition of Raymond and Ling to the Hilton board, said Jonathan D. Gray, chairman of Hiltons board of directors. Their public and private sector experience globally will provide unique insight as the company looks for new ways to expand and also enhance the customer journey. Mr. Mabus brings significant public sector experience to the Hilton board, having served as the 75th United States Secretary of the Navy from 2009-2017. He was the United States Ambassador to the Kingdom of Saudi Arabia from 1994-1996, the 60th Governor of Mississippi from 1988-1992, and Auditor of the State of Mississippi from 1984-1988. In the private sector, Mr. Mabus served as Chairman and Chief Executive Officer of Foamex International, and a member of the board of directors of Enersys. He currently serves on the board of directors of Dana Incorporated. Mr. Zhang is currently CEO (Duty) of HNA Group and Executive Vice Chairman of HNA Group (International) Co., Ltd. Having joined HNA Group in 2000, Mr. Zhang has held a number of senior leadership positions within the company, including Chairman and CEO of HNA Tourism (Holding) Group Co., Executive Chairman of HNA Aviation Group, Chairman of HNA Aviation Group, and Chairman of HNA Caissa Travelling Group. From 2011-2013, Mr. Zhang served as the Vice Chairman of HNA Group International Headquarters (Hong Kong) Co., Ltd. He has been a member of HNA Groups board of directors since 2013. Kevin Harts alleged sex scandal has been messy and confusing, to say the least. The partner in the alleged sex tape, Montia Sabbag, has already stated that she isnt the one extorting Hart and is merely a victim in the midst of the scandal. While Montia Sabbag is in the middle of some newfound attention, she went to DailyMail to tell her side of the story. In a new interview with DailyMailTV, Montia Sabbag paid a visit to give her side of the story. During the interview, she detailed what actually went on during the weekend that both her and Kevin Hart hooked up. Sabbag says that both her and Hart met on a private flight from Los Angeles to Las Vegas where the two were surrounded by mutual friends. I met him (Kevin) on the plane, I was with a friend and we had no idea he was gonna be there. she said, He was with his friends. I thought he was cute, hes an attractive man, but I wasnt star struck or anything like that, it was super casual, he was a gentleman, a nice guy. She mentions she didnt go to see Hart but he began giving her a lot of attention. She later revealed that she was unaware of his marital status as well and the two had a natural chemistry with each other. I did not know he was married but I found out later, I was a little bit upset, confused about it because the way he was acting it didnt seem like he was married. Sabbag said. Over the weekend they spent together, they allegedly had sex three times. An interesting part about the whole scandal is that many thought that Kevin was drunk during the filming of the sex tape. However, Sabbag is now claiming that the two fornicated during the day, when he was stone cold sober. Everybody believed that the video was the night of the nightclub and that we were only intimate once, but it was a completely different day, the second time (we had sex), she said, If you really look at the tape it was during the day, it wasnt a night thing, he (Kevin) was sober, there was obviously a connection, Im not just someone he was with at night when he was intoxicated or something, it was more than that. she told the publication. Shes already denounced being the one behind the extortion plot but she says that she has an idea of who is. While the investigation is still ongoing, she didnt reveal much information but she speculates it was someone that was on the trip with them. With the newfound information surfacing, it definitely changes the way this scandals been perceived so far. kevin hart This is a pretty dope move by Roc Nation. To help support relief efforts for those affected by Hurricane Harvey, Irma & Maria, the Roc has reportedly teamed up with One America Appeal and CharityBuzz, to host an auction of memorabilia from this years Made In America Festival signed by JAY-Z, J.Cole, and more. The auction of course will raise money to which will be donated for the victims of the recent hurricanes. As for whats up for sale & auction, the pieces include 4 camouflage jackets that have the official, celebrity seal of approval on them. The Rocky jacket, which is estimated to be worth $3,000, includes handwritten signatures from JAY-Z, Migos, J. Cole, and Pusha T. The Liberty stage jacket will feature autographs from JAY-Z, Cardi B, 21 Savage, Marshmello and more. The Freedom stage will have signatures from London On Da Track, Vanic, Dirty South, Salva, and Cash Cash. Meanwhile lastly, the Tidal stage will have autographs from A Boogie Wit Da Hoodie, Jorja Smith, KYLE, Nick Grant, and more. The auction will begin Sept. 26 at 10 EST and end Tuesday, Oct. 10 at 5 p.m. EST. However Roc Nation isnt the only venture of Jay Zs stepping up and donating to Hurricane efforts. Tidal and Vic Mensa most recently partnered with MusicCares for two pop-up shows in Los Angeles and New York City. The show was established in order to gain supplies and donations for the hurricane victims. To gain entry as a fan, each person was required to bring toiletries or school supplies that would be donated to the various regions affected. While the LA show went down this past weekend, the NYC show is going down this Saturday, 9/30. RSVP for the NYC show is still open for now. If you cant make it, the show will also be streaming live on Tidal as well. In addition to these shows by Roc Nation, Jay Z himself is rumored to be taking the stage with his wife Beyonce on October 17 for a relief benefit concert at the Barclays Center. It will be Beys first performance since giving birth to twins Sir and Rumi Carter earlier this yea However, Jay Z isnt the only hip-hop figure who has donated to Hurricane relief efforts of course. Chris Brown, T.I., Nicki Minaj, DJ Khaled & more have all donated $25k as part of Kevin Harts #HurricaneHarvey challenge, meanwhile Diddy, Trae The Truth, and more have also made considerate contributions. [Via] Roc Nation Trippie Redd is back to drop a fresh new track off his upcoming mixtape. This track is titled, In Too Deep and features the rapper playing with some melodies and showing a softer side to rapping. The song comes off A Love Letter To You 2 thats set to drop on October 6th. To accompany the song, Trippie shares a video to his personal Instagram that details the rappers stage name in the best way. View it below. This new release matches the same tempo and vibe as his previous tracks I Know How to Self-Destruct and Woah Woah Woah. Although its not confirmed if they will be on his mixtape, its definitely taken as a clue as to which vibe the whole project will possess. The 18-year-old is making all the right moves when it comes to his fast-rising stardom. We reported that Trippie was in the studio with Lil Wayne not too long ago, with little information on what the two were working on. The only piece of work weve heard of the two was on Trippies track Fires & Desires where Lil Wayne dropped a verse. The Canton, Ohio rapper cites some special names as influencers to his music. Were talking Tupac and Ja Rule to Slipknot and KISS. Bouncing back from genres in terms of inspiration has clearly been giving Trippie the right kind of moves when it comes to rapping. His whole drive in music comes from a family tragedy where he then devoted himself to making it big as a means to carry on a legacy. Aside from the tracks previously mentioned, Trippie has a good year so far with collaborations. Hes featured on an unnamed track with D.R.A.M as well as dropping bars on Fuck Love, and the Uh Oh, Thots! remix with XXXTENTACION. Listen to the track tell us what you think. Who else should Trippie collaborate with? Quotable Lyrics In too deep like a bottomless hole Change my number just like summer clothes If you slimy wipe your fucking nose Keep a Glock I never trust a hoe 2faceded, theyre 2faceded hoes Aint got time for no 2faceded hoes After the attempt on Young Dolphs life yesterday (September 26th) that has left the rapper in critical but stable condition, investigators for the LAPD have reportedly made an arrest in connection with the shooting. According to The Los Angeles Times, one man has been arrested on suspicion of attempted murder that took place at Hollywood and Highland yesterday afternoon. Police say that Corey McClendon was arrested near the location of the shooting shortly after it occurred on Tuesday attack and has been booked as a suspect of attempted murder, this from Detective Megan Aguilar, acting as an LAPD spokeswoman. Theres no word yet on whether or not McClendon was the one who fired the gun or if he simply participated in the brawl that escalated to the point of someone opening fire in the popular tourist area of Los Angeles. Young Dolph, the 32-year-old Memphis-area rapper, was shot several times in the torso area after he began arguing with three men outside the Loews Hollywood Hotel, according to police information that was made available yesterday. After being shot,. Young Dolph managed to stand up and run into Shoe Palace, an establishment that is located on Hollywood Boulevard. Two of the men who had been involved with the altercation ran off, while the third jumped into a gold Cadillac Escalade and went to a gas station close by, before abandoning the vehicle and continuing on foot. McClendon was arrested early Wednesday morning and is being held with a bail set at $1 million. Several reports have the perpetrator(s) connected to the crew of rival rapper Yo Gotti, who was supposedly made a person of interst by the LAPD on Tuesday. Aguilar stated today that this information was inaccurate. According to her, the investigation has not yielded any solid evidence that the men who were present when Dolph was shot have any affiliation with Gotti. 2 Chainz, one of Dolphs frequent collaborators, sent his well wishes to the hospitalized rapper via Instagram this morning. Heres hoping that Dolph makes a speedy recovery from the horrifying incident soon and will be on stage spitting some bars in the near future. [Via] Young Dolph Weve been keeping you (extremely) updated on Young Dolph, as the 32-year old Memphis rapper was shot in Hollywood yesterday. Since the initial report of the shooting, which took place at the Hollywood and Highland intersection, weve received an update on his current state of being just that he was in critical, but stable condition as well as updates on the purported, or suspected shooters. Shortly after news broke of the shooting, a report surfaced that counted Yo Gotti as a possible suspect. Elsewhere, reports surfaced claiming that Yo Gottis crew and Dolphs crew were actively beefing outside the Loews Hollywood Hotel, which eventually spilled over into a physical fight, and later, into gunfire. Even so, some of these rumors have been debunked, at least until more evidence surfaces (or otherwise), by LA Detective Megan Aguilar. Aguilar states the information calling Gotti a suspect is inaccurate, and that there is no evidence yet that the shooter is connected to Gottis camp. We do know, whatever the case, that the rapper was embroiled in an argument with three men, and when he fell to the ground amid the argument, one of the men shot him several times all three then proceeded to flee, two on foot, and one in gold Cadillac Escalade. Aguilar also confirmed the police have arrested one suspect, Corey McClendon, in connection to the shooting, and that hes been booked on suspicion of attempted murder. McClendon was apparently near the location of the shooting when he was arrested, and hes sitting in a holding cell while his bail has been set for $1 million. In another update concerning Dolphs current physical health, its been revealed that the rapper actually underwent surgery last night. The bullets reportedly went in his arm and another in his butt, its unclear/unconfirmed if there were other entry points at this time. Its likely still a bit of long road until Dolph has recovered completely, but well be sharing updates on his condition as they arrive. Check out some of the well wishes from Dolphs colleagues below, were sending him positive vibes as well. Young Dolph It appears Young Thug had a little run in with the law over the past weekend and is now facing a felony drug charge, and a misdemeanor for having tinted windows. According to TMZ, the ATL rapper was picked up and arrested Saturday in Georgia by Brookhaven Police Department, and booked on one count of marijuana possession. In addition to that, he was also slapped with a charge for having tinted front windows on his vehicle as well. If were going by Thuggers issues with the law this year than he might have some luck on his side. Back in April, Thug got away with another felony drug charge after his charges were dropped after learning the raid on the rappers home in 2015 was done illegally by police, hence why all the charges were thrown out. In addition to that case, Thugger also got away with allegedly slapping a woman outside an ATL nightclub back in April because the judge didnt believe there was enough evidence to support a battery case against him. So all in all, hes escaped two arrests & charges this year. Well continue to keep you posted on the latest news moving forward. In the meantime, be sure to revisit his recently released Young Martha EP with DJ Carnage that dropped on Friday if you havent done so already. Thankfully thats just one of the new releases that Thugger has on the way for us. Hes recently been spotted in the studio working with Chance The Rapper, Future, and Lil Durk to name just a few. So stay tuned, more from Thugger is on the way. In other related news, Young Thug is scheduled to be taking the stage at this years STACKED Rolling Loud Festival in San Francisco. Joining him on stage at the end of next month will be Lil Wayne, Schoolboy Q, Lil Uzi Vert, XXXTENTACION, Kodak Black, 21 Savage, Dave East, Playboi Carti, and many more. Peep ticket info right here if interesting in checking out Thugger live. [Via] Young Thug Young Thugs had his fair share of public run-ins with the law since becoming a celebrity. Yesterday, it was reported that Young Thug was arrested in Georgia by Brookhaven Police Department. Since then, hes been hit with a felony charge for marijuana possession as well as a misdemeanor charge for tinted windows. Now, its being reported that Young Thug is looking at facing more felony charges. According to a report from TMZ, Young Thug is now facing two more felony charges on top of the charges hes already been hit with. The Atlanta rapper is looking at a felony charge for possession of a gun and an additional felony charge for drug possession. The rapper was reportedly pulled over by the police in Georgia after they said they smelled marijuana coming from his car. The police later searched his Maybach where they allegedly not only found marijuana but liquid codeine as well. They also ended up finding a gun in his vehicle as well as $50 thousand in cash. The rapper appeared in court this morning and posted bond. Hes currently out of jail right now. While the rapper is currently facing new charges, hes had a good streak of avoiding convictions throughout 2017. In April, he got off another felony drug charge after police raided his home in 2015. It turned out that the police went into his home illegally. In the same month, he also got off a battery charge after allegedly slapping a woman outside of a nightclub after she tried to pick a fight with Thuggers girl. So its safe to say that despite his legal troubles, hes been having some good luck on his side. Despite the legal battles, Young Thugs had a pretty solid year in music. The ATL rapper dropped two projects this year. Earlier in the summer, he dropped his latest solo mixtape Beautiful Thugger Girls and last Friday, he dropped his collaborative EP with Carnage. Thug also won his first VMA this past summer, although he was apparently unaware that he even got the award. Regardless of the legal troubles, Thugs been winning. We work towards an equitable, gender-just, self-reliant and sustainable fisheries, particularly in the small-scale, artisanal sector We work towards an equitable, gender-just, self-reliant and sustainable fisheries, particularly in the small-scale, artisanal sector We work towards an equitable, gender-just, self-reliant and sustainable fisheries, particularly in the small-scale, artisanal sector We work towards an equitable, gender-just, self-reliant and sustainable fisheries, particularly in the small-scale, artisanal sector Stay ahead of the trend in fashion and beyond with our free weekly Lifestyle Edit newsletter Stay ahead of the trend in fashion and beyond with our free weekly Lifestyle Edit newsletter Please enter a valid email address Please enter a valid email address SIGN UP I would like to be emailed about offers, events and updates from The Independent. Read our privacy notice Thanks for signing up to the Lifestyle Edit email {{ #verifyErrors }}{{ message }}{{ /verifyErrors }}{{ ^verifyErrors }}Something went wrong. Please try again later{{ /verifyErrors }} The Czech Republic is the least healthy country in the world, according to new research conducted by Clinic Compare. The clinic comparison website gathered their data from the World Health Organisation by analysing alcoholic consumption, tobacco consumption and the prevalence of obesity in 179 countries around the world. The UK came 19th in the list, with Britons also being the 9th heaviest drinkers in the world. According to the research, the residents of the Czech Republic hit it pretty hard, emerging as some of the worlds biggest boozers. Each individual reportedly consumes 13.7 litres of alcohol per annum, thats 550 shots so 1.5 shots a day. They also ranked 11th highest for tobacco consumption. Russia came second, followed by Slovenia, Belarus, Slovakia and Hungary. Eastern Europe came out as the unhealthiest region in the world, occupying nine out of the top 10 spots. The one exception was the US, which ranked 10th in joint place with Lithuania. As for the worlds fattest region, its Oceania, with 41 per cent of the population in Samoa having a BMI over 30. Fiji, Tonga, Tuvalu and Kiribati were also included in the top 10 list for obesity. The healthiest country was Afghanistan, boasting the second lowest rate of obesity in the world. Just 2.7 per cent of the population had a BMI over 30. Recommended Scientists might have found a new way to treat obesity Plus, residents only smoked 83 cigarettes a year and drank the least alcohol. The countrys laws which forbid the consumption and possession of alcohol probably have something to do with this. Guinea was named the second healthiest country, followed by Niger and Nepal, none of whom rival the drinking culture perpetuated in Eastern European countries. Cheers. New Delhi, Sep 27 (IBNS): Eight UK technology companies and several specialists, under the aegis of the country's Department for International Trade (DIT), are joining the Indian Mobile Congress 2017 being organised by the Cellular Operators Association of India (COAI), in collaboration with the Central government's Department of Telecom and Ministry of Communications, and the Ministry of Electronics and Information Technology. The UK is the partner country for the three-day conference and exhibition, which began on Wednesday at New Delhi's Pragati Maidan The conference aims to create a distinctive global platform for the telecommunication and allied industries in India. The UK trade delegation consists of top names in the British technology industry along with agile and innovative technology start-ups. Alexander Evans, Acting British High Commissioner to India who inaugurated the UK Pavilion at the conference, said, "The United Kingdom is a global technology powerhouse. Our country is investing 740 million from the National Productivity Investment Fund to ensure Britain remains at the forefront of digital innovation. Our trade delegation demonstrates our technological prowess, including leaders in state-of-the-art wireless connectivity solutions, satellite networks, data intelligence and digital skills platforms. We want to bring our cutting-edge technology and innovation to partner with initiatives like Digital India and the smart cities programme. India is one of the largest technology investors in the UK and I see an immense opportunity to buttress this two way partnership with both public and private players in India. He will address the session on Digital India sharing UKs vision to partner with India. The UK companies participating in IMC 2017 are Cobham, CultureGroup, Inmarsat, Kloudpad, Kumulos, SysMech, Third Space Auto Ltd and Inspired Mobile Rajan Mathews, Director General of COAI, said, "We are delighted to have the UK on board as a partner for IMC 2017. The event is expected to be the largest of its kind, in this part of the world, and the ideal platform for two countries like India and the UK to showcase their potential as partners in the future development of technologies and the consequent overall social and economic advancement. As the worlds second largest telecommunications market there is much that India can do for the UK in the areas of information and communications technology and vice versa. Together, India and the UK have the potential to revolutionise many areas including financial technology, cyber security, skill development, as well as the research and development in the sector through innovation. There is a huge opportunity for the enhancing business relationships between our two countries through IMC2017 and we look forward to work alongside the UK for long time to come. Mischa Dohler, Professor in Wireless Communications at Kings College London, is visiting IMC as a part of the British delegation. He is an expert in driving cross-disciplinary research and innovation in technology; sciences and arts, at the conference he will speak about innovation through Internet of Things. Mark Beresford an international business development and technology specialist with DIT is also a part of the delegation. He will meet Indian technology companies and discuss opportunities for Indian investments in UK. India is the fourth largest investor in the UK with the technology and telecoms sectors comprise 31% of Indian investment in the UK. In November DIT is taking technology delegations from India in the advanced manufacturing, electric automotive, healthcare, life-sciences and creative industries to Think India conference in the UK. This would be first ever UK-India business and technology month in the UK where Indian business delegations would be travelling to business hubs in the UK, looking at opportunities to strengthen trade and investment ties between the two countries. Image: Sudarsan Pattnaik/Twitter New Delhi, Sep 27 (IBNS): Prime Minister Narendra Modi urged everyone, especially the young, to visit India as part of his message for World Tourism Day, which is being observed on Wednesday. Tweeted PM Modi, "On #WorldTourismDay, I invite people from all over the world to come & discover the beauty of #IncredibleIndia & hospitality of our people." "I specially urge my young friends to travel across India & see first hand the diversity of our vibrant nation. #WorldTourismDay, " tweeted Modi. According to a United Nations release, tourism over the past six decades has become one of the fastest growing and most important economic sectors in the world, benefiting destinations and communities worldwide. International tourist arrivals worldwide have grown from 25 million in 1950 to nearly 1.2 billion in 2015. Similarly, international tourism revenues earned by destinations around the world have grown from 2 billion US dollars in 1950 to 1260 trillion in 2015. The sector represents an estimated 10% of the worlds GDP and 1 in 10 jobs globally. It is estimated that tourism will continue to grow at an average of 3.3% annually until 2030, the release said. Recognizing the importance of international tourism in fostering better understanding among peoples everywhere, in leading to a greater awareness of the rich heritage of various civilizations and in bringing about a better appreciation of the inherent values of different cultures, hereby contributing to the strengthening of peace in the world, the UN General Assembly proclaimed 2017 the International Year of Sustainable Tourism for Development. Other Union ministers and state chief ministers too took to the social media to convey their messages for World Tourism Day. Union Minister of State for Tourism (Independent Charge) tweeted, "Let us celebrate India, the incredible land. Let us experience India at its heart." Tweeted Shivraj Singh Chouhan, "Greetings on #WorldTourismDay. #MadhyaPradesh is blessed with natural and man-made splendours. I invite all to visit our beautiful state." "Discover the beautiful landscapes, cultures & people of Namma Karnataka, this #WorldTourismDay . Celebrating One State, Many Worlds!" said Chief Minister of Karnataka, Siddaramaiah Vasundhara Raje, Rajasthan Chief Minister tweeted, "Explore a paradise, where colours are heard and every archway tells a story. This #WorldTourismDay come,explore #Rajasthan #JaaneKyaDikhJaye." "On #WorldTourismDay, let us pledge to realise the potential of Assam through tourism & usher in an era of sustainable development." said Assam Chief Minister Sarbananda Sonowal. West Bengal Chief Minister Mamata Banerjee tweeted, "On #WorldTourismDay I welcome you all. Come to Bengal. Experience the sweetest part of India and take memories back home." Odisha Chief Minister Naveen Patnaik tweeted, "On #WorldTourismDay, inviting all to visit #Odisha, the land of myriad wonders & reaffirming commitment to make our state global destination." Also from Odisha, sand artist Sudarsan Pattnaik tweeted, "Today is #WorldTourismDay ,my SandArt with message "Sustainable tourism a tool for Development " at Bhubaneswar airport in Odisha." Image: Sudarsan Pattnaik/Twitter Darjeeling, Sep 27 (IBNS): After the appeal of Union home minister Rajnath Singh on Tuesday, Gorkha Janmukti Morcha (GJM), has finally called off an indefinite strike in Darjeeling after 104 days, media reports said. An indefinite strike, which was called with the demand of a separate Gorkhaland, was called off by GJM chief Bimal Gurung at 6 a.m. on Wednesday. Singh has earlier appealed to the GJM to withdraw their strike and proposed for a mutual dialogue to resolve the crisis. The home minister was quoted by media as saying: "I appeal to the GJM and its leader Bimal Gurung to withdraw the ongoing bandh and to help create a conducive atmosphere for allowing normalcy to return to the area, particularly in view of the festival season." "Eleven precious lives have been lost so far, seven have been injured and the people of Darjeeling hills have suffered a lot since the strike. I am pained immensely by what has happened in the Darjeeling hills," he added. Singh has asked home secretary Rajiv Gauba to hold a meeting with all the stake holders along with the West Bengal government on the issues concerned. The protest by the GJM has started after West Bengal chief minister Mamata Banerjee held an administrative meeting in Darjeeling months ago. Banerjee's meeting was followed by a protest by the GJM supporters who had ransacked several government properties, leading to a complete shutdown in the hills. New Delhi, Sep 27 (IBNS): Union Home Minister Rajnath Singh will inaugurate the 13th Formation Day of the National Disaster Management Authority (NDMA) in New Delhi on Thursday. The theme of this year's Formation Day is School Safety. NDMA released the National Disaster Management Guidelines on School Safety Policy in February, 2016 with an aim to strengthen the risk resilience of schools across the country. Schools are lifeline structures of a community and their safety is important for effective learning and teaching. Over the years, tens of thousands of children around the world have been badly affected simply because their schools were not safe. It is, therefore, imperative that a safe environment for our children is created, starting from their homes to their schools and back, the ministry said in its release. Stakeholders will discuss the roadmap, their roles and key challenges in the implementation of the School Safety Policy across the country. States will share their experiences in terms of best practices and lessons learnt through their efforts towards school safety initiatives. National Disaster Management Guidelines on Boat Safety and Cultural Heritage Sites & Precincts, and a study report on Chennai Floods of 2015 will also be released. NDMA members and officials, senior officials from the Ministry of Human Resource Development (MHRD), National Disaster Response Force (NDRF), National Institute of Disaster Management (NIDM), Ministries/Departments of the Central Government, State Governments, Municipal Commissioners, District Collectors, NGOs, and ex-Members and Advisory Committee members of NDMA will participate in the event. Representatives of National Council of Educational Research and Training (NCERT), technical institutions, educational institutions such as Kendriya Vidyalaya Sangathan and Navodaya Vidyalaya Samiti, District Education Officers (DEOs), school principals, teachers and schoolchildren will also be present. Kiren Rijiju, MoS, Home Affairs, will deliver the valedictory address later in the afternoon. New Delhi, Sep 27 (IBNS): Making the Modi government uncomfortable, Bharatiya Janata Party (BJP) veteran Yashwant Sinha has said union finance minister Arun Jaitley made a mess of the Indian economy, media reports said. In an article, Sinha, the former union finance minister, criticised the way Jaitley handled the ministry. Sinha said: "I shall be failing in my national duty if I did not speak up even now against the mess the finance minister has made of the economy." "I am also convinced that what I am going to say reflects the sentiments of a large number of people in the BJP and elsewhere who are not speaking up out of fear," he added. The veteran leader has accused Jaitley of instilling fear in the minds of Indians. "We protested against raid raj when we were in opposition. Today it has become the order of the day. Post demonetisation, the income tax department has been charged with the responsibility of investigating lakhs of cases involving the fate of millions of people. The Enforcement Directorate and the CBI also have their plates full. Instilling fear in the minds of the people is the name of the new game," Sinha said in the article. Sinha, who was the finance minister in Vajpayee government, even did not spare prime minister Narendra Modi as he said the bluffs fail in front of reality. "The prime minister claims that he has seen poverty from close quarters. His finance minister is working over-time to make sure that all Indians also see it from equally close quarters," he said digging at both Modi and Jaitley. Reacting to Sinha's article and quoting few of the lines from it, former finance minister P Chidambaram, tweeted to say: "Yashwant Sinha speaks Truth to Power. Will Power now admit the Truth that economy is sinking?" Patna, Sep 27 (TheBiharPost) : Bihar Congress president Ashok Chaudhary was finally shown the door on Tuesday evening for his alleged bid to split the party. The Damocles sword was hanging over his head ever since he was accused of splitting the party and joining the JD-U of chief minister Nitish Kumar. State unit Vice President Kaukab Quadri has been told to look after the party affairs until a new appointment is made. Congress president Sonia Gandhi has relieved Ashok Chaudhary from the post of Bihar state Congress chief with immediate effect, AICC general secretary Janardan Dwivedi was quoted as saying in the English daily Hindustan Times. As per reports, Chaudhary began instigating the party lawmakers to defect the party and join the JD-U shortly after Nitish Kumar dumped the Grad Alliance to form government with the BJP in July last. If reports are to be believed Chaudhary had got the support of some 14 legislators and was about to give a concrete shape to his plan when the central party leadership came to known about his plan and tackled it iron-handedly. Reports said Chaudhary was asking the party legislators to defect on the pretext that continuing in alliance with the RJD could harm the Congress. thebiharpost.com Consumers to get doorstep delivery of petrol, diesel soon, announces Central government India Blooms News Service | @indiablooms #CentralGovernment, #Petrol, #DieselOnlineSaleOfPetrolDiesel New Delhi, Sep 27 (IBNS): The central government has announced that petrol, diesel will soon be delivered at the doorsteps of the consumers, media reports said. New Delhi, Sep 27 (IBNS): Reacting to veteran BJP leader Yashwant Sinha's criticism of Union finance minister Arun Jaitley, the Bharatiya Janata Party (BJP) said that it is Sinha's frustration that is doing the talking, according to media reports. Sinha had sharply criticised Jaitley and the state of Indian economy, saying that Arun Jaitley made a mess of the Indian economy. While Sinha has been supported by Congress leader and former finance minister P Chidambaram, ministers of the central government have opposed Sinha;s claims. Home Minister Rajnath Singh was quoted by the media as saying that the Indian economy is the fastest growing economy in the world and the country's credibility has been established under the Modi government. Railway Minister Piyush Goyal too reiterated that under Prime Minister Narendra Modi, India is a strong economy, media reported. Several BJP members have claimed that Sinha's opinion is based on wrong facts, media reported. Srinagar, Sep 28 (IBNS) Suspected Kashmiri militants on Wednesday evening shot dead a BSF jawan in his home while he was on vacation in Bandipore, said police. In the attack three other family members of the slain jawan were injured in Bandipora of North Kashmir, police said. The deceased jawan has been identified as Rameez Ahmad Parray of Hajin town. According to police, the family members resisted when the militants tried to take Rameez outside the house. The militants opened indiscriminate firing, killing Rameez on the spot. Three other family members, including his father, brother and aunt, were injured. All the injured have been referred to SKIMS Soura in Srinagar for specialized treatment. Soon after the incident security forces have cordoned off the area and started a massive search operation to locate the attackers. (Reporting by Saleem Qadri) New York, Sept 27(Just Earth News): Since the beginning of September, the humanitarian situation in western Central African Republic (CAR) has deteriorated as armed groups have taken over several localities a particularly Bocaranga and Niem a which has forced thousands of people to flee into the bush where they cannot access aid, the United Nations relief wing reported on Monday. Again, civilians continue to pay a very heavy price for clashes between the armed groups, said the Humanitarian Coordinator in the CAR, Najat Rochdi. The vast majority of the 15,000 Bocaranga inhabitants and the 8,000 from Niemtook took refuge in the bush, rendering them inaccessible to humanitarian assistance. As these incidents occurred, acts of violence against relief workers also prompted several organizations to temporarily suspend their activities in the area. While fleeing, the population is not only cut off from much needed assistance but is also more vulnerable to the adversity and abuse by armed groups and the destruction of their properties, added Rochdi. The Humanitarian Coordinator warned against a new outbreak of violence in the west, but also in the east of the country, threatening new humanitarian needs. Rochdi recalled that the operational capacities of the humanitarian community are already under intense pressure in a context marked by the lagging funding. The simultaneous emergence of new outbreaks of tension in several regions will undoubtedly exacerbate the already fragile situation of thousands of displaced people and the communities that are barely recovering from repeated crises, she stressed. The persistence of violence in the CAR since the beginning of 2017 and the dramatic rise in needs have led the aid community to revise the Humanitarian Response Plan. The statement noted that to date, only 30 per cent of the required funding has been secured. If not addressed, this would lead to a quantitative and qualitative reduction of the humanitarian response. In some regions, a number of actors have had to withdraw because of the financial shortfall halting the only assistance available to those in need. Rochdi called on the international community not to abandon the [CAR] where half the population needs assistance for its survival. Credit IRIN/DFID. Source: www.justearthnews.com New York, Sept 27(Just Earth News): A month on from counter-terror operations following attacks on police outposts in Myanmaras Rakhine province, seven United Nations rights experts have called on the Government to stop all violence against the minority Muslim Rohingya community as well as on the global community to ago beyonda statements and take action to save them. There have been credible allegations of serious human rights violations and abuses committed against the Rohingya, including extrajudicial killings, excessive use of force, torture and ill-treatment, sexual and gender-based violence, and forced displacement, as well as the burning and destruction of over 200 Rohingya villages and tens of thousands of homes, said the experts (see end for list) in a news release issued on Monday by the Office of the UN High Commissioner for Human Rights (OHCHR). In the news release, the experts, including the UN Special Rapporteur on human rights in Myanmar, recalled the briefing last week by State Counsellor Aung San Suu Kyi, in which she urged the international community to learn along with the countrys Government, the possible reasons behind the current exodus from Myanmar to Bangladesh. No one chooses, especially not in the hundreds of thousands, to leave their homes and ancestral land, no matter how poor the conditions, to flee to a strange land to live under plastic sheets and in dire circumstances except in life-threatening situations, stressed the experts. According to estimates, more than 430,000 people have crossed into Bangladesh since the violence erupted. Further in the release, the experts also called on Myanmar authorities to ensure unfettered access to humanitarians to the affected locations and displaced people as well as for rights monitors, including the Human Rights Council Fact-Finding Mission for an independent and impartial assessment of the situation on the ground. They further urged the state Counsellor to personally meet the Rohingya. Concluding the news release, the rights experts also called on UN Member States to go beyond statements and start taking concrete action to stop the military and security forces from what they noted accomplishing their so-called unfinished business of getting rid of the Rohingya minority from Rakhine state. Meanwhile, the humanitarian crisis across the border, in Bangladesh continues to worsen by the day. The Office of the High Commissioner for Refugees (UNHCR), one of the UN humanitarian entities involved in the response, reported that despite every effort by those on the ground, the massive influx of people seeking safety has been outpacing capacities to respond, and the situation for these refugees has still not stabilized. Many of those who have arrived recently are deeply traumatized [and] despite having found refuge in Bangladesh, they are still exposed to enormous hardship, Adrian Edwards, a UNHCR spokesperson, said at a media briefing in Geneva on Monday, urging for a redoubling of the international humanitarian response in Bangladesh. UNHCR along with other UN agencies, including the World Food Programme (WFP), UN Childrens Fund (UNICEF) and World Health Organization (WHO) are also on the ground and assisting in the response efforts. WFP and UNICEF are distributing food and therapeutic nutrition interventions (such as high-energy biscuits) and have set up child-friendly spaces. WHO is providing critical medical supplies for over half of the 38 mobile medical teams covering refugee settlements and camps. The UN human rights experts noted above include Yanghee Lee, Special Rapporteur on the situation of human rights in Myanmar; Agnes Callamard, Special Rapporteur on extrajudicial, summary or arbitrary executions; Fernand de Varennes, Special Rapporteur on minority issues; Leilani Farha, Special Rapporteur on adequate housing; Cecilia Jimenez-Damary, Special Rapporteur on the rights of internally displaced persons; Mutuma Ruteere, Special Rapporteur on contemporary forms of racism, racial discrimination, xenophobia and related intolerance; and Ahmed Shaheed, Special Rapporteur on freedom of religion or belief. Special Rapporteurs and independent experts are appointed by the Geneva-based UN Human Rights Council the highest intergovernmental forum in the UN system on rights issues to examine and report back on a specific human rights theme or a country situation. The positions are honorary and the experts are not UN staff, nor are they paid for their work. Photo: UNHCR/Paula Bronstein Source: www.justearthnews.com New York, Sept 27(Just Earth News): Schooling without learning is a terrible waste of precious resources and of human potential, the World Bank said on Monday, warning in a new report that millions of young students in low and middle-income countries face the prospect of lost opportunity and lower wages in later life because their primary and secondary schools are failing to educate them to succeed. Warning of a learning crisis in global education, the World Development Report 2018: Learning to Realize Educations Promise said that schooling without learning is not just a wasted development opportunity, but also a great injustice to children and young people worldwide. This learning crisis is a moral and economic crisis, World Bank Group President Jim Yong Kim said in a press release on the reports launch. The report argues that without learning, education will fail to deliver on its promise to eliminate extreme poverty and create shared opportunity and prosperity for all. Even after several years in school, millions of children cannot read, write or do basic math. When delivered well, education promises young people employment, better earnings, good health, and a life without poverty. For communities, education spurs innovation, strengthens institutions, and fosters social cohesion. But these benefits depend on learning, and schooling without learning is a wasted opportunity. More than that, its a great injustice: the children whom societies fail the most are the ones who are most in need of a good education to succeed in life, underscored Kim. Learning crisis is widening social gaps, not narrowing them According to the World Bank, this learning crisis is widening social gaps instead of narrowing them. Young students who are already disadvantaged by poverty, conflict, gender or disability reach young adulthood without even the most basic life skills. The report recommends concrete policy steps to help developing countries resolve the crisis by using stronger learning assessments as to what works and what doesnt to guide education decision-making; and mobilizing a strong social movement to push for education changes that champion learning for all. While not all developing countries suffer from such extreme learning gaps, many fall far short of levels they aspire to. Leading international assessments on literacy and numeracy show that the average student in poor countries performs lower than 95 per cent of those in high-income countries. Many high-performing students in middle-income countries young men and women who achieve in the top quarter of their groups would rank in the bottom quarter in a wealthier country, explained the World Bank. The report notes that when countries and their leaders make learning for all a national priority, education standards can improve dramatically The report, which was written by a team directed by World Bank Lead Economists Deon Filmer and Halsey Rogers, identifies what drives these learning shortfalls not only the ways in which teaching and learning breaks down in too many schools, but also the deeper political forces that cause these problems to persist. For example, from a war-torn country with very low literacy rates in the 1950s, South Korea achieved universal enrolment by 1995 in high-quality education through secondary school its young people performed at the highest levels on international learning assessments. The only way to make progress is to find truth from facts. If we let them, the facts about education reveal a painful truth. For too many children, schooling does not mean learning, said World Bank Chief Economist Paul Romer. After extensive consultations with governments, development and research organizations and the private sector in 20 countries, the report offers the three policy recommendations: assess learning, so it can become a measurable goal; make schools work for all children; and mobilize everyone who has a stake in learning. Photo: Aisha Faquir/World Bank Source: www.justearthnews.com New Delhi, Sep 27 (IBNS) : Pakistan's Foreign Minister Khawaja Asif has reportedly admitted that Mumbai terror attack mastermind Hafiz Saeed and terror outfit Lashkar-e-Taiba are a "liability" for the country and for the south Asian region, The Times of India reported. but said the country "needs time to get rid of this liability". "It is very easy to say that Pakistan is supporting Hafiz Saeed and Lashkar-e-Taiba. They are liabilities...we have said they are liabilities... but give us time to get rid of these liabilities because we do not have the assets to match these liabilities," he said while speaking at the Asia Society seminar in New York. Asif also acknowledged that Pakistan has to continue its efforts in dismantling terrorism and elements of extremism but added that it needs time and "assets" to do the job. Hafiz Saeed, who lives in Pakistan, has recently launched a political party, saying he would contest elections in 2018. Hafiz Saeed's party reportedly even fielded a candidate in a by-election for a seat that fell vacant after the disqualification of former Prime Minister Nawaz Sharif over corruption charges. Hafiz Saeed has been declared a global terrorist by the UN and the US for his role in the Mumbai attack. He was placed under house arrest earlier this year and it was extended several times, but no formal charges have been filed against him so far. The Pak Foreign Minister said, by "wrongly" supporting the US in a "proxy war" in Afghanistan against the Soviets in the 1980s, Pakistan paid a very high price. "Don't blame us for Saeed, these people were your darlings 20 years ago, they were being dined and wined in the White House. Now you say go to hell, Pakistan," said Asif. Pueblo tribes are calling on the Trump administration to impose a temporary ban on energy development near Chaco Culture National Historical Park in New Mexico. The All Pueblo Council of Governors , which represents 20 Pueblo tribes in New Mexico and Texas, said oil and gas drilling must be put on hold pending further study of the environmentally and culturally sensitive region. Development threatens sacred sites, ancestral villages and other places that remain important to their communities. "Our ancestors still reside in this place and these new permits and leases demonstrate a complete lack of respect for our sovereign tribal nations. We will use every tool at our disposal to fight these attacks on our heritage, said Edward Paul Torres, who serves as chairman of the All Pueblo Council as well as governor of the Pueblo of Isleta But that work, which was initiated toward the end of the Obama administration , isn't expected to be complete until next year at the earliest, the resolution warns. Yet the BLM is moving forward with a sale of leases in areas around Chaco, three lawmakers from the state said in a letter to Secretary Ryan Zinke , the leader of the Department of the Interior "This action would not only violate the previous commitment of the BLM and BIA, but the spirit of the ongoing joint public process which these agencies are conducting with the community," the three Democrats told Zinke in the September 6 letter The Pueblo tribes aren't the only ones concerned either. Leaders of the Navajo Nation are especially worried about hydraulic fracturing , an energy processing technique commonly known as fracking, and its impacts on ancestral sites and water resources in and around Chaco. We are descendants from the Chaco Canyon area," President Russell Begaye said earlier this year when the BLM and the BIA came to the region to ask tribes for input. "We are connected to these lands spiritually. The voices of our ancestors live in this area and any disturbance to this area is culturally and morally insensitive." The BLM has not made any decisions about the upcoming lease sale . But President Donald Trump has vowed to expand development on federal lands and the agency has been eagerly touting the results of other lease sales as "promoting Americas Energy independence." Comments on a draft environmental assessment affecting drilling in the Chaco region are being accepted through October 20. More information, including detailed maps, can be found on the BLM website under "March 8, 2018 Lease Sale." Join the Conversation A3 Newsletter, Sept 27, 2017: Continuing the Struggle to Free Political Prisoners Will the US Supreme Court consider the legitimacy of Louisiana's non-unanimous jury system? Professor Angela A. Allen writes for the Washington Post (PHOTO: Professor Bell speaks in support of Herman Wallace and Albert Woodfox in Baton Rouge, Louisiana on April 17, 2012) A Visit With Leonard Peltier Following Heart Surgery Spotlighting the Case of Vincent Simmons Albert and Robert continue tirelessly traveling around the country and the world, bringing attention to other cases and issues around the criminal "in"justice system here in the USA and in other countries that they visit.Last month, they traveled to Washington DC for the Millions for Prisoners Human Rights March. Photos from the day are featured above and directly below, taken from the SF Bay View article written by Wanda Sabir , who is shown above with Robert and Albert. The other two photos from the day are of Albert with former political prisoner Laura Whitehorn and one of Robert and Albert with longtime A3 supporter Rebecca Hensley. At the DC march, Albert was interviewed by former political prisoner and Panther Eddie Conway for The Real News Network, which you can watch here Morgan Freeman's new show "The Story of Us" will be premiering on the National Geographic Channel at 9pm on October 11. Entitled "The March of Freedom," the show's premiere episode will be featuring our very own Albert Woodfox. Furthermore, Albert is featured in The Story of Us teaser trailer, which you can watch here In November, Albert and Robert will be campaigning in Germany and Belgium with Amnesty International and meeting with activists and politicians.As racial issues take center stage in the public discourse, they felt it was timely to highlight several of far too many cases, where racial inequality plays a huge role in continued unjust extended incarceration.The research and writing of Professor Angela Bell has appeared in several law reviews and mainstream media. Just recently her piece on "non-unanimous jury" decisions in Louisiana was featured in the Washington Post, clearly elucidating just one of the many decisions and policies in the system that is grounded in white supremacy that promotes the adjudication of blacks and whites differently. Professor Bell's article highlights just one of the many issues that Albert and Robert speak on as they travel, along with the cases of other prisoners.They hope you'll take the time to read about the current status of Leonard Peltier, as well as a previously fellow Angola inmate, Vincent Simmons. This past month also brought news of an attack on political prisoner Herman Bell. Click here to find out how you can help Herman.Finally, there's news that at long last there is an effort to review the conviction of Ruchell Magee who was sentenced to 7 years to Life in August of 1965 and remains in prison.Albert and Robert are grateful for a chance to live outside the cages they were held in for so long and feel a great urgency to try to help other prisoners that have been stuck in the system for far too long. They feel certain that the supporters who stood with them during the many years of struggle to secure their release will do what they can, as they are, for those who have not yet been as fortunate.In a recent article for the Washington Post entitled "These jury systems are vestiges of white supremacy," SULC Professor and longtime A3 supporter Angela A. Allen-Bell writes:--Read the full Washington Post article here --Read our recent interview with Prof. Bell examining the historical context for Lousiana's non-unanimous jury system here The International Leonard Peltier Defense Committee has just released an update on elder political prisoner Leonard Peltier, including a report from a visit with him on September 21. Supporter Paulette reports from the visit:Read the Committee's full statement here Donate to Leonard's defense fund here Vincent Simmons was a subject in HBO'sas well as three other films. His 1997 parole hearing, so shocking in its blatant racism, corralled supporters from across the globe. Today Vincent remains in prison after 40 years. The fundraising campaign was created to raise legal funds so that Vincent can receive a hearing, and hopefully a new trial. Because of the nature of the charges this has remained a highly controversial case.On July 28, 1977, Vincent Simmons was convicted of the attempted aggravated rape of twin white girls, Karen and Sharon Sanders, and sentenced to 100 years in prison. He has been at Angola prison for forty years. He was convicted purely on the basis of the flawed and contradictory testimony of the two alleged victims and their cousin, Keith Laborde. There was no physical evidence of any kind against Vincent, in fact no physical evidence that the rapes ever actually occurred. The twins picked Vincent out of a line-up in which he was the only one handcuffed after openly stating that all black men looked alike to them. Vincent has been the subject of three documentary films and has maintained his innocence since his arrest.There is no physical evidence that the rapes actually happened. The alleged victims waited two weeks to report the alleged rapes. No forensic tests were carried out on the clothing of the alleged victims, Vincent's clothing or the car in which the alleged rapes took place.The doctor's report did not find any signs of injury on either of the alleged victims and stated that one of the twins was a virgin two weeks after the alleged rapes. The doctor's report was not shown at the trial excerpts from the letter sent from F.P. Bordellon Jr., M.D. to district attorney Mr. J. Eddie Knoll on June 10, 1977, regarding examination of one of the alleged victims in the Vincent Simmons case. "She admits never having had intercourse before this... There was [sic] no bruises on her body. The vaginal examination showed that the hymen was intact and I was unable to insert one examining finger."Vincent was convicted on the basis of the flawed and contradictory testimonies of the two alleged victims and their male cousin. In the police reports, the twins said that a black man attacked them. They said they did not know his name. In court the twins and their cousin all said the attacker had told them his name before attacking them and that his name was Simmons.The twins stated that they would not be able to pick their attacker out of a line-up because all black men looked the same to them. They later picked Vincent out of a line-up in which he was the only one handcuffed.The police investigative reports did not include one single lead pointing to Vincent, yet he was picked off the street and charged with the crime. Two reports by the same police officer written twenty-four hours apart give two completely different locations as the place of arrest.There is no indication that the police, at any point, had an official interview with Vincent or that he gave any sort of statement. However, when Vincent was arrested and taken into interrogation, a police officer, who was related to Keith Laborde, shot Vincent in the chest, nearly killing him. The officers present stated that Vincent had disarmed one of the officers, said "You will never take me alive," and pulled the trigger, but the gun misfired. They said he continued dry firing and then Officer Laborde shot him. Vincent was never charged with any crime related to this and it was not mentioned in trial. Vincent has maintained from the beginning that the officer's shot him because he would not confess.The arresting police officers never testified in court.Not only did the shooting threaten his life, but Vincent was originally charged with two counts of aggravated rape, punishable by death at the time of accusal. Only after the US Supreme Court invalidated the death penalty in Coker v. Georgia, 433 US. 584 on June 29, 1977, did the prosecution quickly amend the charges to aggravated attempted rape.Even though the state's case at trial were the actual rapes of both of the Sanders sisters.No pre-trial motions nor investigations by defense counsel were made.Vincent has several documents of evidence that he was not aware of at trial. Nor was the jury or Vincent's defense counsel aware of this evidence at trial.Vincent has been trying to win an evidentiary hearing for decades, but no state has ever afforded him one.On July 21, 2017, a post-conviction was filed at the 12th Judicial District Court. Contained in that application is newly discovered and explosive evidence supporting Vincent's claim of innocence.All donated funds will go to Vincent's Defense Fund account which is managed by attorney Robert Flores.To donate, visit the fundraising site For more information, visit www.freevincent.com Hogs Close in Black to Start the Week Barchart - 1 hour ago Lean hog futures closed the Monday session with 27 to 57 cent gains. The USDA National Average Base Hog Price for Monday afternoon was $2.47 lower to $85.23. The CME Lean Hog Index was $88.63 on 11/10,... HEZ22 : 84.875s (+0.62%) HEJ23 : 94.375s (+0.29%) KMZ22 : 95.675s (+0.82%) Cotton Futures Fall Triple Digits Barchart - 1 hour ago Mondays cotton trade pulled prices 242 to 330 points lower, which erased all of last weeks gains. New crop Dec cotton closed at 77.06 cents per pound, a 8.22 cent discount to spot Dec. Stock market... CTZ22 : 85.28s (-3.31%) CTH23 : 83.62s (-3.14%) CTK23 : 82.50s (-3.58%) Cattle Close Monday Mixed Barchart - 1 hour ago Fat cattle futures were mostly 42 to 75 cents lower on Monday, save for a 5 cent gain in the Dec contract. Feeder cattle traded higher, past the Nov contract, to end the day with 22 to 87 cent gains. USDA... LEZ22 : 151.575s (+0.03%) LEG23 : 152.550s (-0.46%) LEJ23 : 156.425s (-0.40%) GFX22 : 176.950s (unch) GFF23 : 179.450s (+0.49%) Soy Futures Fade on Monday Barchart - 1 hour ago November soybean futures expired at $14.41 3/4 on Monday, a net 1 1/4 cent premium to the now lead month Jan. The other futures faded 5 1/4 to 9 1/2 cents on the day. New crop Nov beans ended the day at... ZSX22 : 1441-6s (-0.94%) ZSPAUS.CM : 14.1160 (-0.65%) ZSF23 : 1440-4s (-0.66%) ZSH23 : 1444-6s (-0.62%) Corn Closed Monday Red Barchart - 1 hour ago The first trade day of the week ended with futures fractionally to 4 1/2 cents lower. December stayed the firmest, and after a morning rally ultimately closed mid ranged. New crop December ended at $6.07... ZCZ22 : 657-2s (unch) ZCPAUS.CM : 6.5665 (unch) ZCH23 : 659-2s (-0.57%) ZCK23 : 658-4s (-0.64%) What Just Happened? Blue Line Futures - 1 hour ago Our daily video . . . From the Archive Death of a Journalist Japanese video journalist Kenji Nagai, 50, of APF lies fatally injured on the street of Rangoon after Burmese soldiers fired upon and then charged at protesters on Sept. 27, 2007. / Reuters Wednesday marks the 10th anniversary of the death of Japanese journalist Kenji Nagai at the hands of a Myanmar Army soldier during the countrys Saffron Revolution. The domestic upheaval became an increasingly international affair the shooting was captured on video and broadcast worldwide. Known as the Saffron Revolution, the monk-led anti-government protests of August and September 2007 were, for many people outside the country, their first exposure to the brutality of Burmas former military regime. This story, originally published in December 2007, offers another Japanese photojournalists take on the death of a colleague and countryman. JAPAN It was painful to witness the images broadcast worldwide on Sept. 27, 2007. Japanese cameraman Kenji Nagai was lying on his back on a street in Rangoon. Then there was the piercing sound of a bullet fired from the rifle of a soldier. Kenji Nagai, a man I considered a colleague, was dead. Immediately, I thought: It could have been me. As a photojournalist, I also report on conflicts. I have covered many Asian countries, including Burma, and I imagined myself in Kenji Nagais place, lying dead on a street in Rangoon. But, I was in Japan, and he was in Rangoon. However, I knew the streets where the pro-democracy demonstrations occurredthe scene was very familiar to me. For me, the shooting confirmed the true mentality of the Burmese junta, which has been killing and imprisoning the Burmese people with impunity for decades: 3,000 or more people died in 1988 alone, the year I started covering events in Burma. On the day Kenji Nagai was murdered, I was taking photographs of exiled Burmese activists who were demonstrating in front of the Burmese Embassy in Tokyo, demanding the Japanese government stop supporting the State Peace and Development Council financially. Later that day, my mobile phone started ringing, one call after another without a break. News agencies and newspapers were calling me to check if the unidentified Japanese journalist killed in Rangoon was me or not. One call was from Australia, from my Burmese friend who had worked as my interpreter when I made trips to Burma. He explained that he was worried about me when he heard the news. Before long, the Japanese media confirmed the dead journalist was Kenji Nagai. His name was new to me, and we had never met. The TV news showed video of the shooting of Kenji Nagai over and over again for several days. The Japanese public was horrified and angry. The Japanese government seemed shocked. Perhaps for the first time, the government realized the SPDC is truly an evil government. When the funeral service was held on Oct. 8 in Tokyo, hundreds of Burmese exiles attended the service to honor Kenji Nagai. They apologized for his death on behalf of the SPDC government, which they hate. It was a natural feeling for the Burmese people who live in Japan to express their sorrow for Kenji Nagai, who was now a martyr in the Burmese struggle for democracy. Media coverage on Kenji Nagai focused on his personality, his professional work in Iraq and elsewhere, but neglected any factual background on what had been happening in Burma under the military regime for the past 20 years. There were almost no critical questions about Japans foreign policy toward the military juntawhether it was trying to help the country move toward democracy or helping the SPDC. As a photojournalist, I have been critical of Japans foreign policy, which has favored the SPDC generals rather than the democratic forces and the ethnic minorities. You can get a sense of Japans policy toward the SPDC through various comments made by top Japanese diplomats. For instance, the then Foreign Minister Yoriko Kawaguchi made an ignorant comment in May 2003, when she was asked about the murderous attack on Aung San Suu Kyis motorcade at Depayin. She said, There is no deterioration of environment for dialogue between the SPDC and Aung San Suu Kyi. She retracted her comment the next day. In May 2006, Japanese ambassador to the United Nations, Kenzo Oshima, said, Burma does not constitute a regional threat yet, and along with China and Russia, Japan opposed efforts by the United States and European Union to put Burma on the Security Council agenda. The latest and most shameless comment was made by Yoichi Yamaguchi, the former Japanese ambassador to Burma (1995-97). After the killing of Nagai, he was quoted in the Japanese media as saying several offensive comments: Aung San Suu Kyis National League for Democracy gave money to the demonstrators. There is not a single so-called political prisoner there [in Burma] in the true sense. The regime has succeeded in maintaining economic growth of over 5 percent annually, earning it the widespread trust of the people. After Kenji Nagais death, the Japanese government took a seemingly strong stance. In New York, Foreign Minister Komura demanded an apology from the SPDC. But as time passed and the crackdown by security forces continued, the Japanese government remained quiet, simply waiting for the UN Security Council to act. The government will coordinate efforts with the United Nations and the Association of Southeast Asian Nations to make progress in the democratization of Myanmar [Burma], Komura said after the UNSCs presidential statement was announced. Later, Japan cancelled a grant of up to 552 million yen (US $4.7 million). The grant had been intended to finance the construction of a human resources center. On Oct. 28, the Peoples Forum on Burma, an NGO formed in Tokyo in 1996 to support the Burmese peoples struggle for democracy, made a plea for the Japanese government to fundamentally change its foreign policy toward the SPDC by giving full-scale humanitarian support to the 160,000 displaced people in refugee camps in Thailand. The group also asked for a halt in grants to the Union Solidarity and Development Association, which was accused of taking part in the suppression of the demonstrators. In 2006, the USDA received a Japanese grant of nearly 24 million yen ($209,000) for construction of three grade school buildings. It also demanded that Japan stop humanitarian aid to subsidize Burmas health care and education budgets while the military regime allocates more than 50 percent of its national budget on the military. The group wants to pressure the Japanese government to support the Burmese people and the pro-democracy groups, instead of helping to keep the generals in power. A Burmese citizen in Tokyo, a former political prisoner, said Burmese exiles remember two Japanese citizens: one with hate, and one with great respect. One is former ambassador Yoichi Yamaguchi; the other is journalist Kenji Nagai. Yamamoto Munesukes books include Burmas Children and Burmas Great Illusions. He was deported from Burma in 1998 for gathering news, following his exclusive interview with Aung San Suu Kyi. From the Archive Is the NLD Still the Peoples Party? A man brandishes a phone with a picture of opposition leader Daw Aung San Suu Kyi, as election results are revealed on a screen in front of the Yangon head office of the National League for Democracy, April 1, 2012. / Reuters As the National League for Democracy turns 29 today, The Irrawaddy revisits its 2013 commentary asking if the popular party still enjoys the overwhelming public support demonstrated in the 1990 election. Two years later in 2015, the NLD won a landslide victory again in the general election, and today it remains the most popular political party in the country. Is the NLD still the peoples party? On this question, opinion in Burma varies, but the doubters are likely a small portion of the countrys estimated population of more than 50 million. The NLD was founded by a group of prominent people in September 1988, including former Gen Tin Oo, veteran journalist Win Tin and democracy icon Aung San Suu Kyi. But despite the existence of other co-founders, it is Suu Kyi who molded the party into what it is today. Without the 68-year-old Nobel Peace Prize laureate, the NLD would not have become so popular over the years of military rule. In the historic 1990 election, the NLD received more than 80 percent of the vote, winning 392 of the 485 seats it contested in the 492-member assembly, including in ethnic areas. Suu Kyi wasnt allowed to contest the election, as she was being held under house arrest at the time, but thanks to her role as a party leader, about 15 million Burmeseone third of the then-populationvoted for the NLD. An expression was widely shared during the election year: Even a dog with its tail cut off will win, so long as its an NLD candidate. While somewhat crude, the remark perfectly captured the level of popularity the party held among the people. Of course, many former loyalists may no longer follow the NLD so blindly today, more than a year after she was elected to Parliament. But I believe that for the majority of people here in the country, little has changed since 1990. The NLD won 43 of 44 seats in Parliament in 2012 by-elections, including in all four constituencies of Naypyidaw, which is seen as a stronghold of the military-backed Union Solidarity and Development Party (USDP). Still, not everything has gone smoothly for Suu Kyi since she entered Parliament. The opposition leader has faced unprecedented criticism over the past year for failing to strongly condemn the discrimination and violence by Buddhist mobs against Rohingya Muslims in Arakan State. At the same time, she lost points with Buddhists in the state after walking a middle ground and refusing to take either side in the conflict. In north Burmas Kachin State, the NLD leader also faced criticism after failing to blame the government when the Burma Army launched an offensive on ethnic Kachin rebels. As Suu Kyis base of support declines, so too will that of the NLD. The opposition party faces other challenges as well, with critics saying that it lacks unity and remains disorganized. Some say the party has failed to develop strategic political plans. But what alternative do we have to the NLD? The answer, at least for the moment, is that we have no alternative, especially in areas dominated by the ethnic Burman majority. The country has yet to see the emergence of any other popular nationwide party. And the majority of voters will not even consider supporting the ruling USDP, assuming the elections in 2015 are truly free, unlike the 2010 elections. Some people had hoped that influential activists from the 88 Generation Students group would step into politics after being released from prison in early 2012. To date, however, the group, which is led by well-known activists Min Ko Naing and Ko Ko Gyi, is still not sure whether to form a political party. And even if they do, their party will not be a real threat to an NLD victory in two years, because Suu Kyis popularity remains relatively strong. Many people will vote for the NLD in 2015, as they did in the 2012 by-election, but the party will receive fewer votes in ethnic areas for two main reasons. In addition to Suu Kyis declining popularity, especially in Arakan and Kachin states, ethnic leaders have already established their own political parties, and more ethnic parties are expected to emerge in the future. In 1990, the NLD won 71 percent of seats in eastern Karen State, 73 percent in Kachin State, 80 percent in Mon State and 50 percent in Karenni State. In Shan, Arakan and Chin states, it won 39 percent, 34 percent and 30 percent, respectively. The results will certainly be different the next time around. Some critics say the NLD lacks enough capable intellectuals and politicians to effectively lead the country. For this reason, they call the NLD a grassroots partya title which some party leaders would likely welcome, as an acknowledgment that they represent the people. But to steer Burma in a positive direction, the NLD needs more capable, intellectual and talented leading members. And if it wants to win in a landslide, as it did in 1990, Suu Kyi seriously needs to reorganize the party and embrace the emergence of other, new leaders with different strengths in politics as well as other sectors. If she can contribute more to the peace process with ethnic groups in the next couple years, she might even see a resurgence of popularity in ethnic areas. By and large, the democracy icon will likely remain the most popular and trusted candidate in the 2015 election, and her party, the NLD, will likely be supported by the majority of people, even with its shortcomings. Asia UN Experts Urge Daw Aung San Suu Kyi to Meet Persecuted Muslims Refugees line up for aid at Coxs Bazar, Bangladesh, Sept. 26, 2017. / Reuters GENEVA Myanmars leader Daw Aung San Suu Kyi should personally meet members of the self-identifying Rohingya Muslim minority that is being subjected to ongoing persecution by the military, a group of UN human rights experts said on Tuesday. Myanmar has rejected UN accusations that its forces are engaged in ethnic cleansing against self-identifying Rohingya Muslims in response to coordinated attacks by Muslim insurgents on the security forces on Aug. 25. The military campaign has sent nearly 430,000 refugees fleeing to Bangladesh, the group of seven UN officials said. They include the special rapporteurs on human rights in Myanmar, on minority issues and on racism. We call on Aung San Suu Kyi to meet the Rohingya personally, the officials said in a statement. They said the implementation of promises by Daw Aung San Suu Kyi to address the crisis, including that perpetrators would be held accountable, would amount to an empty gesture since so many self-identifying Rohingya had fled. Daw Aung San Suu Kyi is a Nobel Peace prize winner whose government came to power last year in a transition from nearly 50 years of harsh military rule. She has denounced any rights violations but international pressure on her is mounting and there are calls for her Nobel prize to be withdrawn. Daw Aung San Suu Kyi has little if any control over the security forces under a military-drafted constitution that also bars her from the presidency and gives the military veto power over political reform. The 1.1 million self-identifying Rohingya in Buddhist majority Myanmar are denied citizenship and classified as illegal immigrants from Bangladesh, despite claiming roots in the region that go back centuries, with communities marginalized and occasionally subjected to communal violence. Burma 84 Killed in Maungdaw in Recent Violence: Govt Social Welfare Minister Dr. Win Myat Aye comforts grieving family members in northern Rakhine's Maungdaw on Monday. / U Nyi Pu / Facebook YANGON The governments Information Committee released a statement on Wednesday that said 163 people from Maungdaw District, Rakhine State, were killed and 91 people went missing from October 2016 to September 2017, following attacks by Muslim militants on border police posts. In addition, the statement read that from August 25 to September 26, 84 people had been killed, including Muslims, Hindu, ethnic Arakanese, Daignet, Mro, and security forces, and that 44 people went missing. On Sunday, security forces and Hindu villagers discovered 28 dead bodies and unearthed 17 others the following day near Yebaw Kya village of Kha Maung Seik village tract in northern Maungdaw Township, who the government claims were some of those killed by ARSA in August. The authorities continue to search for additional bodies. Union Minister for Social Welfare Dr. Win Myat Aye, Rakhine State Chief Minister U Nyi Pu, members of the National Human Rights Commission and senior military officers went to the mass grave sites on Monday and met with the relatives of the victims. The grieving members of Hindu families confirmed 25 of the dead bodies so far. Maungdaw Township Public Health Department officials have begun conducting forensic inspections of the excavated bodies. From previous attacks on Oct. 9 ,2016 through Aug. 24,2017 a day before the recent unrest began, the government stated that at least 79 people had been killed including civil servants, security forces, and Muslim villagers who had collaborated with local authorities, and that 39 people were still missing from that time. Burma Attempted Recruitment of Anti-Govt Mobs in Magwe: Chief Minister Magwe Region's Chief Minister Dr. Aung Moe Nyo. / The Irrawaddy YANGON Magwe Region Chief Minister Dr. Aung Moe Nyo alleged on Tuesday there had been an attempt to recruit people in his region to form anti-government mobs in Rakhine States Ann Township. The chief minister didnt identify any organizations in his allegation but said the recruiter offered people an incentive of 500,000 kyats (approximately US$370) for completing the job in Ann Township. We cannot reveal the name [of the recruiter] due to security concerns, Dr. Aung Moe Nyo told members of the press at his office. But I have informed and instructed respective persons in charge of the divisional authorities concerning the case, he added. He did not mention why perpetrators wanted to create instability in Ann Township, why they tried to recruit people in Magwe Region or how many people had been recruited. Earlier this month, a group of 400 peoplesome armed with swords and bamboo rodsattacked a mosque and property owned by Muslims in Magwe Divisions Taungdwingyi Township. The mob was later dispersed by riot police with rubber bullets and 30-year-old Ko Hnin Ko Ko Lin was arrested for taking part in the attack. According to the governments Information Committee, he was acting because of the disappointing situation in Rakhine State. The Irrawaddy spoke to a regional police officer who said they had not received instructions from the regional government or the Union Ministry of Home Affairs regarding the issue. Burma China Affirms Support for Myanmar On Rakhine Issue Myanmar Vice President U Myint Swe (center right) and Chinese Ambassador to Myanmar Hong Liang (center left) at the reception to mark the 68th anniversary of the founding of Peoples Republic of China in Naypyitaw. / Htet Naing Zaw / The Irrawaddy NAYPYITAW Chinese Ambassador to Myanmar Hong Liang showed his support for the Myanmar governments handling of the issues in Rakhine State, assuring that China would stand firmly by Myanmar on the international stage. We hope that the international community will create a good external environment so that Myanmar can solve its problems properly, said Hong Liang at a reception on Tuesday to mark the 68th anniversary of the founding of Peoples Republic of China ahead of an open discussion on Rakhine at the UN Security Council on Thursday. Myanmar has faced increasing international pressure over government security operations in northern Rakhine State that have left hundreds dead, sent nearly 500,000 self-identifying Rohingya Muslims fleeing to Bangladesh, and been labeled a text book example of ethnic cleansing, by the UN. Myanmars UN representative U Hau do Suan, however, insisted at the UN General Assembly on Monday that ethnic cleansing was not taking place against Muslims in Rakhine in the strongest terms. Hong Liang promised to continue providing humanitarian aid for people in Rakhine State, noting the Chinese government provided 200 million kyats for Rakhine State through the Ministry of Social Welfare, Relief and Resettlement last week. China supports cooperation between Myanmar and Bangladesh to solve border problems and sincerely hopes that the Myanmar government will be able to bring harmony, stability and prosperity to societies in Rakhine State, he said. Myanmar and China have always maintained bilateral cooperation as well as close cooperation in areas of mutual interest in regional and international arenas including the UN, Myanmar Vice-President U Nyan Tun said at the reception. When asked about Chinas view on State Counselor Daw Aung San Suu Kyis briefing to foreign diplomats last week, Chinas foreign ministry spokesperson Lu Kang said at the ministrys regular press conference on Sept. 19 that her speech will help the international community to better know about the situation in Myanmar and understand and support the Myanmar governments effort to achieve domestic peace and national reconciliation As a friendly neighbor of Myanmar, the Chinese will continue providing necessary assistance for [Myanmar] to uphold internal stability and development, he said. Myanmar is economically dependent on China while China also requires Myanmar to expand its influence on the international stage, and the two countries need each other, said U Myo Zaw Aung, member of Lower House International Relations Committee. China has its interests not only in Kyaukphyu [of Rakhine State], but also across the country. It has friendly ties with the Myanmar government partly because of those interests. There is a need for a stronger bond between two countries to continue to engage in businesses of great mutual interests, said U Myo Zaw Aung. Despite Chinas Special Envoy of Asian Affairs Sun Guoxiangs request for Chinas direct involvement in solving the Rakhine issue, the Myanmar government replied in April that it would only cooperate with Bangladesh to find a solution. China has funded schools, hospitals, the renovation of Bagan temples, afforestation, scholarships and eye surgeries for Myanmar people, which reflect the friendship between two countries, said Hong Liang. Burma Ethnic Representatives to Forge Common Policy Nai Hong Sar addresses attendees at the UNFC stakeholders consultation in Chiang Mai, northern Thailand on September 27, 2017. / Nyein Nyein / The Irrawaddy CHIANG MAI, Thailand Aiming to consolidate their positions on common policies, around 100 politicians, ethnic armed group leaders and civil society members have joined a stakeholders consultation hosted by the United Nationalities Federal Council (UNFC) in Chiang Mai, northern Thailand this week. The four-day meeting, held from Sept. 27-30, is to share concerns and exchange views on the current political circumstances in Myanmar. We will have experts to share experiences from the political dialogue process, the state and federal constitutions, and the reality and need for achieving peace. Then, based on these, we can form a collective view for a future plan, said Nai Hong Sar, the chairman of the UNFC, who presided over the consultation on Wednesday. In his opening remark, Nai Hong Sar urged his fellow ethnic representatives to strongly stand together for a common policy despite their differences, to reach their goal of building a genuine federal Union that guarantees ethnic autonomy, equality, and self-determination. This year, the stakeholders consultation was joined by as many groups as last year, even though the Kachin Independence Organization left the bloc in June. Representatives from the ethnic political parties alliance, United Nationalities Alliance; from the KIO; from the signatories of the nationwide ceasefire agreement including the Restoration Council of Shan State (RCSS); and civil society groups including the Womens League of Burma, presented at the consultation. Nai Hong Sar also highlighted in his speech the fact that he shared his views during the New Mon State Partys (NMSP) meeting with State Counselor Daw Aung San Suu Kyi on Sept. 1 in Naypyitaw. He explained that the State Counselor had asked the NMSP whether they had recommendations regarding the development of the peace process. We shared three things: the importance of having all inclusivity in the peace process, creating a strong political dialogue framework, and the implementation of the agreement step by step, as is said in the agreement. But Daw Aung San Suu Kyi did not provide her own views, he said. Having a strong political dialogue framework is one of the eight points proposed by the UNFC, and one which they have been negotiating with the governments Peace Commission. They will hold the seventh round of formal talks in early October, as they had informal talks on Monday, Sept. 25. Regarding implementation, Nai Hong Sar was referring to not being able to hold the ethnic national-level dialogues (ND) in many ethnic areas. The seven NDs were held between December 2016 and April this year in areas under the control of nationwide ceasefire agreement signatories. However in the territories of the RCSS and the Arakan Liberation Party, the scheduling of the ND was not allowed, because of disagreements with the authorities regarding the proposed venues and the security situation. The UNFC chairman reiterated the importance of building trust between the ethnic armed organizations and the Tatmadaw. We told Daw Aung San Suu Kyi that trust must be stronger among us; we cannot build trust by force, which she also agreed with. But what we knew was she could not say anything to the Tatmadaw, which has been given high authority under the 2008 Constitution, Nai Hong Sar said. Burma Govt Information Committee Objects to UN Terminology on Rakhine Ambassador U Hau Do Suan, Permanent Representative of the Republic of the Union of Myanmar to the United Nations, speaks at the 72nd session of the United Nations General Assembly at the UN headquarters in New York. / Government Information Committee / Facebook YANGON Myanmar has objected to the use of terms such as atrocities, ethnic cleansing and genocide by several UN delegations in describing the current situation in Rakhine State. The Government Information Committee published a statement on Wednesday denouncing the usage of these terms without what they described as solid evidence. Ambassador U Hau Do Suan, Permanent Representative of the Republic of the Union of Myanmar to the United Nations, voiced his concerns in responding to such allegations during the final session of the general debate at the UN General Assembly in New York on Monday. It is deeply regrettable that unsubstantiated allegations have been repeated in those chambers likening the situation in Rakhine state to ethnic cleansing, he said. To date, international aid agencies estimate that 480,000 self-identifying Rohingya Muslims have fled to Bangladesh, and 30,000 Buddhists and Hindus are displaced within Rakhine State. The area experienced military clearance operations, following coordinated attacks by militants on police outposts on Aug. 25. Nigeria, France, Turkey, Afghanistan, Pakistan, the United Arab Emirates, Malaysia, Maldives, Chad and Bangladesh accused Myanmar of committing atrocities and ethnic cleansing during the general debate of the 72nd Session of the United Nations General Assembly held at the UN headquarters in New York. U Hau Do Suan said that such terms must not be used lightly. He also described the Muslim community as comprising the majority group in the affected areanorthern Rakhine Stateand criticized reporting which described them as a minority. According to the 2014 census, Myanmar is nearly 90 percent Buddhist, with Muslims and Christians each making up around 4 percent of the country. Myanmars ambassador to the UN also said that the world appeared unaware of the existence and plight of small groups, in the region such as the Daingnet, Mro, Thet, Mramagyi and Hindus. On September 11, Bangladeshs Prime Minister Sheikh Hasina also criticized Myanmar for atrocities committed against the Muslim population. UN High Commissioner for Human Rights, Zeid Raad Al Hussein, said what was unfolding in Myanmar was a textbook of example of ethnic cleansing while addressing the United Nations Human Rights Council in Geneva on Sept. 12. Myanmars State Counselor Daw Aung San Suu Kyi has faced criticism from abroad regarding her response to the crisis. On Sept. 19, during an official address on the situation in Rakhine State, she said she would cooperate with international allies to fight terrorism in Myanmar, and condemned all human rights violations and unlawful violence in the western region. She said she was committed to the restoration of peace, stability and rule of law throughout [Rakhine] state. In April 2017, during a rare interview with BBC journalist Fergal Keane, Daw Aung San Suu Kyi responded to a question about whether or not ethnic cleansingthe deliberate removal of an ethnic or religious groupwas unfolding in her country. I dont think there is ethnic cleansing going on. I think ethnic cleansing is too strong an expression to use for what is happening, she said. Still others have described the ongoing violence as genocide, an international crime defined in 1948 by the UN Convention on the Prevention and Punishment of the Crime of Genocide as killing, preventing births among, causing serious harm to, or deliberately trying to destroy, a population. Chairman of the Rakhine Advisory Commission and former UN Secretary General Kofi Annan in December 2016 in Yangon said, genocide is a very serious charge that requires legal review and judicial determination. Burma Myanmar Army Facebook Posts Covering Key Period of Offensive "Hidden" Police stand guard after Arakan Rohingya Salvation Army (ARSA) attacks, in Buthidaung, Myanmar Aug. 28, 2017. / Reuters YANGON Facebook posts from Myanmars army detailing the opening phase of its crackdown last month on self-identifying Rohingya Muslim insurgents an operation now being probed by the United Nations are no longer visible on its official page, Reuters found. Posts for the period between Aug. 1 and Aug. 29 appear to have been hidden on the Facebook page of the office of the commander-in-chief, Min Aung Hlaing, which has covered the militarys actions, including those in western Myanmar, in detailed dispatches. The posts, which can still be found using specific date or keyword searches, included detailed accounts of the operation launched by the army following attacks on security forces on Aug. 25. It is unclear why, or when exactly, the posts disappeared. They were not visible on Sunday, Monday or Tuesday from several locations across Asia. We dont hide anything, it might be some kind of error, said Ministry of Defense spokesman General Aung Ye Win. Zaw Htay, the spokesman for national leader Daw Aung San Suu Kyi, referred questions to Aung Ye Win. A spokesman for the military-run home affairs ministry, Police Colonel Myo Thu Soe, said he had no idea about the issue. A Facebook spokesperson said it was at the discretion of page administrators to hide posts if they wished. Around 480,000 Rohingya have fled to Bangladesh since the military counter-offensive began. The United Nations has described the campaign as ethnic cleansing. Myanmar has rejected that accusation, saying it is waging a legitimate fight against terrorists. A UN-mandated fact-finding mission is looking into alleged recent human rights violations by military and security forces and abuses in Myanmar, in particular in Rakhine State. The probe includes the violence that followed the Aug. 25 attacks. It was established after a similar, smaller military operation late last year. Missing Posts The official military Facebook page shows a gap of nearly a month between a post on July 31 and the next one on Aug. 30. Like other news organizations, Reuters had used the detailed, timely postings in much of its early coverage of the August crisis. The August posts can still be seen if searched for with a specific date or a keyword, suggesting they have not been deleted but removed from the pages timeline using Facebooks hide function. Keep in mind that if a post youve hidden was shared, it may still be visible to the audience it was shared with in other places on Facebook, says Facebook about the function on its website. The feature can be undone by the account holder to restore the posts. The hidden August posts include very detailed accounts of clashes with militants, often accompanied by pictures. The military first posted on the attacks on Aug. 25, attaching a map showing police posts and military base that had been attacked. The timeline updates resume on the military page after Aug. 31, with more than 360 posts in September, mostly about operations in Rakhine. Myawady, a media group which covers the military and publishes daily newspapers, has kept the August issues available online. Burma Northern Shan State Farmers Demand Crackdown on Illegal Pesticides Land around Lashio in northern Shan State / Thu Thu Aung / The Irrawaddy YANGON Local farmers and civil society organizations in northern Shan State called on the government to do more to prevent illegal pesticides and herbicides, often imported from China, from damaging land and affecting peoples health in the area at a land and environmental conference in Lashio on Saturday. Chinese-made insecticides and herbicides need greater inspection, urged Khun Phone, PaO officer-in-charge of the Reserved Land and Environmental Organization based in Kutkai Township, one of more than 100 attendees from 12 townships across northern Shan State. He described widespread damage to the soil, saying that even grass could not survive in some areas. According to testimony at the conference, the pesticides and herbicides in question are illegal in Myanmar but are readily available at local markets. Locals cannot understand the instructions of the imported productsoften written in Chineseand misuse and overuse the chemicals, said Khun Phone According to my observations, soil has been damaged and locals are facing health problems and allergic reactions due to the chemicals usage, Kachin social worker Phaw Nong, who is working in research and advocacy on agriculture in northern Shan State, told The Irrawaddy. Attendees of the discussion agreed on a statement addressing the problems and possible solutions that also called for a seed bank to preserve genetic diversity of crops, and the participation of locals, farmers, and land rights in assisting the government to enact the Land Law. Khun Phone said a collection of local seeds was needed as farmers continue to import seeds from China with a higher yield, meaning local species could be lost. Phaw Nong said that varieties of Shan corn and Shan rice seeds were now hard to obtain and the state government should be responsible for preserving a genetic seed collection. It is too dangerous to depend on another country for our agricultural sector, he said. Participants of the conference also called on the government to regulate a proper local market for produce protected from inflated prices due to agricultural exports to China. Commentary Will Intl Condemnation Bring Down Myanmars Democratic Transition? People gather in downtown Yangon on Sept. 19 to show their solidarity with Daw Aung San Suu Kyi as she makes a diplomatic address on Rakhine State. / Thet Htun Naing / The Irrawaddy It is a perilous time for Myanmars fragile democratic transition. At stake are not only the lives of the 52 million people who live in the country, but one of the worlds newest democracies could disappear once again under authoritarian rule. Emerging from 50 years of military dictatorship, Myanmar is now facing new enemies together with old enemiesinside and outside the countryafter coordinated attacks by Muslim militant group the Arakan Rohingya Salvation Army (ARSA) prompted military clearance operations and sparked conflict across northern Rakhine. In terms of the democratic transition, Myanmars first elected civilian government in decades, led by the National League for Democracy (NLD), has had no shortage of enemies over the 18 months since it took office in March 2016. The previous ruling partythe Union Solidarity and Development Partyformed by the ex-military junta, allied political groups and nationalists, is at the top of the civilian governments list of enemies. Obviously, in terms of democracy, it would seem that Myanmars powerful military is not on the side of the civilian government. The militarys main task is to safeguard the undemocratic 2008 Constitution which the government has pledged to amend. The main political tasks of the government and the military, therefore, are in direct conflict. This is still the biggest problem facing Myanmars transition. The recent militant attacks brought more enemies to the NLD administration, including, of course, ARSA, which was quickly denounced as a terrorist organization by the government after it claimed deadly attacks on 30 security outposts. Other new enemies include aggressive international ARSA apologists, international rights groups, and foreign media portraying Myanmar as a nationalist Buddhist country and humiliating elected leader Daw Aung San Suu Kyi. Many people in Myanmar are worried that Rakhine instabilityreinforced by one-sided international portrayals of the conflictmight bring their country back to the dark era of military rule which the population endured for five decades between 1962 to 2011. The prospect is a nightmare that no one wants to think of except opportunists from that era. Domestic political enemies of the new civilian governmentespecially the old establishmenthave been waiting for that opportunity to make a comeback. If that worst-case scenario occurred, the world would see its newest champion of democracy vanish in the Southeast Asian regionwhere many countries have ties to the monarchy, the military and authoritarian systems of rule. It will also have ripples across the world, where anti-Western leaders like Putin in Russia and Erdogan in Turkey are rising in popularity in their countries. The situation in northern Rakhine is unprecedentedhundreds of thousands of Muslim refugees have fled to Bangladesh and many villages in Maungdaw have been reduced to ashes. The conflict needs to be stabilized as soon as possible and all concerned authoritiesmainly the governmentneed to take action against those responsible for atrocious acts against civilians. Sprouting Anti-Western Sentiment International news coverage and the Wests position on the conflict have portrayed Myanmar as a hostile nation of Buddhists opposed to the self-identifying Muslim Rohingya minority. International publications do not hesitate to publish headlines with phrases suggesting Buddhists are unifying behind a deadly nationalism, and that Myanmar is home to a 21st century apartheid. For Myanmars peoplenearly 90 percent of whom are Buddhist according to the 2014 censusthese articles may seem cruel in supposing every Buddhist is embracing a deadly nationalism. Articles have also depicted the countrys de facto leader Daw Aung San Suu Kyi as implicated in the burning of villages and the killing of civilians, because she didnt show the sympathy expected for Rohingya refugees and condemn the militarys clearance operation against Rohingya. The New York Times published a story on Sept. 9 saying Aung San Suu Kyi is presiding over ethnic cleansing in which villages are burned, women raped and children butchered. The UN chose to use the term textbook example of ethnic cleansing for the exodus of refugees and human rights violations by security forces. On Sept. 15, The New Yorker magazine in the United States published a story with the headline Aung San Suu Kyi, the Ignoble Laureate while the Telegraph in the United Kingdom published a story the next day titled, Aung San Suu Kyi: Burmese Military Prisoner or Monster? These are just a few examples out of many. The UKs The Independent published a story on Sept. 8 written by Daw Aung San Suu Kyis biographer Peter Popham. The headline reads: As Aung San Suu Kyis biographer, I have to say that the only good thing she can do now is resign. This is not only an insult for Daw Aung San Suu Kyi but also for millions of Myanmar citizens who have chosen her to usher the civil war-torn country towards a brighter future. All these descriptions have gone far beyond the reality in the country. And one fundamentally important fact such people from international community might have forgottenperhaps deliberatelyis that she has received a solid mandate from the people of Myanmar in the 2015 election when her National League for Democracy party won a landslide victory across the country. Many groups and institutions in the West are humiliating Daw Aung San Suu Kyi as well as the country. Unison, one of the UKs largest trade unions, announced it had suspended an award given to her when she was placed under house arrest. The London School of Economics student union said it would be stripping Daw Aung San Suu Kyi of her honorary presidency. Some people and groups in the West aggressively called for Daw Aung San Suu Kyi to be stripped of her Nobel Peace Prize and other awards bestowed on her for her work for democracy over the past decades. Daw Aung San Suu Kyi has not responded to such calls. But in the eyes of the majority of Myanmar people, they would see those institutions and people in the West as humiliating the leader they love and believe in. At this point, weve seen the seeds of anti-Western sentiment sprouting among Myanmars public. On Sept. 19, when Daw Aung San Suu Kyi made a diplomatic briefing on the Rakhine conflict, many people gathered in public areas in several big cities like Yangon and Mandalay to show their solidarity with the State Counselor in the face of international pressure and what they saw as humiliation. Actually, most Myanmar people could be described as pro-Westvaluing Western concepts, including democracy. The main reason the Myanmar people like the West is that the United States and some European countries supported their democracy movement after the military cracked down on a nationwide pro-democracy uprising in 1988. But now some of them are starting to feel that the West is bullying Myanmar people over the Rakhine conflict, which is only one of the problems Myanmar is facing. The West shouldnt repeat mistakes that they made in the past, that have antagonized its allies to choose anti-Western leaders like Putin in Russia and Erdogan in Turkey. Political scientists concluded that without the Wests threat to expand the Atlantic alliance into Ukraine when Putin was elected in 2000, Russia wouldnt have taken Crimea back, leaving no choice for Putin. Making the bold decision to distance itself from the Islamic world in 1987 and move closer to the West, Turkey applied to be a member of the European Economic Community, the predecessor of the European Union. It was denied membership for decades as Europe embraced other smaller countries like Slovakia and Estonia. Political scientists suggested that Europe had humiliated Turkey. Arguably as a result, Turkish people voted for Erdogan in 2003, who they believed could stand up to Europe as a strong leader. Losing a Frontier for Democracy When it comes to the government and the militarythe most powerful and untouchable establishment in the countrywe know that they are not together, but that they are supposed to work together on issues like the Rakhine conflict and the countrys peace process. Sometimes, the military can be singled out for issues that concern it only, but we have to understand that the democratic transition can only advance if the civilian government and the military collaborate more. After all, the bigger picture much of the West does not see of this complex country is that there are only two main camps regarding political ideology in Myanmar: the pro-democracy camp and the anti-democracy camp. The incumbent government is in the pro-democracy camp while the latter is comprised of the old establishment and its associates. But what the international community is now portraying is the perfect scenario for the anti-democracy camp of Myanmar to bring down the democratic government. The country is still wrapped up in its core fight: democracy versus military dictatorship. Its not over yet and the old establishment and their allies are still trying to come back. The fight will only be over after the undemocratic Constitution is amended and the military have returned to their barracks. Thats what Daw Aung San Suu Kyis government has been trying to achieve. In this fundamental battle, many people in Myanmar still support Daw Aung San Suu Kyi and her government despite its shortcomings and inabilities. They understand it is not an easy task. Currently, Myanmar is still in the beginning of a transition, cleaning up messiness left over from decades of authoritarian rule and fixing those while dealing with the powerful military, as well as anti-democracy and nationalist forces. For people like self-identifying Rohingya whose rights have been taken away and abused overtime, only the democratic government can bring back their basic rights. To solve the problems of the Rakhine conflict, the government has started implementing recommendations made by a commission led by former UN secretary-general Kofi Annan, despite resistance from opponents and the military. It will need a certain amount of time. If the instability in Rakhine and the international communitys distorted portrayal of the situation lead to the collapse of the elected civilian government, there will be no other democratic institutions or parties to replace that power vacuum here in Myanmaronly the military and its associates. In this disaster scenario, everyone loses except the old establishment and its allies. One of the worlds newest democracies will vanish under the militarys boots and the Myanmar people will suffer once again. Wednesday, Sep 27th, 2017 (12:05 pm) - Score 1,849 The Director of Halls, Shaun Jones (Chartered Surveyor), has claimed the contracts that landowners in Shropshire are being asked to sign with wireless ISP Airband, which won the deal to roll-out a 30Mbps+ broadband network to 14,000 premises, leave too much scope for future problems. The Phase 2b deployment contract, which was recently signed as part of the local Connecting Shropshire project (here), aims to help ensure that 98% of premises in the county will be put within reach of a superfast broadband (30Mbps+) network by the middle of 2020. The funding for this is split between Airband (1.4m), Shropshire Council (2.24m), Broadband Delivery UK (5.29m) and the Marches LEP (2.27m). Under this approach the ISP plans to spend the next 3 years building a network of masts, which will then feed their fixed wireless broadband connectivity to small antennas that can be installed on the outside of local homes and businesses. The roll-out will be cheaper than upgrading existing fixed line infrastructure. As usual two of the challenges with building any new network, especially one that may need access to private land (e.g. elevated rural land that overlooks local communities, trees etc.), is with both gaining planning permission for the installation of new masts and securing the necessary wayleaves / land access agreements with private landowners. The mast themselves can vary in size, although Airband plan a number of 24 metre high steel lattice masts, each of which will feature several radio mountings between 3m and 24m (see picture at the bottom). Airbands mapping department generally take time to assess the local area, avoid local heritage sites and article 2 land and endeavour to mount the bare minimum level of equipment required to meet the desired level of coverage. However Shaun Jones (Chartered Surveyor) has warned that landowners who agree to host such equipment on their land, for a term of 10 years, could be at risk because the terms may not cover the potential for future problems (Shropshire Star). The agreements, which include a rent level and potential for a broadband connection, usually only involve a very small piece of land. Shaun Jones said: My only concern is that the written document proposed is brief which leaves too much scope for future problems. More detail can protect both parties. It is vitally important that a rent review provision with the correct frequency and basis is agreed. Another crucial point is that, at the end of the lease, the equipment is removed and the site fully reinstated. These types of agreement, where a rent will be paid, start off with both parties being content. If the operator, however, sells the business during the 10-year term of the lease, the landlord could end up with a tenant who is less reasonable. It is a case of striking the right balance when negotiating terms and concluding the paperwork. Certainly theres plenty of merit in getting contracts of this sort checked over, although its also worth remembering that Mr Jones has a clear vested interest in attracting business for his company. In keeping with that he makes a point of saying that theyve negotiated improved rent terms on similar developments. Additional legal complications can sadly also result in delays to the roll-out and higher deployment costs for the operator, which might in some areas even prevent the network from being built. A balance always has to be struck between the need for better local connectivity and the landowners desire for extra income. We have asked for Airbands thoughts and are awaiting their response. Last we forget that the new Digital Economy Act 2017 included some controversial reforms to the Electronic Communications Code (ECC), which should make it easier and cheaper for network operators to roll-out new broadband and telecoms infrastructure (masts, cables etc.) on public and private land. A report in Farmers Weekly recently suggested that the number of landowners seeking to remove operators from their property had increased by at least 30% due to fears over the codes impact (the code is due to be enforced from early 2018). Speaking of which, it looks as if one of the first Planning Applications for a new Airband mast has recently been submitted (here) and so far only one person is objecting: We wish to object to this application on the grounds of Intrusive development into open countryside, which is in a prominent position so will be visible for miles . If it must go ahead could it not be disguised as a tree as we have seen in other parts of the country? Credits to local broadband campaigner, Patrick Cosgrove, for pointing this out to us. UPDATE 27th Sept 2017 4:03pm Added a remark about the impact of the new ECC. Credits to William Perrin for that. UPDATE 29th Sept 2017 We have the following response from Airband. Video communications provider BlueJeans Network has integrated its technology with Facebook's Workplace application and the BlueJeans for Workplace by Facebook program is now available. The company gave iTWire a walk-through of the program on Tuesday. The chat did not work well on this writer's Linux machine, with sound not coming through, though the hardware in use was a set of Microsoft LifeChat USB headphones that work well with other video software like Zoom on Linux. In the end, this writer had to make do with audio through a mobile phone, while the demo was shown using screen sharing. BlueJeans Asia Pacific director James Brennan ran iTWire through the features of the new system, which is available for commercial customers. The company has also collaborated with Samsung Electronics to develop what it claims is an enhanced application for the Samsung DeX - the device which Samsung has developed so a phone can be used for desktop computing by connecting it to a keyboard, mouse and monitor. In a statement, Krish Ramakrishnan, co-founder and executive chairman of BlueJeans, said: Everything we do is aimed at providing a great user experience. We took on the hard work and complexity of application and product integration so that we could deliver a beautiful video meeting experience that delights our customers, enhances productivity, and enriches communications. "BlueJeans continues to prove that it offers the simplest and most compelling solutions for all the different ways people work, and this is just the beginning. According to the company, "BlueJeans for Workplace by Facebook makes it possible to conduct interactive video meetings and deliver presentations via BlueJeans while sharing content through Workplace. Users can also broadcast multi-party events through their feed and ensure that the right people see content whenever they need it." It claims that "this integration has drawn praise from numerous beta customers and is now available to all BlueJeans customers". Streaming our all hands meetings directly into Workplace has been great, said Karen Possemato, vice-president, Corporate Marketing and Communications at Illumina. Its easier for our employees to access content by providing a central place for them to watch meetings live and view the recordings. BlueJeans understands whats needed to support the evolving nature of our business and work processes. The BlueJeans-Samsung tie-up delivers a BlueJeans meeting experience to Samsung Galaxy mobile users whether tethered with Samsung DeX or untethered and handheld. BlueJeans commitment to providing seamless video meeting experiences is the primary reason we selected the company as a development partner, said Mok Oh, vice-president, Business Development at Samsung Electronics. Regardless of where users are or how they choose to connect, BlueJeans just works. This approach strongly aligns with Samsungs vision. We want customers to be free to use their mobile devices in ever-more productive ways. BlueJeans helps them do that. BlueJeans already offers integrations with Google Calendar, Facebook Live, Slack, HipChat, and Skype for Business, as well as its support for WebRTC. The company has enhanced its e-commerce and trial experience with a full-featured, 30-day free trial that fits companies requirements. Perth-based blockchain solutions firm DigitalX is guiding Europe-based Bankera through the process of what it claims is the biggest pre-initial coin offering, aimed at raising 25 million (A$37 million). The offering ends on 28 September. Bankera is a digital financial technology solution platform. The money was raised through the sale of 2.5 Billion Bankers (BNK) tokens at 0.01 each. With DigitalX as its corporate adviser, Bankera held the token sale to fast track the development of a "digital bank" for consumers operating in the blockchain era. This announcement is an exciting milestone for Bankera, said Leigh Travers, chief executive of DigitalX. The result of its latest pre-ICO round is testament to the strong interest and demand for the project being developed. At the same time, were excited to see how Bankera will disrupt the traditional banking sector with its innovative blockchain-enabled innovation. Travers told iTWire in response to queries that based on his knowledge, there were approximately 60,000 to 70,000 investors in cryptocurrencies across Australia less than 1% of the population. "The opportunity lies with the millennials the 15-30 age group who are taking a massive interest, with investors keen to support projects using blockchain technology that replace intermediaries and middle men organisations across finance, gaming and the supply chain," he said. Bankeras "digital bank" will provide traditional banking and investment banking services to the blockchain marketplace including payments, loans and deposits and investments. In particular, it will offer businesses instant payment settlements - using advanced proprietary know-your-client and fraud detection solutions - to collect information about the incoming payments and automatically settle transactions which otherwise could take weeks. Bankera expects to raise more funds through an ICO at a price of 0.017 in the near future and expects to receive a banking licence by 2019. Travers said Digital X was the world's first blockchain technology company to be listed on a major stock exchange, listing on the ASX three years ago. The company is involved with the entire ecosystem of the digital currency, having previously established one of the largest bitcoin mining services. He said the company had operated one of the largest bitcoin trading desks in the world and supplied the first regulated institution with bitcoin. DigitalX, which has offices in Perth and New York, also developed the world's first remittance mobile based app using blockchain, Airpocket, and is currently acting as corporate adviser to a growing number of companies looking to raise capital via an ICO, such as Bankera. Asked about the issues with cryptocurrencies in China, Travers said: "I do think the China ban is temporary and has cooled the market to ensure there is no crash. The news will ensure that the ICO and cryptocurrency market remain strong over the long term. "Chinese regulators are taking the appropriate time to review future regulations to both foster innovation and protect buyers. In the meantime, Chinese investors are looking outside China for quality international projects which are receiving much greater exposure." At its Splunk .conf 2017 conference in Washington DC this week, Splunk announced its next range of products, including expanded machine learning capabilities across the portfolio, making "machine learning mainstream", it says. Specifically, Splunk announced the release of Splunk Enterprise 7.0, Splunk IT Service Intelligence (ITSI) 3.0, Splunk User Behaviour Analytics (UBA) 4.0, and updates to Splunk Cloud, along with an updated suite of solutions to apply analytics and machine learning to fraud and cloud monitoring use cases. Machine learning is critical to customer success and to the evolution of Splunk. Our seamlessly integrated capabilities open up machine learning to everyone, enabling our customers to better predict future outcomes and more effectively analyse their data, said Richard Campione, chief product officer, Splunk. Data is a strategic advantage and organisations are looking for the fastest, most efficient way to turn data into answers. With machine learning and metrics advancements that anyone can use, Splunk Enterprise 7.0 and Splunk Cloud powerfully deliver mission-critical answers faster and easier than ever before. Splunk says its Splunk Enterprise 7.0 and Splunk Cloud products help customers better monitor, investigate and gain intelligence with their data. Splunk is already known for delivering performance over big data at scale but states the new products have achieved greater performance, accelerating monitoring and alerting by 20x, and core search by 3x. While more power and speed is always desirable, Splunk says this performance gain is strategic, not just delivering results faster, but enabling customers to predict future IT, security and business outcomes through the integrated machine learning in the new Splunk product range. These enhancements allow users to collect, prepare transform, explore, visualise and publish data insights. Machine learning is often talked about and is seen by many as the next frontier of business intelligence and analytics. It brings the potential of turning data analysis around, from delivering high-quality historic and current information to giving companies insights into trends and predictions that it may not have otherwise considered or recognised. Staples uses Splunk Enterprise for real-time analysis of critical business transitions from order management to invoicing, to warehousing to ultimately enhance our customer experience and stay ahead of online competitors, said Faisal Masud, chief technology officer, Staples. Splunk analytics and metrics are helping us optimise every aspect of what we do, including quickly identifying and correcting irregular transactions so customers receive the best possible service. The Splunk Enterprise platform is a critical piece of our business operations foundation. These machine learning capabilities are also delivered in Splunk's existing premium-packaged solutions, including Splunk ITSI 3.0, combing service context with machine learning to identify existing and potential issues prioritise restoration of business-critical services and deliver analytics-driven IT operations; and Splunk UBA 4.0, enabling customers to create and load their own machine learning models to identify custom anomalies and threats by opening up Splunk UBA to the world via a newly released software development kit (SDK). Splunk also released a free Splunk Machine Learning Toolkit (MLTK) to all customers. This is a data science application that includes public machine learning APIs for open source and proprietary algorithms, a data preparation module to help customers prepare and clean their data, and machine learning model management. Splunk further announced the availability of Splunk Enterprise Security (ES) Content Update, Splunk Security Essentials for Fraud Detection, Splunk Insights for AWS Cloud Monitoring, Splunk Insights for Ransomware, and Booz Allen Hamilton Cyber4Sight for Splunk. The new Splunk Enterprise 7.0 is available today, and Splunk ITSI 3.0 and UBA 4.0 will be available in October. The next release of Splunk Cloud will be available by January 2018. The writer is attending Splunk .conf 2017 as a guest of the company. Russia's communications watchdog has told Facebook that it will have to store the data of Russian users locally or else face closure next year. Roskomnadzor chief Alexander Zharod told reporters on Tuesday that foreign Internet companies would be forced to comply with the data storage requirement, Bloomberg reported. Else, they would be asked to pack their bags, he added. A law was signed by President Vladimir Putin three years ago requiring foreign technology companies to retain data of Russians on servers located within the country. The report said companies like Google and Alibaba had fallen into line, while Twitter had asked for more time to evaluate if it made economic sense to comply. Last November, Roskomnadzor ordered Russian service providers to block access to LinkedIn because the company had not complied with this law. In the United States, technology companies have been trying to fight orders to turn over data stored abroad. Microsoft won a case over emails stored in Ireland but is now facing a challenge in Supreme Court. IMB Bank is claiming a first in the banking industry with the launch of a new messaging service for its mobile customers. The bank, which describes itself as a challenge to the major banks, says its customers use the mobile banking app more than any other digital channel and, by launching Australias first authenticated messaging functionality within its mobile banking app, it has given its growing customer base unprecedented, instant assistance from its customer service team. And, the bank says the service is secure because it is available only after authentication through a fingerprint impression or a private PIN. The new app was developed in partnership with of banking technology provider Sandstone Technology, and global customer contact solutions company LivePerson. IMB Bank chief execuitve Robert Ryan said: Weve focused on forming strong, genuine relationships with our customers for 137 years. So, its important to us that we enable our customers to bank and talk with us in any way they choose. By partnering with leading, global technology firms, such as Sandstone Technology and LivePerson, we can deliver upon our digital strategy providing customer benefits and experiences that will continue our industry-leading customer satisfaction levels. Daniel Locke, IMB senior manager, digital channels, said: During the last 18 months, our app has rapidly become our most-used digital channel with twice as many daily users as traditional Internet Banking. And many customers use the App three times a day or more. Now, our customers can reach out to us without having to stop what theyre doing and make a phone call. And, we can reach out to our customers through the device they use most often if we need to engage with them quickly. Robert LoCascio, chief executive and founder of LivePerson, says he believes the launch of the app will establish a new benchmark in financial services for digital engagement with customers. We congratulate IMB Bank for delivering this key innovation to its customers. According to Julian Blackley, chief executive of Sandstone Technology, Expectations of banking customers are increasing exponentially particularly in the mobile app space. This messaging innovation is testament to the collaboration and agility from all involved to deliver this service to market very quickly with the customer firmly at the centre of our thinking. Our partnership with the team at IMB Bank extends over many years and its a privilege to be able to jointly innovate and shape the market with partners such as IMB. Technology companies, no matter their size or location, are never tired of talking about "innovation" and claiming that they have contributed to making the world a better place. The reality, however, is quite different. In the light of recent events indeed, events during the whole of this year it might well be time for these self-promoters to take a pause, reflect on the mess they have created and try to repair the damage. Deloitte, described by Wikipedia as "one of the 'Big Four' accounting firms and the largest professional services network in the world by revenue and number of professionals, reported a hack this week. It turns out that this breach occurred last year and the company only found out in March. So far, Deloitte has remained silent about the hack, with not a single public statement about what happened even though it is said to have been investigating the hack at least since it was discovered. Credentials for the company have beenfor some time. This is a company that advises others on security. And its developers appear to be the ones who have uploaded these credentials to the Web. Deloitte appears to be more interested in painting the hack as one that affected a small number of accounts. The truth appears to be the exact opposite. Equifax is another case in point which illustrates the mess that exists. The company has put the data of up to 143 million Americans at risk, following a data leak. One can go on and on WannaCry, NotPetya (or whatever you want to call it), Viacom leaving data unsecured on the Web like many others, Apple (which claims to be a company that puts security first) releasing software without fixing serious bugs... It all illustrates one thing: a serious level of incompetence in the technology industry. And let's not forget Microsoft, the Typhoid Mary of the Internet, which was the forerunner of all this mess, creating and forcing on people software that resembles Swiss cheese more than Swiss cheese does itself. The man chiefly responsible for that mess, Bill Gates, is today the richest man in the world. Meanwhile, Windows, his creation, is being hacked all over the world. He certainly has a lot to be proud about. The men (and yes, it is mostly middle-aged white men) who head these companies have made millions, if not billions, by selling nay, leasing software to the common man that is as safe as lighting a match and placing it on a petrol-drenched human hand. And still they keep talking of how good life will be when the next iteration of whatever garbage they sell is out and selling for inflated prices. The public are suckers. They buy that next iteration and sometimes stand in queue for hours to do so. It is high time to put on the brakes and start fixing the mess. It is also time for people to start calling the mess for what it is and naming names. Tech people have got a free ride all along, by tricking people into believing into they are leading the way to nirvana. All they have done is created an enormous mess where nobody is safe anymore. The call should go out physician, heal thyself. Container management software provider Rancher Labs has released a technical preview of version 2.0 of Rancher, its application used to manage containers. Sheng Liang, chief executive and co-founder of the company, told iTWire that with the latest release one could manage all Kubernetes clusters under a single Rancher instance. Containers allow the packaging and isolation of applications with all the files they need to run. They can be easily moved between development, testing and production environments without any loss of functionality. Kubernetes is an open-source system for automating deployment, scaling and management of containerised applications It was originally designed by Google and later donated to the Cloud Native Computing Foundation. With the Rancher 2.0 technical preview users can stand up, and manage, new Kubernetes clusters using the Rancher Kubernetes distribution or import existing Kubernetes clusters, including hosted container services such as Google Container Engine. The current version of Rancher, 1.0, powers more than 10,000 Docker clusters, over a thousand of which run Kubernetes. Beginning with Rancher 2.0, every cluster will now be based on Kubernetes. "This makes it even easier for users to take advantage of the power of Kubernetes, as well as its rapidly growing ecosystem. By providing a simple and intuitive user experience built on Kubernetes, Rancher 2.0 will accelerate adoption of Kubernetes within the enterprise," a statement from Rancher said. "The Rancher community and our partner ecosystem is incredibly active," Liang said, "Our team is fortunate to regularly receive feedback and requests on desired features and support items. In Rancher 2.0, we are dramatically improving Kubernetes support, making day-to-day Kubernetes use incredibly simple, to accelerate adoption of Kubernetes in the enterprise." Canonical vice-president of development Dustin Kirkland said with Canonical's experience deploying Kubernetes on Ubuntu in the enterprise, "we see first-hand the tremendous opportunity for Rancher 2.0 to solve container management at scale". The new release included the following features: Serial enterpreneuer Simon Hackett has vacated the position of acting chief executive at battery storage company Redflow after spending the last 12 months refocusing and recapitalising the business. Hackett Redflows largest shareholder will continue as a non-executive director of Redflow with special oversight for technology-related matters, and the board of the company has promoted chief operating officer Richard Aird to the position of CEO. The ASX-listed Redflow (ASX:RFX) has also recruited Brett Johnson, Qantas general counsel from 1995 to 2012, to its board as independent non-executive chairman, replacing Hackett. The company says Aird, with more than 20 years experience in commercial development and operations, has been appointed to accelerate Redflows new strategic direction announced in May and to drive the company as it starts manufacturing batteries in Thailand and implements cost downs in battery production. Redflow says Johnson brings extensive experience to the company, including directorships of listed companies, Scott Corporation and Helloworld, where he was chairman from August 2014 until December 2015. Hacketts technology oversight role will comprise external communications, public advocacy for the companys zinc-bromine flow battery technology and guiding its continuing technical development and direction, including continued involvement with the development of the Battery Management System (BMS) that he architected. Hackett said the companys leadership changes would advantage the success of Redflow. These enhancements to our management and Board structure are designed to ensure we have right people working in their respective areas of strength, he said. With running the business and the board now in the hands of professionals in those fields, I can focus my passion, skills and energy on successfully overseeing the interface between Redflows unique technology into real-world energy systems, and communication of these benefits to customers and industry. The past year has seen strong demand for our batteries, so my goal is to ensure that as we scale up production, our partners find it easy to integrate Redflow batteries into energy storage systems. Aird said Redflow was now focussed on the successful production of batteries in Thailand, and once the new factory is operating, we will undertake a series of further cost-down initiatives to ensure our batteries are both profitable and competitive". Cloud data back-up platform for small and medium businesses Dropsuite has signed a new distribution partnership with technology distributor of IT and electronic solutions, D&H Distributing. Under the deal, the D&H cloud marketplace portal allows VARs/MSPs to easily assemble a customised group of various software services, including Dropsuites email back-up and archiving, which they can resell. Dropsuite says the partnership provides a straight-forward path for VARs/MSPs to transition toward a more service-oriented model that is becoming prevalent and profitable amongst suppliers of IT hardware and software to SMBs. Peter DiMarco, vice-president of VAR Sales at D&H Distributing, said, "D&H is excited to add Dropsuites solutions to our Cloud Marketplace portal, expanding our service offering to include powerful, hosted data protection based on the Microsoft Office 356 platform. "The companys versatile line of products for email, server, and mobile device backup will contribute to an effective business continuity offering for our resellers and MSPs." Dropsuite chief operating officer Ridley Ruth said the partnership with D&H is strategically aligned with Dropsuites expansion plans in its reach throughout North America by partnering with leading distributors. "We are pleased that D&H recognises the value of Dropsuites products and look forward to building on this relationship to help even more solution providers meet customer data protection needs, reduce support costs and generate recurring revenue. VANCOUVER, British Columbia, Sept. 27, 2017 /CNW/ -- Tahoe Resources Inc. ("Tahoe" or the "Company") (TSX: THO, NYSE: TAHO) announced today that the Guatemalan Supreme Court issued a ruling in response to the Company's request for clarification regarding the specific geographical areas to be included in the Ministry of Energy and Mines ("MEM") consultation process under ILO Convention 169. The Court clarified its decision to limit consultation to the Xinca communities in the four municipalities in the region of the Escobal mine including: Casillas, Nueva Santa Rosa, Mataquescuintla and San Rafael Las Flores. In addition, the Supreme Court declined to review the Company's request to order MEM to issue the annual renewal of Escobal's export credential. The Company is evaluating its legal and administrative options. The Constitutional Court is expected to rule on all appeals of the Supreme Court's decision on the definitive amparo by the end of the year. Tahoe continues to focus on reaching a peaceful and expeditious conclusion to the roadblock at Casillas, which is approximately 16 kilometers away from the Escobal Mine in San Rafael Las Flores. The Company is making progress with engaging stakeholders at the Casillas roadblock. About Tahoe Resources Inc. Tahoe's strategy is to responsibly operate mines to world standards and to develop high quality precious metals assets in the Americas. Tahoe is a member of the S&P/TSX Composite and TSX Global Mining indices and the Russell 3000 on the NYSE. The Company is listed on the TSX as THO and on the NYSE as TAHO. MONTREAL, QUEBEC--(Marketwired - September 27, 2017) - Falco Resources Ltd. (TSX VENTURE: FPC) ("Falco" or the "Company") is pleased to announce the execution of a letter of agreement for the acquisition of the Donalda property ("Donalda") from Globex Mining Enterprises Inc. ("Globex"). Donalda is located near Falco's 100% owned Horne 5 Project located in Rouyn-Noranda, Quebec. In consideration for the acquisition of the Donalda property, Falco has agreed to pay $300,000 in cash and issue 350,000 units to Globex ("Unit"). Each Unit consists of one (1) common share ("Common Share") of Falco and one (1) common share purchase warrant ("Warrant") of Falco. Each Warrant will entitle the holder thereof to purchase one (1) Common Share of the Company at a price of C$1.15 per Common Share, for a period of 5 years following the closing date. Additionally, Falco has agreed to grant Globex a 2.5 % Gross Metal Royalty on all mineral production from the Donalda property and to transfer a 100% ownership of Falco's Dickenson property located on the east side and adjoining Globex's Francoeur/Arntfield gold property. The transaction is subject to Falco obtaining all required regulatory approvals from the TSX Venture Exchange and execution of a final acquisition agreement, including customary representations, warranties, covenants and conditions for a transaction of such nature. The Donalda Mine Property The Donalda Mine Property is located within the town of Rouyn-Noranda, Quebec, due east of the Horne 5 deposit and Quemont mine infrastructure. The property consists of seven mining claims, covering approximately 146 hectares in the Rouyn Township. The property is host to two important, sub parallel, extensive and continuous gold bearing quartz veins with a historical resource (non NI 43-101 compliant1) of 1.5 million tonnes grading 6.9 g/t gold, of which approximately 790,000 tonnes were mined and approximately 710,000 tonnes remain unexploited. During mine production, a 620 metre shaft provided access to the two known gold bearing vein structures. The majority of the gold was extracted from the Donalda #1 vein (782,360 tonnes at 5.58g/t were mined over seven years of production) which was mined over a strike length of 825 metres and with a dip length of 400 metres. The #2 vein was discovered about 300 metres below the #1 vein. The small amount of production coming from Donalda #2 Vein (32,145 tonnes at 5.76 g/t were mine over one year of production), was extracted from the Quemont mine. Both vein structures remain open down dip and could have significant exploration upside. The gold bearing structures were known by previous operators to persist down-dip at least as far as the Horne Creek fault. Surface diamond drilling carried out by Minnova Inc. in 1986 located the extension of the #1 vein south of the Horne Creek fault, which was not mined. Very little exploration has been undertaken below the 700 metres depth. Most importantly, the Donalda property and its exploration potential will benefit from the proximity to infrastructure of our Horne 5 Project. Qualified Person Mr. Claude Bernier, Exploration Manager, (P.Geo. Eng.) is the qualified person as defined by National Instrument 43-101 who has reviewed and verified the technical information contained in this news release. About Falco Falco Resources Ltd. is one of the largest mineral claim holders in the Province of Quebec, with extensive land holdings in the Abitibi Greenstone Belt. Falco owns about 67,000 hectares of land in the Rouyn-Noranda mining camp, which represents approximately 70% of the entire camp and includes 13 former gold and base metal mine sites. Falco's principal property is the Horne 5 Project located in the former Horne mine that was operated by Noranda from 1927 to 1976 and produced 11.6 million ounces of gold and 2.5 billion pounds of copper. Osisko Gold Royalties Ltd is the largest shareholder of the Company and currently owns 13.3% of the outstanding shares of the Company. TORONTO, ONTARIO--(Marketwired - Sept. 27, 2017) - African Gold Group, Inc. (TSX VENTURE:AGG) ("AGG" or the "Company") is pleased to announce that it has executed a binding letter of intent ("LOI") for the purchase by HUM of up to 19.9% of the common shares of AGG and the ongoing joint development of AGG's Kobada Gold Project (the "Transaction"). Financing On closing of the Transaction, HUM will purchase 40,000,000 units of AGG ("Units") at a price of CDN$0.09 per Unit for gross proceeds to AGG of CDN$3,600,000, which, on closing will represent 10% of the issued and outstanding common shares of AGG. Each Unit will be comprised of one common share of AGG (each, an "AGG Share") and one common share purchase warrant ("Warrant") with each Warrant entitling the Investor to purchase one additional AGG Share at a price of CDN$0.12 for a period of 36 months following closing of the Transaction. In addition, AGG will grant HUM a right (the "HUM Subscription Right") to purchase an additional 48,888,888 AGG Shares at a price of $0.09 per AGG Share for gross proceeds to AGG of CDN$4,400,000, which, shall be paid by HUM in kind through the issuance to AGG of such number of common shares of HUM (the "HUM Shares") equal to CDN$4,400,000 divided by the volume weighted average trading price of the HUM Shares on the AIM for a period of 20 consecutive trading days ending on the trading day immediately prior to the closing of the Transaction. Where HUM is not satisfied with its due diligence review of the Kobada Gold Project (the "Project") during the 120-day period following closing of the Transaction (subject to extension in certain circumstances), the HUM Subscription Right shall automatically terminate and neither HUM nor AGG shall have any further liability to the other. Where HUM is satisfied with its due diligence review of the Project, HUM shall exercise the HUM Subscription Right and issue the HUM Shares to AGG. DFS and Joint Venture Concurrent with the exercise of the HUM Subscription Right (as described above), AGG and HUM shall enter a Joint Venture Agreement providing for the following: Establishment of a joint Technical Committee to oversee and manage the preparation of a DFS for the Project; AGG to fund 100% of the costs to complete the DFS in accordance with a budget as mutually agreed between AGG and HUM; Where AGG is required to issue additional common shares to fund the completion of the DFS, HUM shall subscribe for such number of shares required for HUM to maintain its pro-rata equity interest in AGG to a maximum of CDN$1,000,000; Upon completion of a DFS to the satisfaction of HUM: The Project shall be transferred to a new joint venture company ("JVCo"), HUM shall fund 100% of the capital costs required to build the mine and processing plant as outlined in the DFS (including any contingency) (the "Development Capital"), plus, if required, 10% extra funding, The board of JVCo shall make all decisions relating to the construction, management, operation, development and implementation of the Project and shall consist of a majority of members as appointed by HUM, and HUM shall acquire up to 50% of the shares in JVCo on an ongoing basis pro-rata to the amount contributed by HUM to the Development Capital with such 50% shareholding being reached on the earlier of: (i) the date HUM completes funding of 100% of the Development Capital, and (ii) the date of completion of the construction of the mine and processing plant for the Project in accordance with the DFS; From commencement of production from the Project, HUM shall receive 70% of net cash flows from the Project until 100% of the Development Capital (including the 10% extra funding if paid) has been repaid and thereafter net cash flows shall be paid as to 50% to AGG and as to 50% to HUM. Completion of the Transaction is subject to various conditions including agreement by HUM and AGG of various definitive agreements, approval by the board of directors of HUM and AGG and applicable approvals from regulatory authorities including by the TSX Venture Exchange. Stephan Theron, Chief Executive Officer of AGG, commented: "This transaction with Hummingbird is significant for AGG as it validates the intrinsic value of the Kobada gold Project and fast tracks the planned development program. Hummingbird provides us the financial capacity to develop the Kobada Gold Project and we are also gaining a partner with an operational presence in Mali. Kobada provides Hummingbird the ability to further increase production output at their Yanfolila mine. The partnership is a win-win for both groups. We look forward to working with the Hummingbird team on this transaction." Dan Betts, CEO of HUM, commented: "We are extremely excited about the optionality this transaction provides Hummingbird and working with the management of AGG who have a strong track record of creating shareholder value within the industry." Kobada Gold Project African Gold Group is currently reviewing the existing feasibility study of the Kobada Gold Project in an effort to optimise the existing Mineral Reserve and Resource estimates, relative to a potential phased approach of a larger Phase 1 production profile. About African Gold Group African Gold Group is a Canadian exploration and development company with its focus on West Africa. African Gold Group is focused on the development of the Kobada Gold Project in Mali, a low capital and operating cost gold project with potential to produce more than 50,000 ounces of gold per annum. For more information regarding African Gold Group visit our website at www.africangoldgroup.com. Vancouver, British Columbia--(Newsfile Corp. - September 27, 2017) - Los Andes Copper Ltd. (TSXV: LA) ("Los Andes", or the "Company") is very pleased to announce the results of drill holes V2017-08, V2017-09B, V2017-10 and V2017-11. Following the results already published for the 2017 campaign, these results provide support to the extension to the north of the current central core, with some of the highest grade intersections in the deposit being encountered in V2017-10, the northernmost hole of this campaign. Results also provide further support to the continuity of higher grade mineralization near surface in the project's central core, over an area of 350 metres north-south by 400 metres east-west. The key results from these holes are: V2017-09B: 77.6 m @ 0.52 % Cu, 153 ppm Mo and 1.3 g/t Ag (0.57 % CuEq) from 64.4 m downhole Including: Including: 22.0 m @ 0.60 % Cu, 248 ppm Mo and 1.4 g/t Ag (0.68 % CuEq) from 108.0 m downhole V2017-10: 506.0 m @ 0.57 % Cu, 357 ppm Mo and 1.1 g/t Ag (0.67 % CuEq) from 486.0 m downhole Including: Including: 76.0 m @ 0.69 % Cu, 522 ppm Mo and 1.5 g/t Ag (0.84 % CuEq) from 514.0 m downhole Including within, 30.0 m@ 0.95 % Cu, 337 ppm Mo and 1.6 g/t Ag (1.05 % CuEq) from 558.0 m downhole Including within, 30.0 m@ 0.95 % Cu, 337 ppm Mo and 1.6 g/t Ag (1.05 % CuEq) from 558.0 m downhole 88.0 m @ 0.70 % Cu, 278 ppm Mo and 1.4 g/t Ag (0.78 % CuEq) from 684.0 m downhole 60.0 m @ 0.73 % Cu, 341 ppm Mo and 1.5 g/t Ag (0.83 % CuEq) from 924.0 m downhole Including within, 22.0 m@ 0.94 % Cu, 392 ppm Mo and 1.5 g/t Ag (1.05 % CuEq) from 924.0 m downhole Cautionary Statement: All thicknesses from intersections from drill holes are down-hole drilled thicknesses. True widths cannot be determined from the information available. Background Historical drilling was carried out on the Vizcachitas project in three exploration campaigns during 1993, 1996/1997 and 2007/2008. However, the higher grade central core had only been drilled in the 1990's campaigns and with generally shallower drill holes, therefore not properly reflecting the potential of this core area. During 2014, a complete review of the historical information was performed to better understand the project, including re-logging all of the 146 drill holes located within the property. The re-logging was led by Gonzalo Saldias, a Chilean geologist and one of the most recognized experts in Chilean porphyry systems. This detailed review showed that the historical logging and geological model had not properly identified the importance of the higher grade early diorite porphyry and hydrothermal breccias. The re-logging showed that these higher grade geological units extend over a distance of 1,400 metres north-south and 700 metres east-west. The mapping showed that these breccias have grades increasing with depth and demonstrates the potential for higher grades below the historical drilling. In 2015, Los Andes began a drill program to confirm a new geological model and to demonstrate the extent of the central core mineralisation. A first stage of this exploration campaign was completed in 2015/2016, with eight diamond drill holes totaling 3,661 metres. During 2017, Los Andes has carried out a second stage of this campaign with the purpose of demonstrating the northern and southern extension of the high grade core. Location of Drill Holes: Hole Easting Northing Elevation (metres) Azimut (degrees) Inclination (degrees) Final depth (metres) V2017-01 365,778 6,413,544 2,003 110 -60 (69.90) Abandoned V2017-01A 365,786 6,413,534 2,003 105 -60 851.25 V2017-02 366,278 6,413,255 2,090 290 -65 1,030.60 V2017-03 365,936 6,413,856 2,049 290 -80 (62.00) Abandoned V2017-04 366.200 6,413,056 1,978 110 -70 653.00 V2015-08 Ex 365.159 6,413,542 2,154 290 -75 1,001.00 V2017-05 365,996 6,413,879 2,080 270 -80 931.90 V2017-06 366,037 6,413,538 2,073 110 -65 857.00 V2017-07 366,099 6,413,337 2,046 110 -60 721.10 V2017-08 365,996 6,413,879 2,080 15 -70 400.25 V2017-09 365,785 6,413,377 1,993 120 -70 (85.50) Abandoned V2017-09B 365,785 6,413,382 1,993 120 -75 804.20 V2017-10 365,682 6,413,878 2,040 65 -75 1,001.00 V2017-11 365,745 6,413,745 2,024 85 -75 735.90 All coordinates are in UTM WGS84 A drill hole location plan is available on our website: www.losandescopper.com Summary of Drill Holes Drill Hole V2017-08 V2017-08 was drilled in a northerly direction from the same platform as V201705. The aim of the drill hole was to test the covered area between the two outcropping un-mineralised diatreme breccias. The hole was speculative in that there are no nearby drill holes and no outcrop. If the drill hole showed that there was mineralised material between these two outcrops, this would have opened up a large area to the west. In the end, the hole encountered only diatreme indicating that the two outcrops are connected at depth. Drill Hole V2017-09B V2017-09B was drilled in a south-east direction from the same platform as the drill hole V2015-02. The hole was designed to test the southern extension of the mineralisation identified in drill holes V2015-03 and V2015-05. The top of bedrock was at a depth of 64.4 metres, where a sequence of andesites and hornfels continued to a depth of 570.9 metres. The drill hole then entered a tonalite until the end of the hole at a depth of 804.2 metres. From the top of bedrock, at a depth of 64.4 metres, the drill hole intersected 77.6 m @ 0.52 % Cu, 153 ppm Mo and 1.3 g/t Ag (0.57 % CuEq). This intersection demonstrates the southern continuity of the good supergene mineralisation identified in the drill holes to the north and further extends it to the south. Key intersections from drill hole V2017-09B: Hole Number Depth From (m) Depth To (m) Length (m) Cu % Mo ppm Ag g/t CuEq % V2017-09B 64.4 142.0 77.6 0.52 153 1.3 0.57 including 108.0 130.0 22.0 0.60 248 1.4 0.68 V2017-09B 228.0 278.0 50.0 0.47 265 1.3 0.55 * Copper equivalent grade has been calculated using the following expression: Cu Eq (%) = CuT (%) + 2.5 x Mo (%) + 110.55 x Ag (%), using the metal prices: $ 2.2 / lb. Cu, $5.5 / lb. Mo and $15.2 / Oz (same reference prices as in reporting of 2015/2016 results). All thicknesses from intersections from drill holes are down-hole drilled thicknesses. True widths cannot be determined from the information available. Drill Hole V2017-10 V2017-10 was drilled in a north-east direction to check the northern extension of the mineralisation that had been identified in the drill hole V2017-05. The top of bedrock was intersected at a depth of 50.5 metres. The drill hole cut a sequence of fine and medium grained diorites and occasional hydrothermal breccias to a depth of 486 metres. From a depth of 486 metres, the drill hole entered a long sequence of hydrothermal breccias, with 506 m @ 0.57 % Cu, 357 ppm Mo and 1.1 g/t Ag (0.67 % CuEq). Within this run there some higher grade sections with 30 m @ 0.95 % Cu, 337 ppm Mo and 1.6 g/t Ag (1.05 % CuEq) from 558 metre downhole and also 88 m @ 0.70 % Cu, 278 ppm Mo and 1.4 g/t Ag (0.78 % CuEq) from 684 metre downhole. The grades improve with depth as the chalcopyrite-pyrite ratio increases and, from a depth of 920 metres, bornite was identified in drill hole with up to 20 percent of the sulphides being bornite. This mineralisation shows the potential for the grade to increase with depth. This good mineralisation is open to the north. This drill hole and V2017-05 have transformed the northern part of the project, with high grade mineralisation within the hydrothermal breccias and the early diorite porphyry. In the 2014 PEA, this area was classified as waste. Key intersections from drill hole V2017-10: Hole Number Depth From (m) Depth To (m) Length (m) Cu % Mo ppm Ag g/t CuEq % V2017-10 486.0 992.0 506.0 0.57 357 1.1 0.67 including 514.0 590.0 76.0 0.69 522 1.5 0.84 inc. within 558.0 588.0 30.0 0.95 337 1.6 1.05 including 622.0 644.0 22.0 0.64 790 1.6 0.85 including 684.0 772.0 88.0 0.70 278 1.4 0.78 inc. within 688.0 726.0 38.0 0.80 338 1.5 0.90 including 882.0 902.0 20.0 0.65 766 0.8 0.85 including 924.0 984.0 60.0 0.73 341 1.5 0.83 inc. within 924.0 946.0 22.0 0.94 392 1.5 1.05 * Copper equivalent grade has been calculated using the following expression: Cu Eq (%) = CuT (%) + 2.5 x Mo (%) + 110.55 x Ag (%), using the metal prices: $ 2.2 / lb. Cu, $5.5 / lb. Mo and $15.2 / Oz (same reference prices as in reporting of 2015/2016 results). All thicknesses from intersections from drill holes are down-hole drilled thicknesses. True widths cannot be determined from the information available. Drill Hole V2017-11 V2017-11 was drilled 150 metres to the south of V2017-10, to find the southern extension of the mineralisation identified in drill holes: V2017-05 and V2017-10. This hole was also intended to check the northern extensions of the mineralisation identified in V2015-01 and V2015-08. The top of bedrock was intersected at a depth of 86 metres in a fine grained diorite which continued to a depth of 632 metres. Within this run there some higher grade sections with 26 m @ 0.55 % Cu, 253 ppm Mo and 1.2 g/t Ag (0.63 % CuEq) from 488.0 metre downhole. From a depth of 600 metres, bornite mineralisation was identified with up to 10 percent of the sulphides being bornite. The bornite mineralisation, like in drill hole V2017-10, demonstrates the potential for increasing grades with depth. From a depth of 632 metres, the drill hole entered a post mineral dacite dyke and diatreme. Key intersections from drill hole V2017-11: Hole Number Depth From (m) Depth To (m) Length (m) Cu % Mo ppm Ag g/t CuEq % V2017-11 440.0 458.0 18.0 0.46 307 0.9 0.55 V2017-11 488.0 514.0 26.0 0.55 253 1.2 0.63 V2017-11 554.0 576.0 22.0 0.48 307 1.1 0.57 * Copper equivalent grade has been calculated using the following expression: Cu Eq (%) = CuT (%) + 2.5 x Mo (%) + 110.55 x Ag (%), using the metal prices: $ 2.2 / lb. Cu, $5.5 / lb. Mo and $15.2 / Oz (same reference prices as in reporting of 2015/2016 results). All thicknesses from intersections from drill holes are down-hole drilled thicknesses. True widths cannot be determined from the information available. QA/QC Quality assurance and quality control procedures include the systematic insertion of duplicate and standard samples in to the sample stream. Drill core samples were sawn in half, labelled, placed in sealed bags and were shipped directly to the preparatory laboratory of ALS Minerals in Coquimbo, Chile. All geochemical analyses were performed by ALS Minerals in Lima Peru. All samples were assayed using the method ME-MS61, a four-acid digestion with an ICP-MS finish. Copper samples with grades above 0.6 % Cu were reanalysed using ALS method Cu-OG62, a four-acid digestion with an AAS finish. Mr. Amberg MSc CGeol FGS is the Qualified Person responsible for the preparation of this news release. Team Credentials Mr. Amberg MSc CGeol FGS is a geologist who is a graduate of the Royal School of Mines, London, has an MSc. from University College and is also a Chartered Geologist with the Geological Society of London. He has close to 30 years of diverse experience having worked in Asia, Africa and South America for both multinational and junior companies. He began his career in 1986 working with Anglo American in South Africa before moving on to an exploration position with Severin-Southern Sphere. In 1990 Mr. Amberg moved to Chile where he first worked with Bema Gold on the Refugio project before taking up a position with Rio Tinto. At Rio Tinto he was involved in exploration programs in the Atacama and Magallanes Regions and managed the Barreal Seco (now part of Las Cenizas) exploration program. In 1996 he joined Kazakhstan Minerals Corporation in Kazakhstan, setting up and managing offices for the drilling and resource estimation for JORC compliant feasibility studies on three large projects that are now operating mines. He became General Director for two joint ventures in KazMinCo where he managed all technical and local issues. In 2001 he returned to Chile where he started a geological consulting firm specialising in project evaluation and NI 43-101 technical reports. Mr. Amberg's clients included Rio Tinto, Barrick, Codelco, Anglo American, Pan Pacific Copper and various junior mining companies. He joined Los Andes Copper in 2012 as Chief Geologist and is now also the President and Chief Executive Officer. Mr. Amberg MSc CGeol FGS is a Qualified Person under NI 43-101. Gonzalo Saldias is a geologist who is a graduate of Universidad Catolica del Norte, Chile. He has over 35 years of experience working within Chile and internationally; mainly on copper porphyry, epithermal gold silver and iron-oxide copper gold systems. For the last seven years, he worked for Antofagasta Minerals evaluating copper porphyry projects within Chile, assessing their geological and economical potential. Prior to that he had worked for ten years with Placer Dome Latin America, generating and evaluating exploration projects within the region. Prior to Placer Dome, he worked for Codelco as head of exploration geology for the El Salvador Division, developing the prospective areas near to the mine. He also worked for Northern Resources, Homestake, Utah, Anaconda and as an independent consultant. A 47-year-old British man who was being tested for lung cancer received some good, but unexpected, news: Instead of signs of cancer in the man's lungs, doctors found a tiny Playmobil plastic traffic cone lodged in his airways, according to a new report of the man's case. The toy turned out to be a part of a set the individual had received and shortly after, accidentally inhaled 40 years earlier, according to the case, published Sept. 22 in the journal BMJ Case Reports. Back then, the play set had been given to him for his seventh birthday. Upon learning of his odd diagnosis, the man said that he did recall putting pieces from the play set in his mouth when he was little. But amazingly, the plastic cone had remained undetected in his lungs for four decades, until it caused a "traffic jam" in his airways and triggered a nagging cough. [27 Oddest Medical Cases] In the man's case, the long-lost toy was discovered when he sought help from his doctor for a bout of pneumonia. He was an ex-smoker and had smoked about a pack a day for 30 years, according to the case report. The man's pneumonia was treated with antibiotics, but he continued to have a phlegmy cough, so he was sent to a lung specialist. The lung specialist took an X-ray of the man's chest and saw what he thought were signs of a possible cancerous growth, according to the report. To investigate further, doctors performed a bronchoscopy, a procedure in which a flexible tube is inserted into the lungs to figure out the cause of blocked airways. But instead of detecting a tumor, the doctors discovered a tiny plastic object that was partially blocking one of the main airways leading to a section of the man's right lung, said lead author Dr. Nicholas Denny. At the time of the case, Denny was getting his medical training at Wythenshawe Hospital in Manchester, England. Denny said doctors think that the boy put the plastic traffic cone in his mouth and then accidentally inhaled it, as opposed to swallowing the toy. After doctors successfully removed the object, it was identified as a plastic Playmobil traffic cone, according to the report of the case. Lost and found It may seem unusual that a plastic object which was, after all, stuck in the man's airways did not cause symptoms sooner, and so was overlooked for four decades. [11 Weird Things People Have Swallowed] It's almost certain that the man would have had symptoms as a child, such as coughing or chest pain, immediately after he inhaled the toy, Denny told Live Science, but these symptoms might have been blamed on a short-term illness. And because the toy traffic cone is hollow with holes on either end, it may have allowed for airflow in the passageways of the lungs rather than interfering with it, Denny said. As the boy got older, the airway may have adapted around the plastic traffic cone, by absorbing the toy into the mucosal lining so that the airway developed around it, Denny said. Although the toy may have caused some obstruction in the airway, it may not have caused any symptoms, he explained. The man's smoking habits may have also contributed to the delay in detection: Smoking may have suppressed his immune function in the airways, making it more difficult to clear away secretions, such as mucus, and making him more vulnerable to infections, Denny said. These secretions might have been cleared from a normal airway, Denny said, but in this man's case, the combination of being a long-term smoker along with the partial obstruction from the lodged toy prevented such secretions from being cleared. This buildup of secretions ultimately led to the man developing pneumonia. Two months later, lung specialists finally discovered that the man's symptoms, including the lingering cough, were connected to the inhaled toy. "On a positive note, his symptoms improved markedly, and he finally found his long-lost Playmobil traffic cone in the very last place he would look [for it]," the case report authors wrote. Originally published on Live Science. A rare new species of rat up to four times the size of the rodents that populate American cities has been identified in the Solomon Islands. The discovery marks the first time in 80 years that a new rat species has been found in the archipelago in the South Pacific. In 2010, mammalogist Tyrone Lavery heard rumors about a coconut-cracking giant rat called "vika" that lived in the trees of Vangunu Island. People on the island even had songs and children's rhymes about the rats. But after several surveys, Lavery couldn't find the creature. "I started to question if it really was a separate species, or if people were just calling regular black rats 'vika,'" Lavery said in a statement from The Field Museum in Chicago, where he is a postdoctoral researcher. [Rats and Lizards and Monkeys, Oh My! 9 Islands Ruled by Animals] Then, in 2015, a ranger captured one of the rats as it scurried out of a felled tree. "As soon as I examined the specimen, I knew it was something different," Lavery said. The rat didn't resemble the eight known rat species native to the Solomon Islands. And when Lavery compared the specimen to museum collections and checked the rat's DNA, he confirmed it was indeed a new species. He named it Uromys vika. Thousands of new animal species are discovered each year, but about half that make the list are insects and arachnids, according to The New York Times. Despite what Bigfoot believers might try to convince you, it's rare for relatively large animals to remain undiscovered. Lavery said just a few dozen new mammals are identified every year. He explained that ancestors of the vika likely floated to the island on a raft and then evolved into a new species after years of isolation. But the vika, which was described in the Journal of Mammalogy today (Sept. 27), could already be close to extinction. The species is considered critically endangered due to its small native habitat and low population density; it's also threatened by commercial logging on Vangunu Island. "It's getting to the stage for this rat that, if we hadn't discovered it now, it might never have gotten discovered." Lavery said. "The area where it was found is one of the only places left with forest that hasn't been logged." Originally published on Live Science. When Apple revealed the new iPhone 8 earlier this month, some headlines focused on one question: Would it come in rose gold? The pink-tinted metal is still having a moment. Made from a mix of gold and copper, rose gold got its start in the 19th century, when it was known as "Russian gold," according to Sotheby's. (Carl Fabergeused it in his ornate eggs.) And the blushing color has been going in and out of fashion ever since. But really, the history of the trend may stretch back much further. Archaeologists recently found an unexpected preference for pinkish gold jewelry from the first millennium in present-day Colombia. [Gold Rush Shipwreck: Photos of a Real-Life Underwater Treasure Hunt] "What's peculiar about finding it here in Colombia is that the whole Andean region is renowned historically for mastering the technology of gilding that is,making metals more golden than they should be based on their composition," said Marcos Martinon-Torres, an archaeologist at University College London and co-author of a new study published Sept. 25 in the journal Antiquity. Rose gold, meanwhile, brings out the (cheaper) copper components of a metal mixture. The most familiar type of gilding involves applying thin gold leaves onto the surface of a less valuable metal. Andean goldsmiths also pioneered a technique called "depletion gilding."They would start with a mixture of gold and copper. Then, through oxidation and polishing, they could bring the gold to the surface to make the metal look purer, Martinon-Torres explained to Live Science. Martinon-Torres and Juanita Saenz-Samper of the Museum of Gold in Bogota, Colombia, examined 44 pinkish metal artifacts from the Nahuange cultureincluding nose pendants, necklaces, earrings, belts and bracelets. Little is known about the people of the Nahuange period (A.D. 100 1000). But archaeologists do know they were skilled metalworkers, based on the artifacts found in their scattered villages in the Sierra Nevada de Santa Marta mountain range, near the Caribbean coast. A hammered nose ornament. Remnants of the golden layer that once covered the whole surface are still visible. (Image credit: Clark Manuel Rodriguez/Museo del Oro/Banco de la Republica; Marcos Martinon-Torres) The researchers found that theNahuange artifacts underwent the depletion gilding to turn them golden at first. Then instead of keeping the gold color, the Nahuange intentionally burnished these objects to expose the pink and orange hues underneath. "That defies our expectations that the more golden the better," Martinon-Torres said. "For the Nahuange, things are not quite so simple." Rosy gold artifacts have been linked to Quimbaya culture in Colombia and the Taino societies of the Caribbean, but Martinon-Torres said this color preference is most conspicuous among the Nahuange. More research could reveal the motives behind the Nahuange penchant for rose gold. For now, the authors speculated that gold ornaments could have been transformed to rose gold at different stages of their use. Stripping the gold could have been part of a funerary rite for metals that were buried with the dead. Or, these objects might have been ungilded when they were given to a girl as she went through puberty. (Martinon-Torres noted that ethnographic studies from the region have connected red and orange colors with femininity.) "Archaeologists often see the objects they study as quite static, as representing a single moment of the past,"Martinon-Torres said. "It's really interesting to see how using scientific methods, we can reconstruct the life histories of those objects and hopefully from that begin to talk about the life histories of those people who interacted with those objects." Originally published on Live Science. Graphite in 3.95-billion-year-old rocks from Labrador, Canada, may be the oldest evidence of life on Earth. The oldest evidence of life on Earth ever discovered may lie within rocks that are 3.95 billion years old, a new study finds. The new finding represents the earliest sign of life yet on Earth by 200 million years or more, the researchers said. Evidence of life early in Earth's history remains sparse because few well-preserved rocks have survived from the Eoarchean era, which spanned from about 4 billion to 3.6 billion years ago. During that time, Earth's primitive atmosphere and oceans as well as the oldest signs of life first emerged. Until now, the earliest hints of life in the 4.5-billion-year history of Earth were inside a 3.7-billion-year-old rock from Greenland revealed in 2016. Prior work, from 1996, also claimed to have found signs of life in 3.8-billion-year-old rocks from Greenland's Akilia Island, although those findings remain hotly debated. [In Images: The Oldest Fossils on Earth] Now, scientists analyzing 3.95-billion-year-old rocks from northern Labrador in northeastern Canada suggest they have found materials generated by microbes. These may represent the oldest evidence of life found yet on Earth, said study senior author Tsuyoshi Komiya, a geologist at the University of Tokyo. The researchers examined the oldest known metasedimentary rocks, ones made from sediment that got buried underneath subsequent rock and subjected to high pressures and temperatures, causing the sediment to crystallize. The area they collected the rocks from "is very far from any village or town," Komiya told Live Science. "Many polar bears inhabit the area." The scientists focused on grains of graphite, a material made of sheets of carbon. Previous research suggested that life could result in graphite that is enriched in lighter isotopes of carbon. (Isotopes of an element vary in how many neutrons they possess in their atomic nuclei.) Based on the carbon isotopes found in the graphite within the Labrador rocks, the researchers suggested it was biological in origin. The way ancient rock encased this graphite suggested that these newfound signs of life did not originate as contamination from later periods in time. "The finding was surprising and exciting," Komiya said. Future research can analyze the composition of such graphite and accompanying minerals to identify the kinds of early organisms that might have created them as well as the environment in which they lived. This could shed light on the origin and evolution of life on Earth, Komiya said. The scientists detailed their findings in the Sept. 28 issue of the journal Nature. Original article on Live Science. A nine-week voyage took scientists from around the world to drill and explore the seafloor off New Zealand and Australia. They found evidence of land-based fossils, revealing that the ancient landmass wasn't always buried beneath the waves. "Zealandia, a sunken continent long lost beneath the oceans, is giving up its 60 million-year-old secrets through scientific ocean drilling," Jamie Allan, program director in the U.S. National Science Foundation's Division of Ocean Sciences, said in a statement. [Photos: The World's Weirdest Geological Formations] Lost 8th continent Earlier this year, scientists argued that the known seven continents had a long-lost brother Zealandia, a narrow strip of land that encompasses New Zealand and lies off the east coast of Australia, and whose landmass is mostly 3,280 feet (1,000 meters) below sea level beneath the ocean's surface. Among the evidence for Zealandia: The crust that makes up Zealandia is much shallower than the surrounding oceanic crust, and its geologic makeup looks more like continental versus oceanic crust. What's more, a narrow strip of oceanic crust separates Australia from Zealandia, which suggests the two landmasses were separate. However, the area is so remote that few geologists had explored the region. To answer questions about the mysterious continent, scientists aboard the JOIDES Resolution, a research drilling vessel, drilled sediment cores from six sites along the ocean seabed that makes up Zealandia. The cores plumbed 8,202 feet (2,500 m) below the surface, revealing 70 million years of the ancient continent's history. The team found a treasure trove of fossils that reveal Zealandia wasn't always under the ocean. "More than 8,000 specimens were studied, and several hundred fossil species were identified," expedition co-chief scientist Gerald Dickens of Rice University in Texas, said in statement. "The discovery of microscopic shells of organisms that lived in warm shallow seas, and of spores and pollen from land plants, reveal that the geography and climate of Zealandia were dramatically different in the past." About 100 million years ago, Australia, Antarctica and Zealandia were all part of a mega-continent. The new drilling revealed that although Zealandia split off from these regions and sank below water about 80 million years ago, the chain of volcanism that makes up the Pacific's "Ring of Fire" may have caused Zealandia to buckle about 40 million to 50 million years ago, which also dramatically reshaped the landscape. The findings could reveal how plants and animals dispersed across the South Pacific. In the past, this area provided some shallow seas and some strips of land to allow species to migrate and move between regions, the researchers said. Originally published on Live Science. A rapper-turned-flat-Earther is attempting to prove that the world is not round by crowdfunding his own satellite launch. B.o.B, born Bobby Ray Simmons Jr., is a rapper from Georgia who once recorded a diss track about physicist Neil deGrasse Tyson, after the two got into a Twitter fight in 2016 about whether the Earth is round. The rapper is a member of the Flat Earth Society, a group of people who are convinced that the planet is flat, not round. A scroll through B.o.B's Twitter feed also reveals a number of other conspiracy beliefs: He is an anti-vaxxer, a 9/11 truther and also, for some reason, believes that oil does not form from the remains of organic material buried under pressure. B.o.B's new GoFundMe has a $1 million goal and has raised $2,701 from 98 people in the five days since he put up the request. (He pledged the first $1,000 himself.) The goal, according to the rapper, is to launch a satellite as far into space as necessary to "find the curve" of Earth. [7 Ways to Prove the Earth Is Round (Without Launching a Satellite)] How we know the Earth is round Despite myths about Christopher Columbus believing he might sail off the edge of the Earth, humans have known that the world is round for a very, very long time. The Greek philosopher and mathematician Pythagoras left the first written arguments for a round Earth in 500 B.C. Ancient Greeks thought the sphere was the perfect shape, so it stood to reason, Pythagoras figured, that the Earth was spherical. A few hundred years later, according to the American Physical Society (APS), Aristotle dropped some scientific evidence into the debate. He pointed out that during lunar eclipses, Earth's shadow on the moon is curved; ships going over the horizon seem to drop down, hull-first, rather than becoming tinier and tinier until they disappear; and different stars are visible from different vantage points on Earth, which wouldn't make much sense if the planet were flat. The Greek mathematician Eratosthenes, born in 276 B.C., even managed to determine the circumference of the Earth. He did this, according to the APS, by measuring the angle of the shadow of a stick stuck in the ground on the summer solstice in Alexandria, on what is today the Egyptian coast. He knew that in Aswan, Egypt (then known as Syene), the sun cast no shadows on the day of the solstice it was directly overhead. The difference in the sun's angle between Syene and Alexandria corresponded to one-fiftieth of a complete circle, so Eratosthenes realized that if he knew the exact distance between the two cities, he'd just need to multiply to determine the full circumference of the Earth. The mathematician had to hire surveyors to walk the distance with precisely measured steps, but he eventually landed on a total circumference for the planet of between 24,000 and 29,000 miles (39,000 to 47,000 kilometers). He turned out to be remarkably accurate: Around the equator, the planet's circumference is 24,900 miles (40,072 km). Resurgence of flat-Earthers So if the ancient Greeks had it figured out, how can anyone still believe in a flat Earth in the age of satellites and rocket launches? [Top 10 Conspiracy Theories] The resurgence of flat-Earth beliefs started in the early 1800s with a writer named Samuel Rowbotham, who developed an entire alternative cosmology around the idea that the Earth is a flat plane enclosed by a dome of space, surrounded by a perimeter of ice walls. Rowbotham's philosophy was that the Earth looks flat, from a human's point of view walking on the surface, so everyone who said they could show otherwise must be lying. The International Flat Earth Society, formed in 1956, draws from Rowbotham's views. In the mid-1990s, the president of the group claimed to have 3,500 paying members, according to his New York Times obituary. Today, the Flat Earth Society website claims to have 555 members, the most recent being B.o.B. Flat-Earthers don't trust NASA or any other space agency. According to the Flat Earth Society's FAQs, astronauts are being bribed or coerced into lying; airplane windows distort views to make it look like the horizon curves; and the International Space Station is a hoax. Also, gravity isn't real. An independent satellite launch may or may not convince B.o.B that the Earth really does curve, but he may find the process a bit difficult if he doesn't accept that the planet is round. To launch a satellite (or any other object) into space, you have to take into account the Earth's radius. In the formula for the speed needed to achieve orbit, V = sqrt (g0*Re^2/(Re + h)), "Re" is the mean planetary radius. Astronomer Johannes Kepler sorted this out in the 1600s, according to NASA. It remains to be seen whether B.o.B will ever get a chance to launch a satellite, anyway. According to The Verge, GoFundMe has frozen the rapper's donation account, meaning he won't be able to access the funds unless he can provide more information that the money will not be mismanaged. Original article on Live Science. In Americans, cases of three common sexually transmitted diseases (STDs) chlamydia, gonorrhea and syphilis have together reached an all-time high, according to a new report. In 2016, a total of more than 2 million cases of chlamydia, gonorrhea and syphilis were reported in the United States, according to the report, from the Centers for Disease Control and Prevention. That's the highest number of cases ever reported for these three STDs combined since the agency began tracking STDs in 1941. Of these STDs, chlamydia is the most common, with 1.6 million new diagnoses in the U.S. in 2016, the CDC said. In addition, about 470,000 people were diagnosed with gonorrhea, and 28,000 people were diagnosed with either primary or secondary syphilis, the most contagious stages of the disease, in 2016. All three STDs can be cured with antibiotics, but if left untreated, they can result in serious health effects, including infertility, stillbirths, life-threatening pregnancy complications and an increased risk of contracting HIV, the agency said. (Having an STD may allow HIV to more easily enter the body.) [Quiz: Test Your STD Smarts] "Increases in STDs are a clear warning of a growing threat," Dr. Jonathan Mermin, director of the CDC's National Center for HIV/AIDS, Viral Hepatitis, STD and TB Prevention, said in a statement. "STDs are a persistent enemy, growing in number, and outpacing our ability to respond." Just 17 years ago, cases of syphilis reached record lows, with only about 6,000 reported cases, or about 2 cases per 100,000 people in the United States, in 2000. But both cases and rates of syphilis infections have climbed every year since 2001, reaching 27,800 cases last year, or about 9 cases per 100,000 people, according to the CDC. From 2015 to 2016, syphilis rates increased by about 18 percent, with the majority of cases occurring in men who have sex with men. But there was also a 36 percent increase in the rates of syphilis among women over this time period, the CDC said. In addition, there were about 630 cases of syphilis among newborns in 2016 a 28 percent increase from the year before. Syphilis can be passed from mother to baby during pregnancy, and can cause serious complications, including stillbirth, premature birth, and brain and nerve problems in infants. It's recommended that all pregnant women get tested for syphilis at their first prenatal visit, according to the CDC. "Every baby born with syphilis represents a tragic systems failure," said Gail Bolan, director of the CDC's Division of STD Prevention. "All it takes is a simple STD test and antibiotic treatment to prevent this enormous heartache and help assure a healthy start for the next generation of Americans." Cases of gonorrhea also increased by about 18 percent from 2015 to 2016, with a larger rise among men than in women. The rise in gonorrhea cases is particularly alarming in light of this STD's increasing resistance to available antibiotics, the CDC said. The rates of chlamydia increased by about 5 percent from 2015 to 2016, and this STD remains most common among adolescent and young adult females, the CDC said. Reducing the number of STD cases in the United States will require efforts from many players, including state and local health departments, doctors and patients, the CDC said. For example, doctors and other health care providers should make STD screening and treatment a standard part of medical care, especially for pregnant women, and for men who have sex with men. In addition, everyone can talk openly about STDs, get tested regularly and wear condoms or practice monogamy to reduce their risk of acquiring an STD, the agency said. Original article on Live Science. by Laurie Sullivan @lauriesullivan, September 27, 2017 Microsoft began to further outline the ways in which Bing integrates artificial intelligence, advancements in conversational search, integration of Bing Ads and LinkedIn graphs, and support for businesses through Microsoft Cognitive Services. While Microsoft mentioned the integration of data between Bing Ads into LinkedIn, this week executives spent more time detailing the progress being made through Chat Bot Extension on Bing and advancements in the search engine's technology into Azure for businesses. Later this year, Microsoft will begin a pilot program for Chat Bot Extensions on Bing to offer brands real-time interactions with consumers. Brands want direct interaction with consumers through conversations. This feature gives them the ability to answer questions directly from the search query. Bing also expanded on its In-Market Audiences targeting feature, which uses AI, giving marketers access to curated lists of users who are ready to make a purchase. Rob Wilk, vice president of North American search sales at Microsoft, in a blog post explains that through In-Market Audiences, customers on average see up to 28% greater click-through rates and up to 48% better conversion rates. advertisement advertisement Artificial intelligence is powering new opportunities for Bing Ads to integrate into other Microsoft products. Microsoft this week also pointed to one important update through Azure to Microsoft Cognitive Services, a collection of intelligent APIs that allow developers to add AI capabilities to their applications. The October release of Bing Custom Search -- a customized search experience for a section of the Web -- and Bing Search v7, will provide more relevant results using Bing Web, news, video, image search, as well as a new version of autosuggest and spellcheck. Microsoft also launched the private preview of Bing for Business, as well as a few new tools for developers, at its Ignite enterprise conference in Orlando, Florida. The idea integrates data from the Microsoft Graph consisting of in-house social, documents, email and other data to provide personalized search results on Bing. When a colleague has a very common name, Bing will prioritize search results about the person over those with the same name. by Wendy Davis @wendyndavis, September 27, 2017 Google's YouTube is urging a federal judge to dismiss a lawsuit by Zombie Go Boom over recent ad policies that allegedly resulted in a massive drop in revenue for the video channel. YouTube says in new court papers that the terms of its partner program -- which Zombie Go Boom participated in -- specify that the company need not display ads along with videos. "When plaintiffs entered into this agreement ... they expressly agreed that YouTube would be under no obligation to show ads on any of their videos and could thus determine when it was appropriate to allow such ads to be displayed," YouTube writes this week in a motion asking U.S. District Court Edward Chen in the Northern District of California to dismiss the lawsuit. The legal battle dates to July, when Zombie Go Boom owners James Sweet and Chuck Mere sued YouTube over relatively new ad policies aimed at making the service safe for brands. Sweet and Mere alleged that they earned between $10,000 and $15,000 a month in ad revenue until late March, when YouTube rolled out new guidelines aimed at preventing ads from appearing on potentially offensive videos. advertisement advertisement Sweet and Mere alleged that their videos -- which they say are similar to TV programs like "Mythbusters" and "The Walking Dead" -- were "de-monetized" as part of Google's initiative to reassure advertisers that their ads won't support problematic content -- including material flagged as violent or offensive. After March 27, Zombie Go Boom's ad revenue fell to between $20 and $40 a day, according to the complaint. The lawsuit included a host of allegations, including that Google violated California's unfair competition law and broke its contract with them. Google argues that all counts should be dismissed for several reasons, including that it never promised to display ads. "Any decision by Google to limit the ads that run in connection with Plaintiffs videos could not have breached the parties contract because that agreement expressly disclaims any obligation on YouTube to display ads," the company writes. Google has defeated other lawsuits by companies that alleged their businesses were harmed by a change in policy. Earlier this year, a judge dismissed a lawsuit against Google by e-ventures Worldwide, which claimed its business suffered after its sites were removed from the search results. In that matter, the ruled that Google has a free speech right to decide which search results to display. ALASKAS POT CAFES TO ALLOW CONSUMPTION OF MARIJUANA Very soon, Alaska will be at the forefront of letting people purchase and use marijuana, and the same will happen in Amsterdam. Presently this is not legal in several other states where recreational marijuana exists. Two brothers, who run a marijuana business by the name Rainforest farms in Juneau, are considering producing a line of chocolate bars that are infused with pot. James and Giono Barretts production plan will be an alternative to the processed sugary edible which, Giono recently ate in Colorado. According to him, he found a lot of products that he didnt want to eat in Colorado, and the reason was not the cannabis. He says that he got sick and nauseous. Different from Colorado, Rainforest farms can have a cafe designed in such a way that, its clients can eat their pot-infused treats. The onsite consumption of marijuana at retail stores was agreed on and approved by the Alaska State Marijuana control in November. Following this approval, the businesses can now start in summer with the consent of every municipality. Juneaus Mayor Mary Becker stated that getting rich because of pot was not in her thought process at all. Having taught in middle school before, the Mayor said that drug aversion program was a frequent staple in her classroom. She wants to see young people have befitting jobs but, she is concerned that they cannot do that with drugs in their system. In Alaska, Pot cafes allow people a legal area to consume marijuana. However, there are municipalities with anti-smoking laws. To enhance clean air, Juneau has strict policies that are against smoking in public places such as; restaurants and private clubs like Elk lodge. The mayor is not happy that her state would be the first to have Marijuana cafes. She, however, said that a pot brownie unlike a joint is not a bother. Her point of worry is damage to air ordinance. Attorney Higgins who uses marijuana after a stressful working day said he would now consider going to pot cafes to smoke. Higgins thinks that local pot lovers like him may not be big enough to keep the business going, but there is a different possibility where visiting tourists would be comfortable with paying a lot just to be part of the experience. Marijuana cafes in Juneau are an opportunity for cruise tourism attraction, with nearly a million cruise passengers every year. Mary Becker still thinks that other places will remain as attractive and tourists will not only visit Juneau only to get their pot, but to see whales among other attractions. Asthma kills 10 people in the United States every day, and many of these deaths are avoidable. It is time to redefine the disease and bring diagnosis and treatment into the 21st century, says an international panel of experts. Share on Pinterest Its not just those with severe asthma who are at risk of death; even individuals with mild symptoms, who do not routinely take medication, die every day from asthma. There is, in fact, no such thing as one disease called asthma. Instead, asthma is an umbrella term for inflammation and swelling of the airways, which can result in a range of symptoms. According to the Asthma and Allergy Foundation of America, 7.6 percent of adults and 8.4 percent of children in the U.S. have asthma. And in 2015, 3,615 people in the country died from it. Worryingly, asthma kills indiscriminately. Anyone with asthma is at risk, and individuals with mild or moderate asthma including those with few symptoms, who do not routinely take medication die at roughly the same rate as those who are under specialist care due to their symptoms. In a Clinical Commission report published in The Lancet, an international panel of experts criticizes the way that doctors view and treat asthma, saying that little progress has been made in the past 20 years. So, why is asthma medicine stuck in the last century? Find out why experts think that its time to redefine the term asthma, and why patients and doctors need to take an active part to make this a reality. What asthma feels like Experiencing asthma is a very personal journey; no two individuals have exactly the same triggers or symptoms, and one persons asthma attack might be very different from one day to the next. Ezra Kirk from Bath, in the United Kingdom is heavily asthmatic. He told Medical News Today that his asthma attacks give him [a] tight chest and [tight] shoulders, pressure everywhere above the diaphragm, including the face and head, a constant grasping for breath, and an inability to breath deeply. Hannah Bastick from Brighton, also in the U.K. has a 2-year-old daughter who has been to hospital several times since birth with severe wheezing. An attack is very scary as a parent, she told MNT. I couldnt leave her to sleep by herself when its obvious how little oxygen is getting into her lungs. Her daughters symptoms are triggered by severe colds, and she has been officially diagnosed with virally induced wheeze. When she gets a bad cold, she becomes permanently wheezy within 24 hours, Ms. Bastick explained. It becomes increasingly severe until we dont feel safe enough for her to sleep unwatched, so we take her to the hospital. By this stage, her breathing is very labored and she grunts with every [exhalation]. The number of new asthma cases has been steadily rising since the 1980s. The condition is the third-ranking reason for children to be admitted to hospital, and it kills 10 U.S. individuals every single day. The silent killer Between 1980 and 2014, 157,066 people in the U.S. died as a result of asthma, according to a report published on September 26, 2017, in the journal JAMA. Although the overall asthma death rate declined during this time period from 2.2 to 1.2 deaths per 100,000 people there was significant regional variation. For example, the highest death rates were found along the Southern half of the Mississippi River, in Georgia, and in South Carolina. Globally, the asthma death rate has stagnated since 2006, reported a study using data from the World Health Organization (WHO) earlier this month in The Lancet. It remained at 0.19 deaths per 100,000 people during 2012. A review of asthma deaths occurring between February 2012 and January 2013 conducted by the U.K. Royal College of Physicians found that 46 percent of these were potentially preventable. Martyn R. Partridge who is a professor of respiratory medicine at Imperial College London in the U.K. wrote in the foreword to the report that some results should unequivocally lead to a shake-up, more training and monitoring, and an end to the complacency that has arisen regarding this common condition. This call to arms to challenge the common perceptions about asthma is echoed by Ian D. Pavord, a professor of respiratory medicine at the University of Oxford in the U.K. He is the lead author of the Commissions report on asthma, published earlier this month in The Lancet. One name, many diseases In their 51-page document, Prof. Pavord and his fellow Commissioners strongly criticize the lack of progress that the field of asthma has seen in the past 20 years. One of the issues, as highlighted in the report, is that asthma is often diagnosed by looking at an individuals symptoms and carrying out a simple lung function test. But the Commissioners say that this is not specific enough. They say, [T]he notion that a rheumatologist diagnosing arthritis or a hematologist diagnosing anemia would generically treat patients without determining the specific cause and type of disease in the 21st century is absurd. To achieve this, better biomarkers will be needed to help both patients and their doctors to move away from the diagnosis of asthma and clearly define which type of chronic airway disease they are dealing with. In a radical step, the report goes beyond demanding better diagnosis and treatment by challenging the perception that asthma should be viewed as a life-long condition and treated as a chronic disease. The focus should be on asthma prevention and asthma cure, the authors say. Can asthma be cured? There are a number of factors known to put an individual at risk for developing certain forms of asthma, and asthma caused by allergies is the most common form of the condition. Immunotherapy treatment is increasingly being used to reduce allergic symptoms and there is some evidence that children who receive immunotherapy for their allergies are less likely to develop asthma. That being said, a systematic review published in the journal Clinical and Translational Allergy concluded that while immunotherapy treatments for allergy have the potential to achieve reductions in [asthma] symptoms, there is currently no clear evidence that lung function is improved long-term. More research is clearly needed to shed light on the underlying causes that lead to each individual asthma diagnosis and to develop early interventions. Doctors and patients must work together if we are going to challenge our understanding of asthma and change the focus from long-term treatment to prevention and cure. But with many individuals not taking their asthma medication as advised by their doctor, what is going to empower those with asthma to take an active role in changing the status quo? Were excited to announce that metalbulletin.com is now part of fastmarkets.com. A new look and an improved experience means you can still stay ahead of this fast-moving metals market with price data, news and market intelligence right here on Fastmarkets. Discover more than 2000 prices, news and analysis in primary and secondary metals markets. We cover base metals, industrial minerals, ores and alloys, steel, scrap and steel raw materials. If you already have a Fastmarkets account, youll still have uninterrupted access to your markets by logging in with your current details. The Minister for Tourism and Creative Arts, Catherine Afeku says that the government is willing to support the movie industry in any way it can. Recently, the actress Yvonne Nelson called on stakeholders of the industry to sign a petition to the government on issues she believed would revive the collapsing industry. Speaking to Joy News Doreen Avio at a Tourism Event to unveil tourism ambassadors for the See Ghana, Eat Ghana, Wear Ghana, Feel Ghana campaign on Sunday, Mrs. Afeku, described the move by the actress as a good one. Ive met her and it is a good proposal; I dont call it petition. It is a proposal, to get the government to see the potential in the movie industry. According to her, having a President and a First Lady who have a keen interest in the development of the arts is an assurance of the government's support. The Minister, however, was quick to add that, movie makers had to play their part to complement the support from the government. We can only do but to support to create a vibrant industry. But they have to be competitive. It is not free for all. The movies have to be sharp using technology, and the storyline cannot be repetitive and boring, she admonished. She believed that if the movies are intriguing, original and creative, government's support will only come to make things better. The Minister, along with other Tourism Agency heads, as well as some celebrity tourism ambassadors are on a tour to promote the See Ghana, Eat Ghana, Wear Ghana, Feel Ghana campaign, encouraging the patronage for made in Ghana goods. The unveiling was a night of music, glamour and style at the Accra City Hotel in Accra. The purpose of the cocktail was to enable the Tourism Ambassadors to interact with officials of the Ministry, the Ghana Tourism Authority, the private sector operators and other dignitaries. Present at the event were celebrities such as Reggie N Bolie, Abeiku Santana, Fancy Gadam, D-Black, Lucky Mensah, S.P Kofi Sarpong, Nana Kwame Ampadu, Sam Okyre and the President of the Creative Arts Council, Mark Okraku Mantey. The See Ghana, Eat Ghana, Wear Ghana, Feel Ghana' campaign is aimed at re-orienting Ghanaians on a new sense of National pride in its Heritage, Culture and Way of Life. The Ghana Tourism Authority, alongside the Ministry of Tourism, Arts and Culture, will go on a tour to selected tourist sites in the country. Together with the tourism ambassadors, they will explore as well as create the needed awareness and promote Ghanas tourism through several outlets including social media. For six years, Management of RTP Awards has kept mute on deliberate attempt by Charter House to suppress RTP Awards and maintain monopoly over that industry in Ghana. A few years ago, The RTP Awards nearly collapsed because of these underground dealings and therefore we will not keep mute anymore for them to make useless of the gains made by the Awards over the past 2 years. Yesterday, our Deputy Communications Director, Mr. Isaac Kyei Andoh appeared on The Pundits Show on GHOne TV to throw more light on the 7th Adonko RTP Awards. What was supposed to be a decent interview turned out to be a cross examination with the host of the program, George Quaye taking sides with two other pundits to rubbish, denigrate and undermine the RTP brand and to embarrass our newly appointed Deputy Communications Director. Thankfully, our rep kept his cool in the face of persistent provocation from George Quaye and his panelists and answered the questions to our satisfaction in spite of constant heckling and abuse from them. The good people of Ghana who are discerning enough got to know the deliberate attempt by the host and his panel members to make the work of our PR difficult and registered their displeasure on GHOne TV station's Facebook wall which we have attached to this publication. Professionally, an interviewer must create conducive environment for his guests to comfortably deliver because listeners and those watching need to be informed, entertained and educated. Yesterday's program though was appalling, distasteful and unpleasant and in our view just produced by George Quaye and his panelists to undermine and denigrate the rich successes of the RTP Awards, and that was obvious from the word go. Consistently over the years, the host of the show Pundits, George Quaye, who used to be the communication Director for the Vodafone Ghana Music Awards and currently speaks for Charter House has allowed Charter House to influence him to use the Pundit platform to bring down other events they see as a threat to the VGMA. If George Quaye and Charter House think they can ridicule the RTP Awards merely because of spelling mistake of some few names on our nomination list, then they must as well also take a look at the Vodafone Ghana Music Awards, which after almost 20 years have consistently been saddled with issues of bribery and corruption. George Quaye can consistently ignore the numerous musicians and artistes who have over the years accused Charter House and the VGMA board of taking monies from them before giving them awards, and come to ridicule us on his show merely because of spelling mistakes? George and CHARTER HOUSE must take the specks off their eyes before seeking to point to that of others. VGMA has huge credibility problems and that is what we think they should focus on and stop the needless attack on RTP Awards. We will fix our own problems like the Oscars are still doing since 1929. I hope George and his panelists have read all the 135 comments sent in by viewers telling them how unfair, irresponsible and unprofessional they were on the show last night, Tuesday September 26, 2017. Since appointing our new Communication Directors, we have seen some so called panelists, including those who approached us for that role making conscious effort to make their work difficult just to prove a point that they are not good enough. We want to put on record that we have faith in our team and that our communication representatives earned that role. To George Quaye, stop the image redemption rampage and dont blame the disgraceful show you hosted yesterday on our Deputy Communications Director. He delivered to our satisfaction in spite of the hostile environment he found himself. You are not the standard of PR in Ghana. We know how you were relieved off your duty as Communications Director of VGMA not so long ago and so please, stop questioning our choice of people to speak for RTP Awards We implore the media, the very people we created this Award for to recognize and celebrate to treat them with the needed respect and decorum. Our joy emanates from seeing your best effort recognized and that is what has kept us going in spite of the many challenges we have encountered along the way. Lions Dont Eat Lions. A word to the wise, Is Enough. Long Live RTP Awards Africa, Long Live VGMA and Long Live Ghana. No needless competition FROM THE MANAGEMENT OF RTP AWARDS The Ghana Tourism Authority (GTA), under the auspices of the Ministry of Tourism, Arts & Culture, has welcomed 30 ambassadors at a cocktail event to spearhead the 'See Ghana, Eat Ghana, Wear Ghana, Feel Ghana Campaign'. The campaign concept draws on re-orienting Ghanaians on a new sense of national pride in its heritage, culture and way of life. The ambassadors who cut cross several creative arts sectors, including musicians, actors, radio presenters, disc jockeys (DJ) and bloggers, are to promote tourism growth domestically and internationally (America, Europe, Asia and others) for Ghana to boost economic growth. Madam Catherine Afeku, the Minister of Tourism, Arts & Culture, stated that the aim of the tourism ambassador programme is to partner key influencers to help drive tourism growth (domestic and international) for Ghana. She said the programme is to enhance, develop and deliver destination management objectives and potentially help position Ghana as a tourist destination of choice. Madam Afeku added that the ambassadors would, therefore, use their personalities and expertise to sell Ghana's tourism potential to the world. The ambassadors include SP Kofi Sarpong, D-Black, Nana Ampadu, Okyeame Kwame, Fancy Gadam, Agya Koo, Lucky Mensah, Abeiku Santana Aggrey and Sena Dagadu. Ghanaian screen 'bad boy', Chris Attoh, and Nigerian actress Damilola Adegbite could not honour their marriage vows; 'till death do us part', as they have both gone their separate ways two years after they tied the nuptial knot. Their marriage becomes the next celebrity marriage to hit the rocks not long after the brouhaha over that of Funny Face and Afia Schwarzenegger. Chris who confirmed the divorce in an interview with Bellanaija.com would not state what caused the divorce. But he created the impression they didn't know each other too well before they decided to marry. Dami is a wonderful woman and an amazing mother. Despite our differences, she and I will always be friends, he said. Early this year, there were reports that Damilola had walked out of the marriage.The divorce reports gained currency after Chris posted several photos of his wife on social media, wishing her a happy second wedding anniversary on February 14, but Damilola failed to respond or do same. Damilola subsequently denied the rumours after posting a birthday shout out to Chris, proclaiming her love for him. But in a major twist, Chris Attoh came back to say it was true the marriage which produced a son has ended. I believe throughout our marriage, it has probably been one of the most challenging things we have ever done, however, the key word is balance. At times when we both had to work, our parents would be there to hold the fort. God bless family because they were and still are very supportive, he said. However, since the divorce, we are obviously now reworking things to create a new balance between work, spending time with and raising our son, he added. Even though they are no longer together, Chris reiterated that Dami is a wonderful woman and an amazing mother. Despite our differences, she and I will always be friends. So more than anything we will find ways to continue to make sure that Brian can still have a balanced upbringing filled with love and support. Both our families have been and are still very supportive in helping us take care of our son Brian when we can't be there due to work, he concluded. Chris Attoh and Damilola Adegbite tied the knot on February 14, 2015 and they have a son. It was alleged that they started seeing each other when they met on the set of '6 hours To Christmas', a film directed by Shirley Frimpong-Manso. Nigerian duo, P-square, had a heated fight in their lawyer's office following an ongoing disagreement. The fight, purportedly recorded in a video, is currently trending on social media circles and other online platforms. The video showed Paul and Peter Okoye with their elder brother and manager, Jude Okoye, in the lawyer's office. Jude, whose wife gave birth to a baby girl Monday, was seen threatening to beat up Peter who was behind the camera while Paul was heard telling Peter, shame on you. Hours after the video began to trend online, Paul took to his Twitter handle @rudeboypsquare to respond; Wow!!!! And he finally released the all mighty video lol. News broke on Monday that the hip-hop twins who have dominated the Nigerian music scene for many years had again split up following a letter sent by Peter to their lawyer, Festus Keyamo (SAN). Peter demanded for a termination of the agreement as a group based on serious allegations against his twin Paul and their elder brother and manager, Jude. He accused Paul of no longer willing to co-operate with him, and even gone as far as cancelling their scheduled music tour to the United States. He added that Paul was also slandering his wife and children with lies on social media, and alleged that his family was being threatened with messages. Peter further accused his older brother Jude of once threatening to kill him and shoot his wife Lola. Peter stressed that he was tired of the drama. He had gone ahead to perform solo at a show in Philadelphia which he revealed on a Snapchat video. However, his brother and estranged partner, Paul, had taken to his Instagram page days later to write Only a woman can come where there's peace and destroy it. The duo had gone their separate ways in 2016 after engaging in similar fight, however, they settled their differences and bought mansions close to each other in 2017. The Okoye brothers have been engulfed in war of words on the social media in recent times, and the new development has confirmed rumours that there have been strains in their relationship. Ghanaian entrepreneurs are capitalizing on Charles Fillmores quote, there are opportunities everywhere and are discovering business opportunities in our local foods and snacks. Hitherto, selling coconut, kenkey, Dzowe (adaakua) and shito were considered jobs for the unlettered. What do we see now? University graduates are improving on the quality of these foods and branding them in attractive ways to meet international standards. Find below the packaging of these local foods on the market and it will give you a new perspective about branding. Kube Pure Kune Pure is neatly and hygienically packaged coconut from ProConut Ghana Ltd. Photo Credit - ProConut Ghana Ltd Dzowe Special Dzowe Special, is a branded version of our local snack, Dzowe or Adaakoa from Grace Enterprise. Photo credit - Wilson Senya Mashke Express Mashke Express is a neatly packaged version of mashed kenkey for sale. Its comes with its accompaniments Photo credit - Mashkey Express Awo Komi This is a neatly packaged kenkey,with its accompaniments Photo credit - managingghana.com A former Member of Parliament for the Wa Central Constituency, Rashid Pelpuo, has called on president Akufo-Addo to immediately order for the release of NDC activist and serial caller, Appiah Stadium from police custody. Appiah stadium was arrested after suggesting in a recent audio that went viral, that the President, Nana Akufo-Addo smokes marijuana [wee]. The former Minister of state in charge of Private Public Partnership under John Dramani Mahamas presidency in an interview on Eyewitness News, said If the president is not aware of the arrest, he should, right now order the release of this gentleman. It is not acceptable,'' he said He further said if the police acted on their own accord, the president must come out publicly and disassociate himself, alleging that the arrest was politically motivated. I think that there is something political about it, and that is the reason why I think that it shouldn't go far. This matter shouldn't proceed beyond today [Tuesday]. The President should come out and ensure that he dissociates himself from this event and go ahead to order a release. If he wants, he can take his own action. He is the one insulted, he is the one who can take the matter to court, he is the one who can seek justice. And if it bothers on criminality then at one point he can wash his hands off and then the law can take its course. I think Appiah Stadium is being unfairly and unjustly being incarcerated. If they [Police] are overzealous and they are doing it in the name of the president, he should come out and say it's not me [Akufo-Addo], Rashid Pelpuo added. He argued that many people made similar defamatory comments against former presidents Atta-Mills and Mahama, yet they were not treated the way Appiah stadium is being treated by the police. Meanwhile, the police have said they did no wrong in arresting Appiah stadium. The Director of Public Affairs of the Police Service, David Eklu, said they wanted him to substantiate his claims. Akufo-Addo will not press charges against Appiah Stadium Hamid President Akufo-Addo has said he is not interested in pressing charges against Appiah Stadium. The Minister for Information, Mustapha Hamid, in a release copied to citifmonline.com, indicated that Akufo-Addo has informed the Police Administration of his position on the matter. By: Ann-Shirley Ziwu/citifmonline.com/Ghana The Ghana Tourism Authority (GTA) under the auspices of the Ministry of Tourism, Arts and Culture, has welcomed 30 Ambassadors at a cocktail event to spearhead the See Ghana, Eat Ghana, Wear Ghana, Feel Ghana, campaign. The campaign concept draws on re-orienting Ghanaians on a new sense of national pride in its heritage, culture, and way of life. The Ambassadors, who cut across different creative arts sectors including Musicians, Actors, Radio Presenters, Disc Jockeys (DJ) and Bloggers, are to promote tourism growth domestically and internationally to boost Ghanas Ghanas economic growth. Ambassadors include SP Kofi Sarpong, D-Black, Nana Ampadu, Okyeame Kwame, Fancy Gadam, Agya Koo, Lucky Mensah, Abeiku Santana Aggrey and Sena Degadu. Catherine Afeku, the Minister of Tourism, Arts, and Culture, said the aim of the Tourism Ambassador programme, was to partner influential persons to help drive tourism growth in and outside the country. She said the programme was to enhance, develop and deliver destination management objectives and potentially help position Ghana as a tourist destination of choice. She said the ambassadors would, therefore, use their personalities and expertise to sell Ghanas tourism potential to the world. Reggie N Bollie told GNA in an interview that, the appointed U.K and Europe Tourism Ambassadors said, We feel very humbled and privileged to represent Ghana and we will endeavor to raise the flag of Ghana high wherever we go. Meanwhile, Okyehene, Osagyefo Amoatia Ofori Panin, has urged the government to promote tourism-related events and activities that would be maintained by the future generation. The Okyehene said this when the Deputy Minister of Tourism, Arts and Culture, together with officials from the Ghana Tourism Authority and the Ministry, and the tourism ambassadors called on him at his palace in Kyebi. He said most continents have been able to develop their tourism potential, not based on what they have but with the idea and mentality to develop what they want to have. We have a lot of potentials and resources as a continent but we have failed to use our minds to develop them. This is the era of change and unless leadership is willing to hold on to the change, we would continue to be where we are. Okyehene Ofori Panin urged the 30 ambassadors to forge to be the future ambassadors of tourism not because of fame, exposure and money but because they have something to hold on to help in the development of Ghanas tourism potential. Dr Ziblim Barri Iddi, Deputy Minister of Tourism, Arts and Culture, said the call was part of activities lined up for this years World Tourism Day celebration to be climaxed in Tamale. He said the event cannot take place in Tamale without having the feel of what other parts of the country has to offer. It is an opportunity to take the ambassadors through the historic city of Kyebi to feel Ghana, he said. He said their visit was symbolic, as the history of Ghana cannot be told without mentioning Kyebi, adding that it was also to demonstrate governments appreciation to the good work of the Okyehene towards protecting the environment, hence promoting eco-tourism. Dr Iddi said the teams visit was also for the Okyehenes blessings towards a successful celebration of this years World Tourism Day. The team later called on the Asantihene, Otumfuo Nana Osei Tutu II, in Kumasi to introduce the ambassadors. As part of the activities lined up for the celebration, there was a visit to the Kintampo Water Falls on Tuesday, September 26, and the World Tourism Day celebration and the Northern Region Tourism Investment Summit would be held on Wednesday, September 27. Victims of persistent clashes between natives and nomadic herdsmen at Agogo in the Ashanti Region are to receive support, as an education fund is established by a local businessman. Children of deceased members of the community are being targeted for assistance from the initiative by Managing Director of Asadu Royal Waste Management, a private waste collection, and management company. Edward Asadu will contribute twenty thousand Ghana cedis every year to support the education of children whose parents have died. It follows a Joy News Hotline Documentary, Violent Shepherds which recounts the story of the murder of 50 local farmers in Agogo as a result of herdsmen-farmers clashes in the last 15-years. Ohemeng Tawiah's 7-month investigative piece highlights herdsmen-farmer clashes in Ashanti, Eastern and Brong Ahafo regions. Residents of Agogo have been battling with activities of nomadic herdsmen who allow their cattle to feed on crops. Confrontations between the two have led to bloodshed and reprisal attacks as breadwinners are killed. The situation means many children whose parents or guardians are killed in the attacks are sacked from school for non-payment of fees. The documentary also shows how many affected families have been struggling to make ends meet with single parents being unable to raise funds for their children upkeep. Mr. Asadu who is touched by the documentary says the fund will help ameliorate the pains of affected families as their education needs are addressed. "We want to set up an education fund that can help widows and their kids. Now their breadwinners are no more so we need to think about them -- how are we going to help those people who have lost their mothers and fathers? So we just want to set up an education fund to help those who have lost their families or breadwinners," Mr. Asadu has revealed. The fund is expected to start disbursement in earnest, at least from next week as board of directors is constituted. Asadu Royal Waste Management provides both commercial and residential waste collection, hedge cutting and cleaning services. It has over 10, 000 clients across the country, providing services to top-notch public and private entities in Ghana. According to Mr. Asadu, he and his company owe it as a corporate social responsibility to give back some of the company's gains to address the concerns of the people. "Always we have a social responsibility as an individual and as a company as Asadu Royal Waste Management. We have to help our society as a social responsibility," he said. Meanwhile, Mr. Asadu is asking individuals and corporate entities to support the families by contributing to the fund. 27.09.2017 LISTEN The Ashanti Regional Youth wing of the opposition National Democratic Congress (NDC) has called for the immediate release of Appiah Stadium, a popular serial caller affiliated to the party. Appiah Stadium was arrested on Tuesday, September 26 by the Ashanti Regional Police to substantiate an allegation he has levelled against Nana Addo Dankwa Akufo-Addo. The NDC serial caller had alleged that Nana Akufo-Addo smokes wee (marijuana). ASP Juliana Obeng, the Police PRO in the region said he was arrested on Tuesday following orders from their national headquarters in Accra. We got instruction from the national headquarters to help them with the arrest of Appiah Stadium and that is exactly what we have done. As I speak to you, Appiah Stadium is on his way to the National CID Headquarters. When we arrested him, we immediately put him in a car, off to Accra, she said. However, a statement signed by NDC Ashanti Regional Youth Organiser, Brogya Genfi, said the party demands the immediate release of Appiah Stadium from police custody, in the interest of the stability of the state. Read the full statement below NATIONAL DEMOCRATIC CONGRESS YOUTH WING ASHANTI REGION September 26, 2017 - 9pm Re: FREE APPIAH STADIUM NOW!!! We wish to inform the general public of the release of Appiah Stadium from Police custody this evening at about 8:30 pm. We will, therefore, like to back-down on our earlier 24hours ultimatum given to the Akufo-Addo led government for the release of Appiah Stadium. We also call for calm within our ranks, as we continue to monitor the situation. Let us, however, re-state our resolve to fight against the shameful intimidation tactics of the government. We shall resist any attempt by this government to criminalize and suppress FREE SPEECH. We call on all Ghanaians to champion the need for the respect of the fundamental human rights and freedoms of all Ghanaians irrespective of their political color. Finally, we would like to thank all concerned NDC members, the media and the General Ghanaian public for the support shown us. Thank you Signed Yaw Brogya Genfi (ASHANTI REGIONAL YOUTH ORGANIZER) Story by Ghana | Myjoyonline.com The match-talked-about monster demonstration against the administration of Nana Akufo Addo came on in New York on Thursday, September 21, 2017. The demonstration was so successful; we have asked the police to renew our permit for next year. I must put on record that we started planning in June, 2017 and in all our announcements, we asked other Ghanaians who were not seeing the corruption, insecurity and insensitivity in Nana Addos government to do a counter demonstration to showcase their message. To the joy of the organizers, there was no counter demonstration against ours. We can now comfortably say, the message of the demonstration; to showcase the corruption, insecurity and insensitivity in Nana Addos government, represents the views of ALL Ghanaians in the diaspora. Some of the messages on the placards read: Akufo Addo/Bawuliar = Gross Incompetence; Akufo Addo/Bawuliars Nepotism; Corruption at the Flagstaff House; Akufo Addo, stop the witch hunting on the Electoral Commissioner; Disband The Invincible Forces now; Ghana is unsafe under Akufo Addo; Fix the economy if it is broken; Ken Ofori-Atta is a threat to our Financial institutions; Akufo Addo is a threat to our democracy, Investigate the $2.25B Kenbond; Electric bill is still higher than rent; and many more. The demonstration became complete when the demonstrators wanted a place to have lunch, suddenly spotted some posh luxury cars with our Ghana flags on them. We physically counted the cars and they were 30 lined up on both sides of the road. Each car has at least 5 seats including the driver. If there were 30 cars with at least 4 passengers each, it means there were at least 120 people alone in the restaurant. We are talking about only those in the restaurant and not the total delegation to the UN conference. No wonder, the restaurant was full-to-capacity and a plate costs $1,000.00. We could see clearly that Ghanaians were in town If you still believe that Nana Addo has come to protect the public purse as he stated in his plagiarized inauguration speech, you are still dreaming and need to wake up! If the media is reporting that Nana Addo took 196 delegates to the UN conference, we believe it. Visibly seen amongst the 120 people were Gabby Otchere-Darko, formerly of the Danquah Institute, Samuel Atta Mensah of Citi FM, Ofori Atta of Future Africa Radio in Virginia, USA and Captain Goka. The question every Ghanaian should ask Akufo Addos government is what were these people doing in US as part of the UN delegation? Ofori Atta now resides in Ghana. Samuel Atta Mensah lied on camera that he was not a Ghanaian and that he was ready to show us his passport. All that the demonstrators were telling the world was corruption, insensitivity and insecurity in the Akufo Addos government, and here we were corruption and insensitivity on display like tomatoes being sold on the open market. The nation wreckers of the NPP are saying the number of people at the demonstration were few and so it was an unsuccessful event. Now after the demonstration and you get over 100,000 people viewing the videos, listening to audios and seeing messages on placards but you still call it an unsuccessful event, then you need to check yourself into a hospital. If the demonstration was not so successful, why has the National Security started monitoring the movement of the organizers? We are aware, wai. The NPP are also saying either President Mahama or Kojo Bonsu sponsored the demonstration. Let me put on record that neither President Mahama nor Kojo Bonsu had a hand in that successful demonstration. It was the organizers who contributed their own money to champion this course. The demonstration had nothing to do with either President Mahama or Kojo Bonsu. It had everything to do with Ghanaians who see abundance of corruption, insecurity and insensitivity in Akufo Addos government. Thank God the rest of the world know it now. Finally, there is one problem we have with these NPP people and their National Security. Even in Ghana, they think they have the right to do everything, including insulting everybody, but no one has that equal rights. In the US, Africa and Europe, they did all kinds of foolish things when John Mahama was the President and no one cared about what they did. Now with just one demonstration against Nana Addo, they are behaving like animals. The way they are insulting everybody, I am happy the demonstration was so successful and as I said earlier, the permit for next year is already secured. Ghanaians in the diaspora have spoken. We are counting on Ghanaians in Ghana to rise to the occasion and tell the world how corrupt, insensitive and insecure this Nana Addos government is. Good Luck!!! President Nana Akufo-Addo will next year visit China to follow up on some commitments made by the Chinese government to invest over 20 billion dollars in Ghana's economy, Finance Minister, Ken Ofori-Atta has announced. He explains that the purpose of the visit will also discuss bilateral trade issues with the government of China on government's new policy of allowing the private sector to lead economic growth and development. The Finance Minister made the announcement after Ghana signed an agreement with China under the Forum on China-Africa Corporation (FOCAC) to benefit from a 60 billion credit facility earmarked for the African continent. Speaking at a short ceremony after signing the agreement, Mr. Ofori Atta assured that government is committed to accessing the funds to exploit Ghana's bauxite reserve for economic development. We both recognize the historical point in time that we are and our president has committed to a renew engagement and has agree to go to China for a visit next year following up to what our vice president did so the two of us are working to the details of this relationship, he said. He added that the mining of the mineral resource is interlinked with other infrastructural development such as the construction of railway network as well as other factories under the one-district, one factory project. Mr. Ofori Atta further stated that the Chinese side is willing to provide over the medium term, the necessary financial support in electricity, transportation, telecommunications, municipal construction and education among others under the framework of the Forum on China-Africa Corporation (FOCAC). Ken Ofori Atta Finance Minister Chinese financial institutions will also establish business relationship, exchange information with the Ghana Export-Import Bank and other financial institutions in order to provide service for the further development of bilateral trade and economic cooperation, he observed. Dr. Bawumia's visit to China In June 2017, The Vice President Dr. Mahamudu Bawumia has announced that the government of China has committed 20 billion dollars worth of investment to Ghana. Dr. Bawumia pointed out that Ghana was able to secure the commitment due to new financing model designed by the Economic Management Team. Speaking to journalists after returning from a four-day visit to the Peoples Republic of China, Dr. Bawumia stated that there is an outstanding 4 billion dollars deal that will be concluded soon. The Peoples Republic of China and the State and Private Sector Enterprises have together committed to support the economic transformation agenda of Nana Addo Dankwa Akufo-Addo. So far the commitment that we received in China before leaving amounted to 15 billion dollars, he disclosed. There is a possibility that within the next month or so there are some discussion that we couldn't conclude and another 4 billion dollars will be added to that. Of course, we will follow these through, he added. Dr. Bawumia stated that the government's goodwill appealed to many investors such that the private sectorin China were eager to invest in Ghana. At various meetings during the 4 day visit, leading Chinese companies and agencies of the government of China signed these MoU totaling about 15 billion. In the area of industrilisation for example the China National Building Materials Equipment Export and Import Cooperation signed a facility with the Private Sector led by the Association of Ghana Industries, he said. Dr. Bwumia debunks compromise Meanwhile, Dr. Bawumia refuted assertions that the commitments to invest 15 billion dollars in Ghana's economy will compromise the fight against galamsey. He downplayed possible concerns the support Ghana is getting from China could compromise efforts against illegal mining, of which Chinese nationals are known to be heavily engaged in. According to him, China is happy with Ghana's clamp down on illegal mining, which has seen a significant number of Chinese nationals in Ghana arrested. The issue of Galamsey is not a China matter. The issue is a galamsey matter and we deal with anybody who is involved in galamsey per our laws and the Chinese are very happy with us enforcing our laws, the vice president stated. They [the Chinese] won't tell us how to enforce our laws as we can't tell them how to enforce their laws and I think the fight against galamsey is no respecter of persons regardless of where you come from you are going to be dealt with the same. He added that, the Chinese are very supportive of us dealing with the galamsey issue as per our laws and our laws are doing a wonderful job so far I don't think there is any link between the fight against galamsey and our support from China. China wants us to do the right thing. Chinese involvement with the state has been looked on with suspicion from the public given Chinese nationals have gained notoriety for involvement in illegal mining activities, with a significant number of them currently dealing with cases in the court of law. High-profile donations made to the police and Attorney General's office from Chinese, were met with criticism from the public with fears the donations could comprise law enforcement stakeholders. These concerns are not without merit given that a former Minister of Lands and Natural Resources, Alhaji Inusah Fuseini, revealed pressure was put on him from Chinese officials in Ghana when he tried to fight against illegal mining. According to Inusah Fusseini, the former Chinese Ambassador tried different methods to get him to ease up on the fight against illegal miners within the small-scale mining sector. By: Lawrence Segbefia/citibusinessnews.com/Ghana Embattled National Democratic Congress (NDC) activist and a serial caller, Appiah Stadium has been released on police inquiry bail after his arrest for allegedly defaming the President Nana Akufo-Addo. The Ashanti Regional Police command on Tuesday afternoon effected Appiah Stadium's arrest upon instruction from the National Headquarters. He was arrested for suggesting, in a recent audio that went viral, that the President Akufo-Addo smoked marijuana. Appiah Stadium was subsequently handcuffed and transported to the Headquarters of the Criminal Investigations Department (CID) in Accra to answer questions concerning his claims. The development aroused public debate over whether or not the police was acting according to law. A former minister of state under Mahama administration, Rashid Pelpuo, suggested that the arrest was politically motivated. He said the manner in which the arrest was effected, and how the opposition NDC activist was treated pointed towards some political undertones. NDC members stand down Members of the NDC in the Ashanti Region were demanding his immediate release and gave the government a 24-hour ultimatum. But after the bail was granted, the NDC members withdrew their ultimatum. We wish to inform the general public of the release of Appiah Stadium from Police custody this evening at about 8:30pm. We will, therefore, like to back-down on our earlier 24hours ultimatum given to the Akufo-Addo led government for the release of Appiah Stadium, they said in a statement. Appiah stadium reciting from NDC propaganda book The government has also said President Akufo-Addo will not press charges against the NDC communicator. The Minister for Information, Mustapha Hamid, in a release copied to citifmonline.com, indicated that Akufo-Addo has informed the Police Administration of his position on the matter. The statement said President Akufo-Addo was convinced that right-thinking Ghanaians recognize that Appiah Stadium is merely reciting from an NDC propaganda book, which has since been discredited. This issue was brought to the for in February 2015 following a series of publications in pro-NDC newspapers making similar claims. Lawyers for then Nana Akufo-Addo took these newspapers; The Al-Hajj, Enquirer, Informer, Ghanaian Lens and the Daily Post to the National Media Commission (NMC) to afford them the opportunity to substantiate their claims. They failed to do so, following which the NMC asked them to retract and apologize. By: Delali Adogla-Bessa/citifmonline.com/Ghana Labour Expert, Ben Arthur, says severance package demands by public utility workers ahead of an upcoming privatisation of the Electricity Company of Ghana (ECG) is not justified, however, the government must not turn a deaf ear. Mr Arthur says because the proposed privitisation under the Millennium Challenge Power Compact agreement has not happened and there is no imminent redundancy threat, pushing for payment of end of year benefits violates the law. As we are talking, technically, there has not been any redundancy so if workers are agitating the only thing they can ask for which will be justified for them is that we want to have an agreement as to when and how when such a situation [layoff] arises we should deal with it; that is the only avenue for the workers now, Ben Arthur said on current affairs programme, PM Express, Tuesday. He notes, however, that it is in the interest of the ECG workers to engage the government, their employer, for a collective bargaining deal where, as part of their terms and conditions of service, they agree on when there is going to be a layoff, how the redundancy ought to be handled if it will even be a case that will arise. PUWU members of the ECG across the country on Tuesday wore red armbands to demand payment of their take-home package before the Compact Agreement comes into force. The ECG workers cite the case of the erstwhile Omni Bus Transport Company situation, where the workers migrated onto the Metrobus Company were paid a severance package, insisting they also deserve same Critics of the workers demand cite the position of the law regarding the payment of severance package under Section 65 of the Labour Act, insisting that their demands would have been justified if ECG was shutting down. However, speaking on the current affairs programme on the Joy News channel on MultiTV, Mr Arthur said it is clear that the workers anticipate an amalgamation or a takeover that will result in redundancy or the diminishing of their terms and conditions of service. On the score, the government must engage them, he said. It will be suicidal if the government does not to engage them, he said. The government, which owns majority shares, is even mandated by law to formally lay out the details of the privitisation deal before it happens, Mr Arthur said. A formal meeting, Mr Arthur said, will calm the nerves of the workers and kick-start a sane process to solving possible redundancy-related issues. In fact without the workers preempting the employer [government], the employer must write to the Chief Labour Officer and say that this is what we are going to do and it must happen three months before the takeover. That is the position of the law, he said. He has adviced the worried workers to include demands to be retrained to fit into other sectors of the company to efforts to securing their jobs. Under the new Millennium Challenge Power Compact agreement program, Ghana will receive a $469,300,000 with a new management. The aim of the Ghana Power Compact is to create a financially viable power sector to meet the current and future needs of households and businesses, and to help fight poverty across the country. Get more from the discussion on PM Express in the video below. Story by Ghana | Myjoyonline.com | George Nyavor | [email protected] Opposition National Democratic Congress (NDC) is demanding clarity concerning revelations by President Nana Akufo-Addo that Ghana has off-loaded highly enriched Uranium to China. President Akufo-Addo said during his address at the 72nd United Nations General Assembly last Thursday that Ghana is committed to a nuclear weapons-free world, and as a result, it has offloaded its highly enriched Uranium to China. Our nuclear reactor has subsequently been converted to use low-enriched fuel for power generation. A world free of nuclear weapons must be in all our collective interest, the President revealed. However, a release signed by Member of Parliament for North Tongu and a Ranking Member of Parliament's Foreign Affairs committee, Samuel Okudzeto Ablakwa, said the deal has been shrouded in utmost secrecy. Considering the recent Supreme Court decision in the Gitmo case when interpreting Article 75 of the Constitution of Ghana, it is clear that this arrangement which has been shrouded in utmost secrecy ought to have received Parliamentary ratification at the very least before handing over our highly-enriched uranium to the Chinese if that is the path we consider to be in our strategic national interest. The Minority in Parliament has decided to compel the Government of Ghana when Parliament resumes from recess to submit to Parliament the full details and true nature of the agreement with the Chinese and the Americans who appear to have funded the operation, the release said. The statement is published in full below President Akufo-Addo revealed during his address to the United Nations 72nd General Assembly on Thursday the 21st of September, 2017 that: "Three weeks ago, highly-enriched uranium was flown out of Ghana back to China, signaling the end of the removal of all such material from the country. Our nuclear reactor has, subsequently, been converted to use low-enriched fuel for power generation. A world, free of nuclear weapons, must be in all our collective interest. Considering the recent Supreme Court decision in the Gitmo case when interpreting Article 75 of the Constitution of Ghana, it is clear that this arrangement which has been shrouded in utmost secrecy ought to have received Parliamentary ratification at the very least before handing over our highly-enriched uranium to the Chinese if that is the path we consider to be in our strategic national interest. The Minority in Parliament has decided to compel the Government of Ghana when Parliament resumes from recess to submit to Parliament the full details and true nature of the agreement with the Chinese and the Americans who appear to have funded the operation. While reminding government of its obligations to several other agreements yet to be ratified by Parliament, the Minority shall be pursuing this very important development in the spirit of transparency and good governance consistent with the view taken by the apex court of the land. Signed, Samuel Okudzeto Ablakwa (MP) Ranking Member, Committee on Foreign Affairs. Story by Ghana | Myjoyonline.com Information Minister, Mustafa Hamid, has revealed President Nana Akufo-Addo will not take up claims against him that he smokes marijuana, a banned substance. A serial caller affiliated to the opposition National Democratic Congress (NDC), Frank Kwaku Appiah, known popularly as Appiah Stadium, recently alleged that he has knowledge that the President smokes 'wee', causing his arrest by the police. The Ashanti Region Police say they arrested him to substantiate an allegation and help with investigations. Police have charged Mr Appiah with causing fear and panic, Myjoyonline.com has gathered. Frank Appiah's arrest has been sternly criticised by a section of the public, particularly members of the NDC, who see the arrest as a re-enactment of the repealed criminal libel law. However, in a statement late Tuesday, the Information Minister revealed the President has conveyed his disinterest in the matter to the police. He said Appiah Stadium was merely reciting discredited allegations "from an NDC propaganda book." "H.E. Nana Akufo-Addo wishes to state that he is not interested in pursuing the matter in issue since same was ruled upon by the National Media Commission (NMC) on February 6, 2015. "This followed series of publications in pro-NDC newspapers making similar claims. Lawyers for then Candidate Akufo-Addo took these newspapers namely, The Al-Hajj, Enquirer, Informer, Ghanaian Lens and the Daily Post to the NMC to afford them the opportunity to substantiate their claims. "They failed to do so, following which the NMC asked them to retract and apologise," the statement explained. Read the full statement from Mustafa Hamid's Ministry below. ARREST OF FRANK KWAKU APPIAH The President's attention has been drawn to the arrest of one Mr. Frank Kwaku Appiah, popularly called Appiah Stadium, for spreading lies about him (the President). H.E. Nana Akufo-Addo wishes to state that he is not interested in pursuing the matter in issue since same was ruled upon by the National Media Commission (NMC) on February 6, 2015. This followed series of publications in pro-NDC newspapers making similar claims. Lawyers for then Candidate Akufo-Addo took these newspapers namely, The Al-Hajj, Enquirer, Informer, Ghanaian Lens and the Daily Post to the NMC to afford them the opportunity to substantiate their claims. They failed to do so, following which the NMC asked them to retract and apologise. The President is, therefore, convinced that right thinking Ghanaians recognise that Appiah Stadium is merely reciting from an NDC propaganda book, which has since been discredited. The President has informed the Police administration that he is not interested in the matter and has asked them to be accordingly advised. HON. MUSTAPHA ABDUL-HAMID 27.09.2017 LISTEN At the just ended 72nd Session of the UN General Assembly, a key sentiment expressed by the gathering world leaders including US President Donald Trump and Ghana's President Nana Addo Dankwah Akuffo Addo was that the UN has been ineffective in carrying out its mandate of ensuring global peace, security, development, justice and fairness and that there is urgent need to reform the body. President Akuffo Addo noted that, Somehow the courage and the will have never been found to reform the United NationsWe cannot continue to preach democracy and fairness around the world, we cannot insist on peace and justice around the world, when our global organisation is not seen by the majority of its [193] members as having a structure that is just and fair. It is, indeed, seen by many as helping to perpetuate an unfair world orderGhana supports the process of UN Reform, especially of the UN Security Council, as set out in Africas Common Position on UN Reform. On his part US President Trump observed that, While the United Nations on a regular budget has increased by 140 percent, and its staff has more than doubled since 2000, we are not seeing the results in line with this investment. The United Nations was founded in 1945 after the end of the Second World War which destroyed much of Europe, and Asia. The UN was established to be the main body to coordinate world peace and security, avoid another devastating war and bring development to every corner of the globe. The body has six main organs namely the General Assembly, the Security Council, Economic and Social Council, the Trusteeship Council, the International Court of Justice, and the UN Secretariat. These organs have functions, roles, powers, and responsibilities. The General Assembly for instance is the main forum for deliberation, policymaking and representation of all member countries. The Security Council has the most powerful role of maintaining peace and security around the world. In other words, power in the UN resides in the Security Council. The Security Council is populated by five permanent members with veto powers and 10 non-permanent members with no veto power. While developing countries like Ghana have every right to call for the world's body to be reformed to reflect the aspirations of the global citizenry, it is hypocritical of the highest order for the five permanent Security Council members to also call for reform because it is the same complaining five Security Council members (US, Russia, Britain, France and China) who are responsible for the poor and ineffective performance of the UN. The five permanent countries are those who have turned the UN into footfall hitting it in a way that pleases them rendering the world's body powerless and ineffective in addressing most of the world's intractable problems. These five countries have been using their veto powers to thwart genuine efforts by the rest of the world to bring security, stability, development, fairness and justice around the world. They have been using the Security Council to pursue their narrow national interest at the expense of global peace, security and development. They constantly veto resolutions that they do not like and frequently use their Security Council membership and veto power to promote policies that endanger the welfare of the global population. The United States for example has more than once refused to subject itself to the UN and has undermined the world's body through its unilateral actions in Africa, Middle East, Eastern Europe and Central Asia. For example Washington refused to seek UN mandate when it wanted to overthrow Saddam Hussain in 2003. Despite protest from the chambers of the General Assembly and the Security Council, the US (without UN mandate) went ahead to invade Iraq and succeeded not only in ruining the country for good but by making the Middle East more unstable than ever before. The power vacuum that the toppling of Saddam Husain created in Iraq, prepared the ground for the growth of jihadists, terrorists and other violent non-state actors in the Middle East and North Africa. Even in cases where the UN had authorised limited military action in other countries, US and her allies have often abused such mandates thereby creating condition for opposition for similar mandates to be authorised in future. In 2011 for example, when the Security Council gave the green light for NATO to enforce a no fly zone in Libya, US, Britain and France overstepped their mandate and went ahead to enforce a regime change by removing Gaddafi from power. In so doing, they created a power vacuum which was quickly filled by terrorists, jihadists and several rebel groups. Gaddafi's fall unleashed his stockpile of weapons that spread to several parts of Africa causing instability, insecurity, destruction, and death in Mali, Niger and other Sahelian countries. It also opened the floodgates of illegal migration with Libya serving as the springboard for illegal migration, human trafficking and slavery. Today, Libya is a failed state courtesy US and her NATO allies. Hilary Clinton's e-mails have revealed that France, Britain and the United States removed Gaddafi from power not because they love Libyans so much, but rather to pave the way for Libya's oil, gold reserves and other strategic assets to be stolen. French leaders in particular made Gaddafis removal a top priority because they considered his effort to strengthen the African Union as a threat to their global power and national interest. Particularly then President Nicholas Sarkozy supported Gaddafis removal to boost his chances of winning the 2012 presidential election which he eventually lost. The decision by US, France and Britain to remove Gaddafi from power made it difficult for other Security Council members to support a resolution to end the Syrian crisis. The UN therefore has been used as a platform by Security Council members to pursue their zero sum interest to the detriment of world peace and progress. The Middle East continues to be politically unstable due to the role of the big beasts of international politics notably the US, Russia, Britain and France acting in cahoots with other regional powers. Indeed, when it comes to the Middle East, the United States and Russia have enviable record of supporting one country against other. The US supported Iraq against Iran during the Iraq-Iran war in the 1980s. Russia was a patron client to most Arab countries (Egypt, Syria and Iraq) during their war with Israel. US has also been a key ally of Israel in the country's decades long struggle with the Palestinians. In the ongoing battle between Saudi Arabia and Iran for regional supremacy (which is being played out in Iraq, Syria, and Yemen), the United States and Britain are firmly behind Saudi Arabia. In fact, the Saudi-Iran geopolitical struggle has become intense and bloody because of the direct involvement of the United States. The United States and Britain have sold hundreds of billions of dollars worth of arms to Saudi Arabia, weapons which the Saudis have used to turn Yemen into the world's biggest humanitarian crisis. Rather than bringing their influence to bear on both sides, US, Britain and France have rather been fanning the conflict in the region. UN reform has been vehemently opposed by China because of its long standing geopolitical struggle with Japan and India to be Asia's military and economic hegemon. Particularly, China's territorial disputes with India has emboldened China to thwart any UN reform that will see India as a permanent Security Council member. Similarly, Beijing's maritime disputes with Tokyo over the rocky islands in the East China Sea has blinded China to realise the strategic significance of having two or three Asia powers as permanent members of the UN Security Council. China will more likely veto Japan's ascension as a permanent Security Council member than to see Tokyo elevated to a status that will place both of them on the same global power level. Because of her current dispute with several of its neighbours including Taiwan, Vietnam, Philippines and Malaysia over territorial and maritime rights of the South China Sea, Beijing is unlikely to support any reform that would see any of the claimants becoming permanent Security Council member or active player in global affairs. In fact any reference of the disputes to the Security Council for action will definitely be vetoed by Beijing. In other words, UN reform is unlikely to go anywhere so far as Beijing's disputes with her neighbours remain unresolved. The Russians, just like the United States, have used their permanent Security Council member status and veto power to project their own global ambitions thereby undermining global security, peace and development. Without regard to international law and UN rules, Russia has unilaterally invaded sovereign countries like Georgia, annexed Crimea in Ukraine, backed separatist movements in the Caucasus (particularly in Abkhazia and South Ossetia) and is currently the main power behind the Syrian government in the country's six year old bloody civil war. The United Nations is not the only body that needs reform. The World Bank, the International Monetary Fund (IMF), World Trade Organisation (WTO) all need reform but reform is unlikely to happen because of how few countries that dominate them resist every reform effort. Since their creation in 1944, the World Bank has always been led by an American citizen while the IMF has always been led by European. Despite the shift of global economic power from the West (North America and Europe) to the East (China, Japan, India, South Korea, Taiwan, Singapore, Malaysia, and Hong Kong) the two Bretton Woods institutions are still dominated, controlled, influenced and manipulated by US and Europe. For decades Japan was the worlds second biggest economy but no single Japanese ever got to lead the World Bank or the IMF. For seven years now, China has been the worlds second largest economy (China overtook Japan as the worlds second biggest economy in August, 2010), yet the leadership of the IMF and the World Bank has not changed to reflect the changing economic power shift in the world. China for instance has been calling for the World Bank and IMF to be reformed, but the United States (for geopolitical reasons), has prevented any meaningful reform from taking place. After much agony, China decided to establish the Asian Infrastructure Investment Bank (AIIB) in 2016 to rival the World Bank. During the launch of the AIIB, the United States called on her allies in Europe and Asia not to become members of the AIIB but Washington suffered a humiliating diplomatic battle as United Kingdom, Australia, Pakistan, Malaysia, Philippines, and South Korea all signed up to join. The AIIB now has 70 members (expected to reach 85 by end of 2017) with most of them major US allies. In 2014, China also spearheaded the establishment of the New Development Bank also called BRICS Bank to provide much needed funds for infrastructure development in BRICS (Brazil, Russia, India, China and South Africa) member countries. Unfortunately for the UN, it is too difficult to set up a rival body as the Chinese have done in the case of the World Bank, and the lack of appetite for reform on the part of the five Security Council members means that it will take a long time for reform to happen. By Lord Aikins Adusei Nakong (UE), Sept 25, GNA - The United States Agency for International Development (USAID) through Feed the Future's Agriculture and Natural Resource Management Project ((AgNRM) has donated assorted equipment to Sanyiga, Kassena Gavara Kara Community Resource Management Area (CREMA). The items included a number of tricycle motors, motorbikes, bicycles, computers and accessories among others are to help the CREMA conserve and protect the biodiversity in the area. The Sanyiga, Kassena Gavara Kara CREMA is formed to help protect and preserve the larger corridor that links the Nazinga Game Reserve in Burkina Faso to the National Mole Park in Ghana, which holds rich biodiversity that forms the basis of the socio-cultural and economic prospects of these local communities. Speaking at the ceremony at Nakong at the weekend, the Deputy Chief of Party at the AgNRM Project, Mr Patrick Adjewodah, mentioned that the USAID through AgNRM in collaboration with the government was working hard to reduce poverty in the communities by empowering the community members to create economic opportunities from Natural and Non-traditional agriculture resources. He explained that to be able to achieve that result, the USAID and the government through the AgNRM's 'In-Kind Grant Initiative' is supporting local communities to conserve and use their natural resources in a sustainable manner. He stressed that the initiative would equip local communities with safety and proactive equipment to responsibly manage the local resources, and indicated that so far the initiative was supporting eight CREMAs representing about 200 local communities located in the Black Volta basin, the Western Wildlife and Eastern Wildlife Corridors. Whilst the Black Volta shares border between Northern and Brong-Ahafo Regions and also form part of the border between Ghana and CAte d'Ivoire and Burkina Faso, the Western and Eastern Wildlife Corridors are made of communities lying within the Kassena-Nankana West and Sesala East Districts. The Eastern Corridor links southern Ghana to the north and other neighboring countries including Burkina Faso, Niger and Mali and runs through the Volta Region. Since 2016, the project, which is being implemented by partners including Winrock International, TechnoServe, Nature Conservation Research Centre and the Centre for Conflict Transformation and Peace Studies had trained about 500 individuals and groups to learn and adopt new agriculture techniques such as processing Moringa seeds and leaves into cosmetics, oil and food. 'Community members, primarily women, are now processing and selling Moringa products for additional income', the Deputy of Party indicated. He stated that about 1,250 men and women have benefited from trainings to improve quality of sheanut processing to meet the International market standards under the project, which is expected to end in 2021. Mr Mark Newton, the Energy Advisor at the USAID/Ghana, stated that the project had also trained communities to use energy efficient and environmentally friendly cook stoves for processing sheanut into butter, thereby reducing costs and pressure on felling trees for charcoal production. The Paramount Chief of the Nakong Traditional Area, Pe Joseph Banape Afagachie, lauded the efforts of Managers of the project and stated that the gesture would help address the environmental problems confronting the communities. GNA By Samuel Akapule, GNA The Monroe County Nutrition Workgroup is joining schools, businesses, colleges and individuals in Minnesota, Wisconsin, Illinois, Michigan, Indiana and Ohio in celebrating National Farm to School Month by crunching into apples in celebration of the third annual Great Lakes Great Apple Crunch. There are several events scheduled for Monroe County: The work group will a sponsor a crunch at the Sparta Farmers Market Saturday, Oct. 14 at 11 a.m. Free apples will be provided. The Monroe County Health Department and Aging and Disability Resource Center staff are coming together for a taste-testing competition Oct. 12. On Oct. 19, the Monroe County Memory Cafe group will choose its favorite apple in an apple tasting event during the Memory Cafe held at Jakes Northwoods in Sparta. Businesses, schools and community members have been invited to tak a photo of their crunch and submit them to the Monroe County Health Department by emailing Julie.anderson@co.monroe.wi.us by Oct. 15. Photos will be posted on the groups Facebook page. This collective crunch encourages healthy eating and supports farm to school and local food initiatives throughout the Great Lakes Region. In the Monroe County 2015 Community Health Assessment, we found that 71.5 percent of Monroe County adults did not consume an adequate amount of fruits and vegetables on a daily basis. Additionally, the 2015 Youth Risk Behavior Survey results showed that fewer than half of high school students consumed one or more fruits or vegetables each day within the past seven days. Based on the information, one of Monroe County Nutrition Workgroups main goals is to increase the number of county residents who consume an adequate amount of fruits and vegetables. For more information on the Monroe County Nutrition Workgroup or to join any of the crunch activities, contact Julie Anderson at 608-269-8666. For more information about the Great Lakes Great Apple Crunch, visit cias.wisc.edu/applecrunch. Accra, Sept. 25, GNA - Africa's most profitable and Largest Airline, Ethiopian Airlines, has been adjudged the Airline of the year 2016 (International) at the 28th edition of the Chartered Institute of Marketing Ghana (CIMG) National Performance Awards in Accra. Ethiopian Airlines was chosen for the ability to launch over ten new destinations within a year, a feat that others take forever to attain. The theme for the event was: 'Cause Related Marketing: A Panacea for National Behavioural Change.' The citation accompanying the award reads: 'In the face of another competitive and difficult year in your line of business, you have braved all odds by coming tops once again.' 'Your sterling performances were clearly demonstrated in your overall international operations where you have notable routes, including Durban, Oslo, Moroni, Singapore and Chengdu.' The citation said 'you swayed all your evaluators in your favour as they all concluded that your endeavours at being an airline of choice with a fleet of 92 aircrafts and 52 in production and contributing to the socio-economic well-being of the market, where you operate.' 'It said these are bearing fruits already as you remain unmatched in these venture and as clearly shown in your 45 per cent share occupancy of the aviation market, thus posting revenue of $10 billion in the year under review,' it added. It was on these achievements that the CIMG conferred on Ethiopian Airlines the CIMG Airline Company (International) of the year 2016. Mr Mitiku Asrat, Regional Director, Central and West Africa, Ethiopian Airlines expressed gratitude to the organisers for the recognition and thanked customers of the Airline for the ontinues patronage and support over the years. Ethiopian Airlines, which prides itself as the new Spirit of Africa, has been providing Africa with access to over 94 destinations all over the world. Madam Genet Michael, Area Manager of Ethiopian Airlines in Ghana said, the Airline had received a lot of support from the passengers and dedicated the awards to them. She said: "We are happy that people are recognising the effort Ethiopian Airlines puts in to serve Ghana and its wonderful people.' The awards covered eight major areas: Personalities, Hall of Fame, Hall of Fame- Elite Category, Media, Products, business and special category. GNA By Morkporkpor Anku, GNA Accra Sept 25, GNA- The Ghana Tourism Authority (GTA) under the auspices of the Ministry of Tourism, Arts and Culture has welcomed 30 Ambassadors at a Cocktail event to spearhead the ''See Ghana, Eat Ghana, Wear Ghana, Feel Ghana'', campaign. The campaign concept draws on re-orienting Ghanaians on a new sense of national pride in its heritage, culture and way of life. The Ambassadors, who cuts across several creative arts sectors including Musicians, Actors, Radio Presenters, Disc Jockeys (DJ) and Bloggers, are to promote tourism growth domestically and internationally (America, Europe, Asia, and others) for Ghana to boost economic growth. Madam Catherine Afeku, the Minister of Tourism, Arts and Culture, said the aim of the Tourism Ambassador programme was to partner key influencers to help drive tourism growth (domestic and international) for Ghana. She said the programme was to enhance, develop and deliver destination management objectives and potentially help position Ghana as a tourist destination of choice. She said the ambassadors would therefore use their personalities and expertise to sell Ghana's tourism potential to the world. Ambassadors include Superintendent of Police Kofi Sarpong D-Black, Nana Ampadu, Okyeame Kwame, Fancy Gadam, Agya Koo, Lucky Mensah, Abeiku Santana Aggrey and Sena Degadu. In an interview with the Ghana News Agency (GNA), Reggie N Bollie, the appointed U.K and Europe Tourism Ambassadors said, 'We feel very humbled and privileged to represent Ghana and we will endeavour to raise the flag of Ghana high wherever we go'. GNA By Kwamina Tandoh, GNA The Netherlands ambassador to Ghana, his Excellency Ron Strikker has called on government to Development a Sustainable land right system in Ghana to help boost agriculture in the country. Land ownership has been a major hindrance to the Development of agriculture in Ghana, but Mr. Ron Strikker observed when right to the land is given to businesses and individuals who are interested in the agric sector it will address the issues of land ownership for investors to invest without fear. Mr. Ron Strikker made the observation when speaking at the opening ceremony of the 2017 National Food and Agric Show ( FAGRO) currently taking place in Tamale, the Northern regional capital. He also called on government and the players in the agric sector value chain to ensure that, Ghana become a major exporter of agricultural produce to the Euros and America. Adding that,the ban on Ghana's vegetable exportation to the European countries will soon be over and government through the Ministry of Food and Agriculture should take advantage to maximize exportation of local produced vegetable. Touching on the Integrated Water and Agric Development (I WAD)policy by government,his excellency Strikker said when the needed attention is giving, the policy can help sustain agriculture in the country especially vegetable production On his part, the vice president, Alhaji Dr. Mahamuud Bawumiya lauded the FAGRO for its role in promoting agriculture in the country. In a speech read on his behalf, the vice president explained that, giving opportunity to local producers such as the National Food and Agric Show ( FAGRO) will help promote Network within the agric value chain. According to him, the government of Nana Addo Dankwa Akufu Addo places priority on agriculture as it can improve Food security and facilitate job creation for the unemployed. Citing the paperless claring system at the Port as an example, Dr. Bawumiya said the move was to ensure fast and easy goods delivery and avoid the unnecessary delayance at the various Ports in the country which will also fastruck agric business in the country. Reitreting government's commitment on job creation, Alhaji Bawumiya noted that, the planting for food and Jobs which was laughed earlier this year was part of the may initiatives by the Nana Addo led administration to ensure that, the youth in the country are gainfully employed. He appealed to Ghanaians to support the president's vision of making Ghana as a country beyond Aid since Ghana has potentials in providing what the country needs to be self sufficient. In his welcome address, the Northern regional Minister, Salifu Saeed thanked the organizers of the FAGRO 2017 for choosing Tamale as a venue for this year's event. According to him, hosting FAGRO in Tamale will not only boost agricultural business, but will also encourage the youth to venture into agriculture and also give direct or indirect income to paticipating businesses in the region. And pleged the support of his outfit to the success of the event and also said the Northern region was ready to hosting more of such events in the region. The five day program is under the theme "Creating jobs in Agriculture--Northern Region in Focus" with Paticipating businesses expected to benefit from business to business meetings, Institutional Seminars, Business Plan Training, Camp for AgricBusinesses, Leadership Seminers for women in agriculture,Farmer stakeholders engagement, Mentorship program and exhibition of agricultural produce and inputs. Present at opening ceremony were; the Netherlands ambassador to Ghana, the Northern regional Minister, the Deputy Agric Minister, partner organizations Chiefs, the Security, the Media and the general publicherlands ambassador to Ghana, his Excellency Ron Strikker has called on government to Development a Sustainable land right system in Ghana to help boost agriculture in the country. Land ownership has been a major hindrance to the Development of agriculture in Ghana, but Mr. Ron Strikker observed when right to the land is given to businesses and individuals who are interested in the agric sector it will address the issues of land ownership for investors to invest without fear. Mr. Ron Strikker made the observation when speaking at the opening ceremony of the 2017 National Food and Agric Show ( FAGRO) currently taking place in Tamale, the Northern regional capital. He also called on government and the players in the agric sector value chain to ensure that, Ghana become a major exporter of agricultural produce to the Euros and America. Adding that,the ban on Ghana's vegetable exportation to the European countries will soon be over and government through the Ministry of Food and Agriculture should take advantage to maximize exportation of local produced vegetable. Touching on the Integrated Water and Agric Development (I WAD)policy by government,his excellency Strikker said when the needed attention is giving, the policy can help sustain agriculture in the country especially vegetable production On his part, the vice president, Alhaji Dr. Mahamuud Bawumiya lauded the FAGRO for its role in promoting agriculture in the country. In a speech read on his behalf, the vice president explained that, giving opportunity to local producers such as the National Food and Agric Show ( FAGRO) will help promote Network within the agric value chain. According to him, the government of Nana Addo Dankwa Akufu Addo places priority on agriculture as it can improve Food security and facilitate job creation for the unemployed. Citing the paperless claring system at the Port as an example, Dr. Bawumiya said the move was to ensure fast and easy goods delivery and avoid the unnecessary delayance at the various Ports in the country which will also fastruck agric business in the country. Reitreting government's commitment on job creation, Alhaji Bawumiya noted that, the planting for food and Jobs which was laughed earlier this year was part of the may initiatives by the Nana Addo led administration to ensure that, the youth in the country are gainfully employed. He appealed to Ghanaians to support the president's vision of making Ghana as a country beyond Aid since Ghana has potentials in providing what the country needs to be self sufficient. In his welcome address, the Northern regional Minister, Salifu Saeed thanked the organizers of the FAGRO 2017 for choosing Tamale as a venue for this year's event. According to him, hosting FAGRO in Tamale will not only boost agricultural business, but will also encourage the youth to venture into agriculture and also give direct or indirect income to paticipating businesses in the region. And pleged the support of his outfit to the success of the event and also said the Northern region was ready to hosting more of such events in the region. The five day program is under the theme "Creating jobs in Agriculture--Northern Region in Focus" with Paticipating businesses expected to benefit from business to business meetings, Institutional Seminars, Business Plan Training, Camp for AgricBusinesses, Leadership Seminers for women in agriculture,Farmer stakeholders engagement, Mentorship program and exhibition of agricultural produce and inputs. Present at opening ceremony were; the Netherlands ambassador to Ghana, the Northern regional Minister, the Deputy Agric Minister, partner organizations Chiefs, the Security, the Media and the general public Education remains, undisputedly, the primary medium of empowering, harnessing capacity for personal and national development and at the same time a tool for poverty reduction. The 1992 constitution has made it a legal provision that all children of Ghana will enjoy free education and we can say successive governments have done their bit to ensure that the journey towards free education is achieved. Access, equity and quality is core to free education. Ghana joined the rest of her UN counterparts to adopt the new development goals otherwise known as the Sustainable Development Goals (SDGs) in the quest to accelerate development. Ghana as middle income economy like other countries in the continent have chalked some level of success in goals 8, 4, 2 and 1 of the erstwhile Millennium Development Goals but fail woefully to achieve 5 and 7 but has been said to have made progressive efforts to achieve 6 and 3. With the adoption of the SDGs, the country is hopeful of achieving previously failed targets while making strides to achieving the new targets of the SDGs before 2030 and sustaining them afterwards. The president recently inaugurated the inter-ministerial committee to facilitate the implementation of the SDGs. For the purpose of this conversation, out of the 17 goals, only four will be considered for the purposes of this discussion thus: SDG 3, 4, 5 and 6. These four goals generally concern women and young girls. When women and young girls are at the center of a conversation regarding Water, sanitation and health (WASH), there is no way any well-meaning Ghanaian could ignore menstruation. Menstruation is an important and virtually normal part of the female human life, and humanity exists because of this. Menstruation refers to the shedding of the uterine lining on a regular basis among the reproductive-aged females during the monthly menstrual cycles. A study conducted in Bangladesh by HER Project estimated that a woman will menstruate between 2,000 to 3,000 days in her lifetime and would have used 10, 500 sanitary pads from menarche to menopause. The onset of menstruation, which is natural and physiological, could become a barrier to the adolescent girls education because of abdominal cramps, loss of concentration in class and the possible fear of staining their uniform with blood. Therefore, with proper menstrual hygiene management in place, it will positively influence attendance and performance in school without compromising on access, equity and quality education. The high price of sanitary products and the impact on girls' education is not just a problem in Ghana. According to a 2014 campaign , girls are also missing school in countries like India, Nepal, Afghanistan and Sierra Leone for the same reason. Reports have it that the government of Kenya since 2011 has been setting aside funds to buy and distribute the commodity to girls from disadvantaged backgrounds. The new legal provision currently in place in that country requires government to provide the towels to every school-going girl who has reached puberty. So in another developing country, provision of these towels has been made obligatory rather than optional. It is sad to note that, the free senior high school program that seeks to remove cost barriers to education and ensure that no child is left behind has woefully failed to include the provision of sanitary pads into the list of things that the government will be catering for under the program. The truth is that not all girls benefiting from the free senior high school program can afford sanitary pads to properly manage their menstruation. Studies have shown that 95% of girls in Ghana do not attend school during menstruation mainly because of the lack of sanitary facilities in schools. Some girls also stay away from school for the total days of menstruation for fear of stigmatization, insufficient sanitary materials and or soiled uniform. This can impact negatively on the program as poor menstrual hygiene management can result in absenteeism, poor performance, hamper gender parity in education and the overall achievement of the free senior high school program. Menstrual hygiene management (MHM) can significantly influence the achievement of the newly adopted Sustainable Development Goals 3 (ensure healthy lives and promote wellbeing for all ages). Goal 4 (ensure inclusive and equitable quality education and promote lifelong learning opportunities for all), goal 5 (achieve gender equality and empower all women and girls), and goal 6 (ensure availability and sustainable management of water and sanitation for all). Considering that women population in the country is fast increasing and they will dominate in various sectors of national development, it will be a step in the right direction to include strategies such as provision of sanitary facilities and pads in a pro-poor intervention such as the provision of sanitary materials for girls on the programme. The availability of these materials will go a long way to build girls confidence and guarantee their retention in schools for effective learning. This Agenda is an investment in our future the future of our youth and that of our children. We are obliged to leave them with an enduring legacy of a richer, more stable, more secure and more peaceful world. Prez Akuffo Addo (.2017). The Happy School Girl Project (HSGP) is J Initiatives girls education focused programme aimed at retaining girls in schools. Introduction I have decided to address this topic as a reaction to inquiries from people wishing to know the status of the DV lottery. I have met people who have told me they will not enter the lottery because the program has been cancelled. I wish to address a bit of a misinformation relating to the current status of the DV program. Has the DV lottery been cancelled? No. It has not. Nothing has changed in the running of the program. Perhaps, it may be cancelled in the future. But as it stands now, the DV program is operating and in full effect. Where did the news of the cancellation come from? It probably came from reports that President Trump had endorsed a new bill titled Reforming American Immigration for Strong Employment Act commonly called the Raise Act. The bill seeks to make comprehensive changes to existing immigrant visas. It proposes to halve the total number of immigrants issued green cards every year over the next 10 years. The notorious casualty is the DV Visa Lottery. The DV Program Around 50,000 green cards are issued annually under the DV Program. The DV Visa Lottery has always been popular. It is a means by which a person can obtain a green card to the U.S. without having a family member or employer. Traditionally, you could only obtain a green card if a petition has been issued on your behalf by a family or an employer. The DV visa is different. You only need to be from a qualifying country and have a high school diploma to qualify. If you do not have a high school diploma, you can qualify by showing two years work experience in an occupation requiring at least two years of training within the past five years. You do not have to pay any fee to enter the lottery. Will the law affect other visas? Yes. It will. The DV Visa wont be the only casualty. Other visas will also be affected. This includes the following: Preference Visas Currently, you can apply for a green card if you are the spouse or child of a U.S. citizen. You can also apply as an unmarried son or daughter, a parent, brother or sister of a U.S. citizen. The Raise Act proposes to abolish these relationships. The only persons who can apply for green cards under the law are spouses and children. There is a provision for sick parents to join their children on a 5-year visa. However, they cannot live and work in the U.S. Refugees The number of refugees issued green cards annually is around 100,000. This will be halved to 50,000. Employment based green Cards About 140,000 green cards are issued annually through employment. This number will not be cut. However, the existing system will be replaced by a point-based system. If you wish to apply for a green card on the basis of employment, you must show certain attributes including age, educational qualification, investment in the U.S., salary, social or professional achievements. Will the law be passed? As it stands now, these are only proposals. The Bill is yet to be debated and voted upon. It is believed that the Bill is a long way from being passed into law. If it eventually passes, the DV visa will be gone for good. Can one still participate in the DV Program? Sure. Registration for the DV-2019 program begins 3rd October, 2017 and ends 7th November, 2017. The entry is free. However, if you are not sure you will meet the requirements, do not make the entry. Your visa will be refused and your visa fee will not be refunded. You can log on to the DV lottery website at www.dvlottery.state.gov to make you entry. Apply early. Do not wait until the last day to make your entry. Do it yourself. Do not let someone do for you. If it is necessary that someone enters for you ensure that they enter the right details. Insist on your confirmation number after they submit your entry. By Emmanuel Opoku Acheampong Disclaimer: This article only provides general information and guidance on U.S. immigration law. The specific facts that apply to your matter may make the outcome different than would be anticipated by you. The writer will not accept any liability for any claims or inconvenience as a result of the use of this information. The writer is an immigration law consultant and a practicing law attorney in Ghana. He advises on Ghana, U.S., UK, and Schengen immigration law. He works for Acheampong & Associates Ltd, a law firm in Accra. He may be contacted on [email protected] acheampongassociates.com or www.acheampongassociates.com . Spanish Navy Vessel Infanta Cristina will visit Sekondi port from 25th September to 1st October, to carry on training activities and cooperation exercises with the Ghanaian Navy. These activities are usual between both navies as well as cooperation between Spanish and Ghanaian Armed Forces.During the fThe training exercises that the Spanish Navy Ship Infanta Cristina will conduct with the Ghanaian Navy, include maritime security, medical assistance, scuba diving and damage control activities. The patrol vessel Infanta Cristina departed from her homeport in Cartagena Military Base, on August 16th 2017, with a Crew of 92 people. Her deployment along the West African coast will last four months visiting several countries apart from Ghana, such as Cape Vert, Mauritania, Senegal, Cameroon, Saint Tome and Principe, Angola, Gabon and Ivory Coast. The aim of this deployment is to carry out cooperation missions with the coastal countries, within the framework of the Defense Diplomacy Plan, for the development of their naval capabilities, and to contribute to Maritime Safety and region stability. The patrol vessel Infanta Cristina was the fourth Descubierta class corvette (F-34), built by the Spanish shipyard company Bazan (currently Navantia) in Cartagena. She was boated on April 24th 1977 and commissioned on November 24th 1980. From September 2004 to June 2005 she was transformed to perform her new role as patrol vessel (P-77). Patrol Vessel Infanta Cristina belongs to the Spanish Maritime Action Force. Her characteristics make her self-capable of operating in different scenarios, becoming a very valuable unit, not only in conventional operations but also in humanitarian and peace endurance missions. Nowadays, she carries out maritime surveillance and security missions over maritime areas. The surveillance over sovereignty spaces, the fight against the illegal drug trafficking and illegal immigration, and the protection of the archeological submarine heritage are also among her multiple commitments. Addis Ababa (AFP) - The African Union on Wednesday expressed its "bewilderment" at US President Donald Trump's inclusion of Chad on an updated and open-ended travel ban list issued at the weekend. In a statement the AU said it had been "perplexed" by the presence of three African countries -- Libya, Somalia and Sudan -- on Trump's original travel ban, and welcomed the removal of Sudan from the new list, issued Sunday. But it criticised the "unjust" inclusion of Chad, a country with a long history of cooperation with the United States on counter-terrorism. The AU statement "expressed bewilderment at the imposition of the unjust travel ban on the Republic of Chad, in particular, given its important role in the fight against terrorism in the Lake Chad Basin, Northern Mali, and the Sahel." Chadian forces, sometimes in close collaboration with the US military, play a leading role in fighting against Nigeria's Boko Haram Islamists. Chad has suffered Islamist attacks and its capital, N'Djamena, hosts the five-country Multinational Joint Task Force against Boko Haram. The new travel ban indefinitely blocks citizens of listed countries from entry to the US. The AU said it shares US concerns over "the threat of terrorism and violent extremism" but that "cooperation and meaningful engagement" were the answer. "The free and legal movement of people is the foundation of a stronger and mutually enriching relationship between the African continent and the United States," the AU added. On Sunday, Trump acknowledged Chad as "an important and valuable counterterrorism partner" but added it "does not adequately share public-safety and terrorism-related information" and warned that "several terrorist groups are active within Chad or in the surrounding region." Iran, North Korea, Syria, Venezuela and Yemen, alongside the three African countries, are subject to the new ban which takes effect on October 18. Johannesburg (AFP) - Thousands of angry South African trade unionists took to the streets across the nation on Wednesday to call for President Jacob Zuma to resign over alleged top-level corruption. In Johannesburg roughly 2,000 members of the COSATU trade union federation, South Africa's largest, marched armed with "Zuma must go, corruption is a crime against humanity" placards. They accuse Zuma of massive looting of state resources and collusion with the influential Gupta business family who are at the centre of many of the graft allegations against the president. COSATU, which along with the South African Communist Party (SACP) and Zuma's African National Congress (ANC) party, is in South Africa's ruling coalition but has previously broken ranks and called for the president to go. COSATU backs Deputy President Cyril Ramaphosa, a former trade union leader and businessman, in the race to replace Zuma as party leader which will conclude at the ANC's elective conference this December. Zuma must also step aside as president of the country in 2019 when the ANC leader will likely succeed him as head of state. Zuma denies all allegations of corruption against him. Ramaphosa: 'man of good morals' But COSATU's president Sdumo Dlamini, who led marchers in Durban, denied that the protests were intended to sway December's conference and insisted that they were simply to protest graft. "(The) ANC needs to prioritise unity so that we can see a united outcome of their conference in December," he told local media. In Johannesburg a sea of red-clad demonstrators nonetheless chanted "we are ready for Ramaphosa". "The president of the country must step down because of his dubious relationship with the Guptas," said 48-year-old Lucas Makgolane, a high school teacher who made the journey to the commercial capital from Heidelberg 60 kilometres (40 miles) southeast of Johannesburg. "If Zuma steps down then the deputy president, a man of good morals, can step in." Smaller marches were also held in Cape Town and in several of South Africa's major towns. Zuma has shrugged off several court cases and persistent allegations of graft and incompetence. Criticism of his leadership is growing within the ANC and several marchers wearing the party's colours took part in Wednesday's action. As South Africa's economy struggles to rebound following years of sluggish growth, some political analysts have suggested that the ANC could lose its absolute majority in parliament -- held since the dawn of democracy in 1994 -- in 2019's elections. Isaac Agyepong, District Chief Executive (DCE) for Kwahu East, recently embarked on a six-day visit to South Africa to market investment opportunities in his district. Mr Agyepong, who also presented the district's investment plan to the investors, also interacted with Cape Town's Minister of Economic Opportunities. According to him, some of the investors expressed a strong desire to reciprocate the visit to explore the economic prospects in the district. A tiger nut and tomato processing factories are billed to be established in the district under the government's 'One District, One Factory' policy. The DCE said the assembly would support government's policy of creating jobs for the youth in the district. He said most of the investors in Cape Town were into agro-processing and that partnering them would enhance agricultural productivity, as well as increase household incomes in Kwahu East District. He also interacted with agents of Johannesburg's Food Market. At the end of the day, farmers in Kwahu East District and the chance of producing on large-scale, since the assurance of ready buyers in South Africa would be guaranteed. The Kwahu East DCE added that samples of the produce would be delivered through the Ghana Export Promotion Council to enable the district move into the South African food market. Challenges to production The major constraints to producing tiger nuts in Kwahu East include high labour costs in relation to land preparation and harvesting. Research indicates that in some countries, particularly Spain, there are regulatory authorities in the tiger nut industry to ensure quality production. However, in Ghana, the production has been left in the hands of poor farmers and traders, as well as small-scale industrialists, without any government supervision. Other places in Ghana noted for tiger nuts production are Bawjoase in the Central Region and Techiman in Brong Ahafo Region. Kwahu-Aduamoah in Kwahu East District of the Eastern Region has gained prominence as the hub for tiger nuts production. From Daniel Bampoe, Kwahu Abetifi Energy Minister Boakye Agyarko has assured workers of the Electricity Company of Ghana their jobs are secure under the 20-year concessional agreement. He said government has renegotiated an earlier provision that barred any new managers from laying off workers only within the first five years of the implementation of the agreement. Government has now secured an agreement with the concessionaires not to lay off any workers in the entire 20-year period of the concessional agreement, the minister said. Workers of the state-owned power distributor have been protesting an arrangement which would see the company handed to a concessionaire for the next 25 years. When the attempts to block the deal failed last year, the workers now say the government, which is the sole owner of the company must pay them severance packages before the new managers take over. Under the new Millennium Challenge Power Compact agreement programme, Ghana will receive a US$469,300,000 with a new management for ECG. The aim of the Ghana Power Compact is to create a financially viable power sector to meet the current and future needs of households and businesses, and to help fight poverty across the country. Ahead of the implementation of the concessional agreement, the workers are demanding a severance package. Eastern Region Chair of the Public Utility Workers Union (PUWU) Abraham Lincoln says the government has every right to continue any policy started by the previous government, including the concessional agreement under which ECG is being handed to a private company to manage. But before this is done, he argued, the government must first pay workers of the existing company their severance package. Quoting Section 65 (2) of the Labour Act, he said if they are going to be put on secondment for the next 20 years under a new company then they deserve a severance package with the old company which is ECG. Responding to the concerns at a press briefing, the Energy Minister, Boakye Agyarko said the workers can only legitimately claim a severance package if they are leaving the company. But as long as they remain in the employ of ECG even under the new management, they cannot have any severance packages paid to them. All willing to leave are at liberty to leave but they cannot have an expectation that they will have a job in the new company, Mr Agyarko noted. He said the government considered the concerns of the workers and reviewed the period of the concession from 25 to 20 years. In addition, he said the jobs of workers have been secured. "We have explained that all benefits accrued to staff under ECG will be transferred to the new company, he stressed. The new company, he asserted, will not have a right to vary or alter the benefits of workers. Story by Ghana | Myjoyonline.com| Malik Abass Daabu Ghanaian-owned revenue monitoring and anti-fraud company, Subah Infosolutions made a remarkable impression at the ongoing ITU Telecom World Conference with its novelty Happy Hour networking event. It was the first time a private organization or even country has held an event dubbed Happy Hour at any ITU event in the world and it was held at the plush LeaderSpace on the massive floor of the Busan Exhibition Complex (BEXCO). Director at Subah, Redeemer Kwame told Adom News when they proposed the idea to ITU, the latter was a bit nervous because it has not been done before, but it in the end "it was a very successful event." The Subah Happy Hour easily became one of the dedicated platformS forms for business to business and business to government networking that the ITU factored into this years event. It provided the unique and unprecedented opportunity for representatives of governments and private sector to network in a relaxed atmosphere over drinks and light food. Redeemer Kwame said Subah alone struck about five revenue monitoring and fraud management deals during the Happy Hour, adding that the representative from Somalia who attended the event "actually wanted us to go with them to Somalia straight from Busan." He was confident that others who attended the event also found it worth their while. App Sponsorship Meanwhile, going to the ITU Telecom World 2017, Subah sponsored the App downloadable from both Apple Store and Google Play Store that showed the program of events for the whole conference. Redeemer Kwame said Subah believes the membership dynamics of the ITU can change from just an all countries affair to even private sector memberships, "and so we using this occasion to show what we can if we become a member of the ITU." According to him, a Subah is known for providing ICT solutions to challenges facing governments and large-scale organizations, and it is in keeping with that reputation that it decided to provide the ITU 2017 App, which offers solution to the thousands attending the conference. Advent GIS He said at the exhibition, Subah is showcasing not just its successful revenue monitoring and fraud management solutions, but also its GIS mapping solution dubbed Advent GIS, which is arguably the best GIS mapping system in the world today. According to him, the system is designed to enable easy and accurate location of various residential and commercial buildings to enable local government authorities to know the exact revenues to expect from each building within their respective localities. "With such as system each local government authority knows the status of each building and what rate applies to them and for that matter how much money to expect from each locality every month," he said. He explained that such as system prevents corruption and siphoning of public funds because both the collector and the payer would have to indicate the transaction occurred and it can be monitored remotely on the phone of any manager in the comfort of his home or office. "The special thing about Advent GIS is that the map has been zoned in such a way that each specific zone can be copied unto the phone or tablet of the revenue collector of the respective zones so they cannot confuse their area of operation with another," he said. Redeemer Kwame trusts that Advent GIS will be the bedrock of digital public address systems, mapping for state revenue mobilization and for tourism on the African continent and ultimately around the world. "We believe this is the best for a Africa because the existing ones like Google Map and others did not factor in features that can assist African governments to mobile revenue for development but Advent GIS makes that a number one priority before any one features," he said. Currently Subah is doing revenue monitoring and fraud management in some African countries and is about to connect others soon, and Redeemer Kwame is confident that with the interest showed so far in the solutions Subah is showcasing at the ITU World, it will even expand its footprints further into the continent and beyond sooner than later. Former Chief Executive Officer of the Ghana National Petroleum Corporation (GNPC), Alex Mould, has backed calls for a review of some taxes charged on fuel prices. Speaking on the Citi Breakfast show on Wednesday, Mr. Mould explained that some of the taxes have outlived their usefulness hence must be reviewed downwards or totally scrapped. Currently, data from the National Petroleum Authority (NPA) shows that there are about 10 different kinds of taxes and levies on petroleum products. Fuel prices hit all-year-high Fuel prices have hit all-time high in September, with petrol selling at an average price of GHc4.29 at the pumps, and diesel going for an average of GHc4.23 per litre. Although some observers have blamed the surge in fuel prices on the depreciation of the Ghana cedi as well as unstable prices on the international market, analysts believe the local taxes on fuel prices are major factors. Mr. Mould in the interview called for a quarterly review of the forex rate margin and a scrap of the BOST levy. I think one of the areas is the forward forex rate. It is an anticipatory rate what they anticipate the [exchange] rate to be at the end of the period where they are supposed to have sold the product, and collected the money and buy the foreign exchange I think that should be looked at. This he said is because per the forex rate margin, assuming the rate is 5% and the actual exchange rate is 1% percent, then the consumers are paying an extra four percent, so I think rather it should be like a fund where a claim could be made by the BDCs for any unanticipated forex loss that they make. That's an area that should be looked at because it may be too high and it should be reviewed quarterly. Mr. Mould argued that the BOST margin should be scrapped because there is no reason for it to be there anymore. BOST is operating as a commercial entity, and they have told us over the years that they are making a lot of profit. The BOST margin was put there so that we could have some strategic stocksgovernment has looked at ways of funding the strategic stocks so the BOST margin I think should go except BOST makes very strong case for it to be retained. The Ugandan authorities must stop threatening to close media outlets simply for doing their job, said Amnesty International today after the countrys media regulator vowed to close down media houses for broadcasting live. The threats come the day after a brawl between MPs in Ugandas parliament was broadcast live by media outlets in the country. It is unacceptable that Ugandas media regulator is threatening to close down media houses simply for doing their job and broadcasting live news events. Ugandans have a right to know what their elected representatives are doing, a right the authorities must facilitate rather than hinder, said Michelle Kagari, Amnesty Internationals Deputy Regional Director for East Africa, the Horn and the Great Lakes. These threats, harassment and intimidation are an attempt to gag the media, and have no place in any society that respects human rights. The media must be left alone to independently inform and educate the public, including on the ongoing debates about the proposed constitutional amendment. In a statement, which has been widely shared on social media, the Uganda Communications Commission threatens to revoke or suspend the licenses of media houses that carry live broadcasts, accusing them of promoting a culture of violence. The Ugandan authorities must live up to their obligations and commitments to uphold freedom of expression, by facilitating debate among Ugandans on the proposed constitutional amendment. Freedom of the press must not be sacrificed at the altar of politics, said Michelle Kagari. They must also stop arbitrary arrests of opposition politicians and supporters, journalists, and human rights defenders. Ruling party MPs want to remove the age cap of 75 so that President Yoweri Museveni, who has ruled the East African country for 31 years, can stand for re-election in 2021. 27.09.2017 LISTEN It is rather unfortunate that Nana Akufo-Addos fee-free Senior High School policy initiative threatens to literally throw privately owned and operated Senior High Schools out of business, with reports of enrollment having dropped precipitously. Privately owned SHSs have been an integral part of our national school system for quite a considerable while at least since independence and so ought not be allowed to completely vanish from the national education firmaments. I dont know their reach, in terms of the percentage of Ghanaian schoolchildren that they serve or educate, although I would not be surprised if the figure turns out to hover between 10 to 15-percent. That is still quite a lot. But, of course, the bizarre notion that, somehow, the fee-free SHS policy initiative ought to have been scrapped or abandoned because it seriously undermined or threatened the existence of these for-profit secondary academies is patently absurd, to speak little about the utterly nonsensical (See Well Lay Off Graduate Teachers Over Free SHS Private Schools RainbowRadio Online.com / Ghanaweb.com 9/14/17). The fact of the matter is that not only are the overwhelming majority of Ghanaian citizens educated by our state-owned public schools, the operators of these privately-owned schools are themselves products or alumni of these public schools. And so are the overwhelming majority of teachers employed by these privately-owned institutions. And so it is quite clear that both logic and the imperative need to speed up the development of the country are on the side of President Addo DankwaAkufo-Addo and his Administration. It is also significant to underscore the fact that the gradualist nature of the implementation of the fee-free SHS system means that there is a phasing-out period of at least some three to four years before the entire system becomes 100-percent fee-free. And so while, indeed, freshman enrollment at the privately operated SHS may have fallen precipitously, for approximately 75-percent of enrollment space, the for-profit SHS system can favorably compete with its taxpayer-sponsored counterpart. Of course, this window of opportunity, as it were, is fast closing in on the privately owned secondary academies. Ultimately, though, it does not in any way, shape or form appear to me that privately owned SHS establishments are apt to disappear anytime soon; more so, because it well appears that these exclusive and, in a few instances, elite secondary academies are the academies of choice for the well-heeled diplomatic, business and high-end professional communities in the country. We are told, for instance, that some of these privately owned Senior High Schools only accept fees in dollars and other fetching foreign currencies. They also prepare their students to sit for foreign exams. It is those privately-owned academies that trade in the local cedi currency, and prepare their students to sit for the West African School Certification Examinations (WASSCE), that may experience the full brunt of the fee-free SHS system. Their ability to survive obviously depends pretty much on the level and quality of education that they are able to provide. But I also agree with those who want the government to subsidize the tuition fees for qualified students who opt to attend privately owned secondary schools because these students failed to gain admission into their public schools of choice. As for the desperate threat laying off the bulk of the teachers of these privately owned institutional establishments, it is decidedly a non-issue because the public-school system has more than ample vacancies to absorb them. Indeed, it would actually appear to be a blessing in disguise. *Visit my blog at: kwameokoampaahoofe.wordpress.com Ghanaffairs The Ministry of Finance has completed the financial clearance of 130 house officers to start work at the Komfo Anokye Teaching Hospital (KATH) in Kumasi. Barring any last minute hitch, the fresh medical doctors will resume work at KATH, beginning from this upcoming weekend, CEO of KATH has announced. Dr Oheneba Owusu-Danso stated that KATH's management is, indeed, elated that the house officers are eventually about to fill the gap at the hospital. He was speaking in an interview with DAILY GUIDE during the 2017 annual two-day mid-week performance review workshop on Tuesday. Exit of 150 Doctors About 150 house officers who had completed their one-year stay at KATH left the hospital some weeks ago, creating some challenges for the hospital. Doctors who were supposed to fill the gap that their exit had created could not do so on time due to delay in their financial clearance by the Finance Ministry. KATH CEO Dr Owusu-Danso admitted that the delay in the financial clearance of the house fresh 130 officers created a gap in the hospital for some few days. He, however, disclosed that in the face of the challenge, management quickly engaged some senior doctors to hold the fort to help save lives at KATH. Dr Owusu-Danso stated that KATH continued to offer normal services for patients who visited the facility on a daily basis even when the 150 house officers had left. He underscored that the hospital would not face any deficit again in the area of medical doctors, now that the 130 house officers are coming. The Minister for Zongo and Inner City Development, Hon Boniface Abubakar Saddick and the Charge d'Affaires of the Saudi Arabian Embassy, Abdulkarik Mohammed A. Alluhidan last Monday evening jointly cut a birthday cake to commemorate the 87th anniversary of the founding of the Kingdom of Saudi Arabia. The activity which took place at the Movenpick Hotel in Accra was graced by many guests from both the diplomatic circle and outside it. In tracing the history of the formation of the Kingdom of Saudi Arabia, he recalled how on 23rd September 1932 it was formed by the promulgation of a royal decree. Continuing, he said, this saw the unification of various segmented areas to form the kingdom adding so many years after that, in March 1960, Saudi Arabia opened an embassy in Accra. The Kingdom of Saudi Arabia, he said, is credited with support projects in the country pointing specifically at the Takoradi and Tema harbours expansion works not forgetting the Korle Bu Teaching Hospital and the Bolgatanga health facility. The embassy in Ghana continues to issue visas to applicants adding that the mission has issued some ten thousand entry permits some of which were Hajj permits to Ghanaians. On the international scene, he said, his country has supported in various efforts towards ensuring stability in troubled areas and continues to play a major role in fighting terrorism in the world. With a population of 23 million, more than 70% is in the youthful bracket and twitter compliant and government, he assured, is committed to catering for the housing and job needs of the citizens in the private sector. As a founding member of the UN, the Kingdom of Saudi Arabia, the envoy indicated, continues to demand justice in dealing with states across the world as a way of ensuring global peace. In his remarks Hon Boniface Abubakar Saddick who represented the government of Ghana, conveyed the President's felicitations to the Kingdom of Saudi Arabia and recalled the many gestures Ghana is enjoying from that country in the areas of development. He attested to the many projects in which the Saudi Arabian government is supporting Ghana especially in the energy sector and the rehabilitation of the Tema and Takoradi harbours. The venue of the anniversary celebration, Movenpick Ambassador Hotel, he said, is ample evidence of Saudi investment in Ghana. The hotel is owned by Saudi Prince Al Walid Bin Saud. Government, he assured, is committed to delivering on its flagship of free SHS and others geared towards bettering the standards of Ghanaians. The minister expressed gratitude to the Saudi Embassy for the support it has rendered through an increased quota for Ghanaian pilgrims and for the time spent in working on visa applications. The Weija District Police Command has apprehended an aluminum fabricator for allegedly terrorizing some residents of New Bortianor with a gun. The suspect Eric Edem Abotse ,30, who claimed to be a national security operative, was apprehended by a police patrol team. The police found two pistols on him after a search. He reportedly stormed the area with two others to attack a woman over a piece of land. The others are Nii Abusua Commey and Pomary Yayera Cudjo. Nii Commey and Pomary were later granted police enquiry bail, but Abotse is still in custody while investigations are still ongoing. Confirming the story to DAILY GUIDE, DSP Stephen Addom, the Weija District Police Commander, said the incident occurred on September 23, 2017 at New Bortiano. Police received a distress call from a victim after the three allegedly attacked her with a gun on the said piece of land. A police patrol team was immediately dispatched to the scene where they met the three persons in a tussle with the victim. They were all brought to the station for interrogation. The victim told the police that the suspects attacked her with a pistol. When suspects Nii Commey and Pomary were searched, nothing was found on them but two pistols loaded with ammunition, a pair of handcuffs and security motor roller radio set, popularly known as 'gota' were found on the suspect. The suspect claimed he was a national security operative but failed to produce his identity card. Police investigations later revealed that Abotse was not a National Security Operative. A search was later conducted in his house at Cantonments where a military jacket and pair of booth were discovered. He has provisionally been charged with possession of fire arms without authority and would be arraigned before court soon. The Ministry of Lands and Natural Resources, on Friday, inaugurated a five-member committee to investigate the wanton sale of state and public lands between 2013 and 2016 without recourse to the head office of the Lands Commission. The Committee, which is chaired by Dr Opoku Adusei, the Deputy Director of the Ghana Standards Authority (GSA), is required to submit its report to the Chairman of the National Lands Commission in two weeks. Benito Owusu Bio, a Deputy Minister of the Ministry, during the inauguration of the committee, tasked them to investigate the 24 lands in the prime areas in Accra given to private developers without proper procurement processes. The committee is also to investigate 25 transactions, which were declined, as well as the veracity of some of the transactions, which were conducted based on a Memorandum of Understanding (MoU) between the Ministry of Works and Housing and the purported leases. The Deputy Minister noted that under the MoU, the leases were just required to build some apartments for the government in exchange of the lands at the prime areas. He said: Investigate whether or not the method for the selection of the purported Lessees followed the due procurement process as stipulated in the Public Procurement Act, 2003, (Act 663) and the Public Procurement (Amendment) Act, 2016, (Act 914). Mr Owusu Bio asked the Committee to ascertain whether or not the principle of value for money was considered as the basis of the MoU since the Land Valuation Division of the Lands Commission was not engaged to assess and advice on the market value of the lands. He entreated the committee to assign very clear reasons to decisions taken on those transactions in order to cure any mischief, perceptions and speculations. The Committee is supposed to submit recommendations on the preparation of a National Policy to regulate redevelopment and in-filling schemes on state and public lands across the country. It's to advise the government on the lifting of the ban on state and public lands allocations and any other issue, as the Committee may deem credible and fit to investigate. Other committee members are: Professor Felix Hammond, Kofi Dankwa Osei, Alex Quainoo and Alhaji Sulemana Mahama. Pressure is mounting on Joseph Nii Laryea Afotey-Agbo, the Member of Parliament (MP) for Kpone-Katamanso and former Greater Accra Regional Minister, to step down as a result of his induction as caretaker chief of his hometown, Katamanso, near Ashaiman. Some people have initiated moves to get Parliament to declare his seat vacant following his installation as Regent of Katamanso. It would be recalled that in June 2017, Afotey-Agbo was installed as Regent of Katamanso and subsequently inducted into the Nungua Traditional Council in Accra. His installation follows the incapacitation of his father, Nii Otu Akwetey IX, who is the substantive chief of the area. Steps are being taken for Parliament to declare the Kpone-Katamanso seat vacant because it is unconstitutional for Mr Afotey-Agbo to represent the people in Parliament while serving as a chief. Kwame Baffoe alias Abronye DC has threatened to petition Parliament to declare the seat vacant. He believes that Mr. Afotey-Agbo's actions contravenes Article 276 of the 1992 Constitution, which states that a chief shall not take part in active politics, and any chief wishing to do so must or shall abdicate his stool or skin. He contended that the legislator would be in breach of the constitution if he does not step down. According to him, I'm told Parliament is resuming next week so I will officially file a petition to the Speaker of Parliament to address the issue because currently, I'm aware that the Member of Parliament for Kpone-Katamanso has been installed as an acting chief of the area. And if you read Section 58 of the Chieftaincy Act, Act 2008 as amended, it clearly talks about the categories of chiefs we have in this country and the last paragraph talks about other chiefs that may be recognised by the National House of Chiefs. If you are acting as chief in a certain traditional area, it means that you can be recognised by the National House of Chiefs, and that acting chief also performs his or her customary duties as the law demands. So clearly, he cannot continue to hold himself as a Member of Parliament. If he continues to hold himself as a Member of Parliament, it is a clear violation of the 1992 constitution and I'm appealing to the Speaker of Parliament to call on the MP for Kpone-Katamanso to vacate his seat to pave way for a bye-election to be held. In a quick rebuttal, the opposition National Democratic Congress (NDC) said the MP has not flouted the constitution. The Greater Accra Regional Organiser of the NDC, Anthony Nukpenu, told Class Fm that petitioning the speaker will be a waste of time because before the MP assumed the role, he consulted the leadership of the House, both Majority and Minority, he sought advice as to what he was supposed to do. But a private legal practitioner and law lecturer at Central University, Martin Kpebu, who spoke to the same Accra-based radio station, pointed out that the MP should resign his position since he cannot be a legislator anymore as a result of his installation. He stated that in my estimation, it's unconstitutional for Nii Afotey Agbo to stay in office. As a person who has been nominated, elected and installed, what happens is that in practice, a regent performs the functions of a chief. It is not to say a regent has not been installed as chief, the question is that what does a regent do? Let us answer that question and by the end of that question you will be clear that a regent should not be in active politics. The regent traditionally performs most of the functions of a chief. I think he should resign as MP before somebody takes the matter to court. 27.09.2017 LISTEN From the late evening Ghana online radio news reaching me in London today, Tuesday, 26 September 2017, the police have arrested the notorious Kwame Appiah Stadium for accusing His Excellency President Nana Addo Dankwa Akufo-Addo of addiction to wee smoking. Following his alleged arrest, some Ghanaians who claim to know much better than anyone else and are probably experts in democracy and freedom of speech, have emerged from their holes and nowhere to lambast the police. Some sent their condemnatory comments to the radio stations and others have resorted to their tweeter feed and other social media outlets to make public their views about the arrest of Kwame Appiah Stadium. Let all those who have arrogated to themselves the spokesmanship for the interpretation of free speech and democracy hence coming out brazenly to indirectly support the absurdity by Kwame Appiah Stadium note the following: In the United Kingdom, France, Germany, Canada and the United States of America just to mention a few of the civilized Western countries that are the mothers of democracy and freedom of speech, if you go out screaming that you have a bomb in your bag that you are about to set it off, even though you may be joking, you will be lucky if you are not gunned down by any armed police officer around. Why will you be arrested or shot even though you have no bomb as alleged? Is saying you possess a bomb without actually having one not part of your freedom of speech to say what you like, when you like and where you like? You will be arrested or shot for the panic you are causing among the public. You will be arrested or shot to protect the public. You have yourself to blame for whatever punishment is meted to you following your utterances bordering on sheer absurdity. This is exactly the situation of Kwame Appiah Stadium. Again, in the same Western world, a security officer or guard, especially the front of house officers have strictly certain code of conduct to observe why because they are the first contact of the company they work for as security officers. They have to be clean and tidy at all times. They have to good-mannered to uphold credible standard of customer service. A company may be very reputable but if it has scruffy security officers, they may risk losing some valuable clients as the presence of dirty security officers will surely create bad impression about the company in the mind of an incoming customer/client. Similarly, the impression that a President engaged in contraband drugs will create in the minds of his colleague-Presidents and the world public will be equal to that of an ill-mannered scruffy security officer to the clients of a reputable firm. Subsequently, the police have the right to seek to redeem the image of the President if he has just been maligned for political propaganda or to establish the veracity of the accusation against him to inform the public accordingly. To brush the accusation under the carpet as sought by the few those who think they know all but indeed know nothing, will not do Ghana and the President any good. Finally, the President is the face of Ghana and represents not only himself but Ghana. Therefore, he should not just let go if people accuse him of crime but must endeavour to exonerate himself from malicious blame by taking the necessary legal action. Some people are saying former President Mahama was massively slandered in all sorts and manner hence there is nothing wrong about insulting and accusing President Nana Akufo-Addo. To those people, I say bollocks! Who never knew nor heard about the corruption orchestrated, if not masterminded, by former President Mahama and his government or family? This nonsensical equalization must stop! The police have the absolute right to invite or arrest Kwame Appiah Stadium for interrogation to uncover the truth about, or to establish the falsity of, President Nana Akufo-Addo smoking wee. Is it not illegal to smoke or sell wee in Ghana? Why should there be exemptions were President Nana Akufo-Addo truly a heavy wee smoker? Lest I forget, you have the right to air your views but in workplaces if you express critically-derogatory view about homosexuals and it comes to the attention of the management, you may be lucky to be issued a warning. You may be sacked accused of discrimination on the grounds of sexuality. Here, I am talking about what prevails in the Western world where democracy and free speech are the cardinal pivots on which their socio-politico-economic advancement revolves. In democracy, your freedom ends where someones nose begins. Those who are talking rubbish about the police inviting or arresting Kwame Appiah Stadium for interrogation must bury their heads in shame after reading this publication. At the request of nurses throughout the 17th state Senate District, I recently authored Senate Bill 417 to make Wisconsin a member of the Enhanced Nurse Licensure Compact. This legislation updates our current nurse licensure compact statute to maintain Wisconsins status as a compact state. The eNLC provides an opportunity for nurses in Wisconsin to receive a multi-state license and allows nurses from other states to quickly fill vacancies in Wisconsin without receiving a duplicative single-state license. Nearly all Wisconsin nurses currently enjoy the benefits of an interstate license authorized by our current nurse licensure compact and will continue to have the benefit of an interstate license under this bill. The eNLC was developed to add more value and state representation to the compact organization. It also takes advantage of new technology and national databases to insure that compact-licensed nurses meet consistent standards and background check benchmarks. As is the case today, the eNLC will not interfere with Wisconsins ability to hold any nurse practicing in Wisconsin accountable for meeting all Wisconsin nurse practice laws. I have heard from dozens of nurses from the 17th District, as well as hospital administrators and doctors who have asked me to sponsor this legislation. Following are several messages I have received throughout the last month: At Southwest Health, being part of the nursing compact has meant that nurses in Iowa who want to work in Wisconsin can serve our patients immediately rather than wait several weeks to process an additional nursing license. High quality health care, like Wisconsins, draws high performing workers, and this is true at Southwest Health where almost one in five nurses are from Iowa, according to Dan Rohrbach, CEO, Southwest Health, Platteville. Our hospital appreciates the leadership of Sen. Marklein, Rep. VanderMeer and Rep. Tranel in moving this legislation forward and ensuring that our nurses and patients can continue to enjoy the benefits of this important interstate agreement. Gundersen Boscobel prides itself on fostering an environment of education and learning. Our tuition investment program is intended to grow nursing leaders and advance practice clinicians for our future and the future of rural health care, but those future nurse leaders and nurse practitioners must have a place to obtain a degree, according to David Hartberg, CEO, Gundersen Boscobel Area Health and Clinics. Online education makes it possible for nurses in our community to access highly experienced nurse educators from across the country while continuing to provide critical services for patients in rural Wisconsin. Without the nurse licensure compact, education institutions would face additional licensure barriers as they would have to seek separate certifications in every state where they offer education. With a 70,000-square-foot expansion and renovation underway, we are focused on serving the current and meeting the future demands of an aging population in our community, according to Nicole Clapp, president/CEO, Grant Regional Health Center. It is important to maintain a nurse licensure compact agreement with Iowa and 25 other states to ensure we do not encounter unnecessary licensure barriers as we build our Wisconsin nursing workforce to meet the patient care needs our community faces into the future. The enhanced Nurse Licensure Compact is supported by Wisconsins Board of Nursing and numerous Wisconsin health care organizations including the Wisconsin Hospital Association, the Wisconsin Organization of Nurse Executives and the Wisconsin Nurses Association. SB 417 was also developed in consultation with the Wisconsin Department of Safety and Professional Services (DSPS). SB 417 was introduced on Sept. 21. I am working with my colleague, state Sen. Leah Vukmir, R-Brookfield, to move this bill swiftly through the Senate Committee on Health and Human Services so that we can bring it to the floor this fall. For more information and to connect with me, visit my website http://legis.wisconsin.gov/senate/17/marklein and subscribe to my weekly E-Update by sending an email to Sen.Marklein@legis.wisconsin.gov. Do not hesitate to call 800-978-8008 if you have input, ideas or need assistance with any state-related matters. There is chaos at some offices of the Metro Mass Transit Limited across the country as workers protest what they described as the poor working conditions at the Company. The workers said the Company has sanctioned the purchase of $108,000 luxurious vehicle for the Managing Director at a time when over 100 buses required urgent maintenance. Clad in red with others wielding placards with various writings, the workers said they want government to stop the purchase of the vehicle with immediate effect. The protests have brought all other activities at the company to a halt. Workers Union Chairman, Emmanuel Awatey told Joy News Maxwell Agbagba Wednesday, management has not shown much concern about the company. He said their workshops are loaded with broken down vehicles that have not been repaired because of the lack of spare parts. Every time they say they dont have money but they are going to buying the vehicle for the MD and were able to pay a consultant who is a pharmacist 9, 000, he said. Mr Awatey also raised issues with the working condition of his members, which he said has reduced the quality of their lives. We havent receive our salary and allowance which is 10 per a trip for more than three months now, he lamented. Mr Awatey told the reporter, the Company owes Ghana Oil Company Limited (GOIL) the sum of 10,000 of fuel supply and no attempt has been made to defray it. Joy News Ashanti Regional Correspondent, Ohemeng Tawiah reported the situation is not different in Kumasi. Scores of commuters, hoping to come to Accra, have been left stranded because the drivers have abandoned their vehicles. "Commercial vehicles have taken over the Metro Mass Transit Depot in Kumasi as workers of the later embark on a sit down strike in protest over better conditions of service," the reporter said. An attempt to get a word from MMTs Managing Director, Bennett Aboagye was unsuccessful when he drove into the companys premises at 10am. Joy News Maxwell Agbagba reported meeting Mr Aboagye and the companys Legal Head at the Accra Office and they looked surprised at the turn of events. Juba (AFP) - President Salva Kiir on Wednesday ordered South Sudanese police to cooperate with a new 4,000-strong United Nations force being deployed in the capital Juba. Kiir's government has been reluctant to accept the so-called Regional Protection Force (RPF), which is in addition to 12,000 existing UN Mission in South Sudan (UNMISS) peacekeepers. It was mandated specifically to protect civilians in the capital after violence rocked the city in July last year. "You are not to fight the RPF or the forces of the UNMISS, you have to cooperate with them," Kiir told hundreds of police officers gathered to hear his address. Deployment of the RPF began last month with the arrival of Rwandan troops but was quickly mired in controversy after the government accused the UN of trying to seize control of the airport, which is adjacent to the main UN base where the peacekeepers are stationed. "They are here on a temporary basis, if we didn't fight among ourselves these people wouldn't have come here," said Kiir, striking a more conciliatory tone than in the past. Kiir's words echoed those of US ambassador to the UN Nikki Hailey who on Tuesday complained that UN operations in South Sudan "are continually frustrated". "We call on the government of South Sudan to welcome the assistance of the UN Mission and to cooperate with it," Hailey said. Around 600 RPF troops have arrived in Juba with more due next month. They are specifically tasked with providing security and protecting civilians in and around Juba, jobs usually carried out by police. South Sudan's civil war since late 2013 has uprooted a third of its 12 million people and left tens of thousands dead. Accra, Sept. 26, GNA - Experts at a roundtable organized by the Institute of Financial and Economic Journalists (IFEJ) have stressed the need for a good corporate governance in the banking industry in order to ensure success. According to them, it was important to ensure that players in the sector adhered to strict corporate governance principles in all their dealings. Speaking at a roundtable on the banking sector in light of the assumption and purchase of UT Bank and Capital Bank by the GCB Bank, Dr John Gatsi, an economist, said stronger regulations and good corporate governance was necessary for the industry going forward. He said the happenings at UT Bank and Capital Bank, which led to their collapse, illustrated this need. 'Globally, anytime we have such problems, it is either because we have a combination of regulatory failures or failure in the area of corporate governance. 'If we are going to deal with this problem, to have a positive effect in the long term, then we need to be looking at stronger regulation and effective corporate governance within our banking sector,' he stated. Dr Gatsi who is also a lecturer at the University of Cape Coast said without this, Ghana was likely to see a recurrence of such problems, which would not be good for the country. He noted for instance that, having owner-managers participate at top management and board level will incentivize them to ensure that the right things were done to protect the long-term interest of the owners. He also called for more independent directors on boards of banks and other financial institutions to ensure a balanced board. He said board members should be knowledgeable and conversant with the provisions of the Banking Act and with obligations under the Act so as to ensure the right things were done. Mr. Ekow Afedzie, Deputy Managing Director of the Ghana Stock Exchange, explained that in the case of UT Bank, which was listed company, the GSE had made efforts to ensure adherence to their regulations, which bordered on good corporate governance, including publishing of their accounts. However it eventually failed to comply, which led to its suspension and subsequent delisting from the GSE. 'We are going to ensure that we enforce our rules to the letter going forward,' he maintained. Mr Adu Anane Antwi, former Director-General of the Securities and Exchange Commission (SEC) also stressed the need for effective implementation of the new Banking Act, especially as it held top executives of bank liable for breaches of the Act by the bank. He said the act now also empowered individual directors to report breaches to the Bank of Ghana, thus the need for people selected to such roles to know the rules, responsibilities and other obligations of the position before assuming it. 'Regulators in the sector are now doing well and should be encouraged and resourced to implement the laws,' he noted. He also urged the financial media in Ghana, including IFEJ, to support the regulators by bringing out the issues that require regulatory attention to the appropriate regulators. GNA By Belinda Ayamgha/Stella Opokuwaa Asare, GNA This years celebration comes at a time when the industry is facing several challenges such as terrorism and general hooliganism; therefore, prompting the UNWTO to release a handbook offering guidelines on how to Travel, Enjoy, Respect. To highlight the significance of sustainable tourism as a tool for development, Jumia Travel marked the World Tourism Day by bringing together experts and stakeholders in a workshop dubbed Green Summit held in collaboration with the Kenya Utalii College. The workshop, aimed at sensitizing the public on their pivotal role in steering and supporting the International Year of Sustainable Tourism for Development (2017) saw distinguished speakers such the Director, Ministry of Tourism Keziah Odemba and the former East Africa Tourism Platform Coordinator Carmen Nibigira, Robert Orina from NEMA and Jim Karani of Wildlife Direct among others share key insights largely focusing on the UNWTO global theme for the day, Sustainable Tourism A Tool for Development. The industry recorded a total of 1.2 billion international travelers in the past year, a number that is forecasted to grow up to 1.8 billion by 2030. Kenya made a growth by registering a 16.7% increase from 2015 to hit an impressive 877, 602 international arrivals. Its in this light that Keziah Odemba encouraged the participation of communities in tourism destinations as they bear the primary impact of the trade. Odemba also noted that key issues such as infrastructure, education, and governance are closely tied to the development and sustainability of travel and tourism, hence urged the government to accord priority to solving issues touching on the same, as well as streamline the numerous processes involved. Carmen challenged stakeholders in the aviation industry to implement trade models that will push Africa to open its skies to Africa while observing that apart from the cost of the actual ticket, sailing through the immigration department of some African countries is a nightmare. She noted that tourism recovery campaigns, open border policy and uptake of technology are key drivers if the country is to see any remarkable growth in arrival. The issue of human-wildlife conflicts came into the picture as Karani, an animal law expert from Wildlife Direct highlighted the plight of elephants in Laikipia conservation as well as the impact of infrastructural development such as the SGR on wildlife. He noted that creation of community-based programs in conflict-prone areas was a wonderful way of engaging the locals. Recognizing the role of environmental conservation in sustainable development, Robert Orina of NEMA commended Kenyans for the positive uptake of the plastic ban thus far. The ban, Orina said, aims at facilitating Kenyas achievement of SDG 12 on responsible consumption and production. To mark this day, the World Tourism Organization has released a handbook outlining simple codes of conduct for travelers that touch on the five pillars of travel, thus; economy, society, environment, culture and peace. Cyrus Onyiego, Jumia Travel Country Manager Carmen Nibigira - Former Eatp Coordinator Jumia Travel Green Summit Keziah Odemba - Director, Ministry Of Tourism L-r - Carmen, Robert, Jim Accra (AFP) - Hundreds of Togolese nationals have fled to neighbouring Ghana to escape reprisals after a wave of anti-government protests, a Ghanaian official said on Wednesday. Paddy Tetteh, from the Ghana Refugee Board, said the first batch arrived last Wednesday and although numbers had since fallen, more were still trying to come in. "They are close to 300," he told AFP. Most were in the northern district of Chereponi, close to Ghana's eastern border, he added. Chereponi chief executive Abdul Razak Tahiru told reporters that food, mats, bedding and mosquito nets had been distributed to the refugees. "Due to the demonstrations in Mango (northern Togo), they are beating them and they have decided to run for their lives," he was quoted as saying by local media. "Yesterday (Tuesday), the pressure was too much because the people learned that there was going to be another demonstration from Wednesday to Friday." Hundreds of thousands of Togolese have taken to the streets in recent weeks to call for the resignation of President Faure Gnassingbe, who has been in power since 2005. He took over from his father, Gnassingbe Eyadema, who ruled Togo for 38 years from 1967. The security forces cracked down on the protests in Mango and at least one person was killed and more than 20 others injured, according to official figures. "The military conducted punitive expeditions throughout the night (of Wednesday to Thursday last week)," said Togo opposition member Brigitte Adjamagbo-Johnson. Togo's presidency has instead blamed the protesters and said it had never given approval for demonstrations in the area. At least four people have been killed since the start of the protests in August. Opposition parties and civil society groups say dozens were injured in the north last week. As well as Gnassingbe's resignation, the protesters also want changes to the country's constitution to limit the number of presidential mandates to two. A nationwide shut-down has been called for Friday. Over 50 parents on Wednesday morning petitioned the Eastern Regional Minister, Eric Kwakye Darfour, at the Regional Coordinating Council over what they term as the refusal of school authorities to provide their wards with boarding accommodation. This action by the parents comes barely two days after Citi News reported that some parents are still stranded at the Seventh Day Adventist Senior High School in Koforidua, after failing to secure boarding accommodation for their kids who have been placed in those schools under the Free SHS programme. The parents, who have been traveling to and fro from Tema, Kumasi, Kasoa, Accra, Afram Plains and Savlugu in the Northern Region, say they have had to abandon their work to follow up on these issues for their wards. William Tabiri, a parent from Salaga, was furious about the ups and downs and the cost he has incurred in trying to secure boarding accommodation for his child. I am coming from Salaga in the Northern Region, I have been here since last week just to secure boarding accommodation for my daughter. My wife came here last 2 weeks for the prospectus and she was assured of boarding accommodation, and today [Wednesday], the situation is different. I am currently lodging in a hotel for the past one week, and all my money is finished because I do not know anyone here. Another parent lamented that, We are not happy at all because since admission started, I have been traveling from Tema to Koforidua everyday. The Headmistress at the school gave me the prospectus to buy the things, I came with my son last week, but was told by her to come on Monday and on Monday we came again only to be informed we cannot get accommodation. We are from Tema, so how can my son be a day student, he is only 14 years old and I cannot rent a room for him. Another parent explained her situation to Citi News, saying, I cant be happy because other kids are learning whiles my child is at home; this is unfair because I was promised boarding accommodation so I went and borrowed money to purchase all the items on the prospectus, my small girl is only 15 years old so how do you expect me to be at home while my only child is sleeping in a rented room. Most of the parents including myself here have brought all the items we were asked to buy on the prospectus and now they are saying we should go home with it, why should we go through all these pain?. If we do not get a positive response from the Minister and the Regional Education Director we are not leaving here today she said. The Eastern Regional Minister was however not present, because hes on another assignment in Accra, as of the time the parents got to the coordinating council. However, the Deputy Eastern Regional Minister, Joseph Tetteh, directed his public relations officer Osei Owusu to accompany the angry parents to the office of the Eastern Regional Education Director, Getrude Mensah, who told the parents that nothing can be done about the boarding accommodation. I am aware of your problems, the Headmistress has been summoned to Accra because she has even taken more than necessary and she is going to answer questions on that. In the interim, my PRO will take your names and send it to Accra for your kids to be accommodated as Day students or you can even change the school if you want, but I must say the Headmistress at SDA cannot do anything about it to help you. The implementation of the Free SHS this September for first year students, has put enormous pressure on the facilities of most schools across the country. Some heads have improvised to accommodate the numbers, but others simply cannot take anymore. By: Neil Nii Amatey Kanarku/citifmonline.com/Ghana The Vice President of the Republic, Dr. Mahamudu Bawumia, has reiterated governments commitment to the strengthening of bilateral relations with the Peoples Republic of China. His Excellency Dr. Bawumia made this known when the Chinese Vice Minister for Commerce, Mr. Qiam Keming, paid a courtesy call on him at the Flagstaff House. The Vice President in June this year, led a delegation of government officials to China in a quest to deepen diplomatic and economic ties, as well as create opportunities for Ghanaian businesses to form partnerships between the two countries. Government is seeking to leverage Ghanas natural resources, specifically bauxite, through its recent partnership with China to commit about $19 billion to Ghanas economy. Dr. Bawumia disclosed that the government sees several opportunities to cooperate with her partners in areas like agriculture, infrastructure, trade and even culture. Partnership with China is a win-win approach. We want the Chinese government to encourage businessmen in China to come and set up businesses in Ghana and also make the climate conducive in China for Ghanaian businesses he urged. The Vice President underscored the importance of prioritising projects in Ghana to meet pressing demands, with employment creation projects topmost on the list. We have to prioritise what we do. The One District One Factory, One Village One Dam, road construction and agriculture products processing are very important for this government and so we will appreciate it if Chinese experts will partner with us to see them realised Dr Bawumia indicated. Mr. Qiam Keming on his part said, he is in Ghana to follow up on Dr. Bawumias recent visit to China during which discussions on bilateral trade were held. He emphasised that the two countries intend to complement and strengthen further their industrial and agriculture cooperation to add value to agricultural products, especially cocoa. China seeks to strike a balance between short and long term developments and is focused on prioritised projects. Ghana is a fast developing country and we are ready to partner with you in global development. In the meantime, a Chinese team is undertaking feasibility studies on a number of projects including a medical facility, 13 bridge projects in Western region, Daboya and Nagone in the Northern region, he disclosed. China is also partnering Ghana to provide human capacity building training in Ghana. This is to develop human resources and equip them with the requisite skills to stay abreast with contemporary trends in development. Present at the meeting were H.E. Mdm. Sun Baohong, Chinas Ambassador to Ghana; H.E Mr. Edward Boateng, Ghanas Ambassador to China and other government officials. Abuja (AFP) - Nigeria has been advised to pull out of 90 international organisations, as part of a government drive to save money, the country's finance minister said on Wednesday. Kemi Adeosun said annual subscriptions to such bodies cost the country about $70 million (60 million euros) but "in many cases" it had not been paying its dues. A ministerial committee had recommended that "out of the 310 organisations, 220 organisations should be retained and the rest we should withdraw membership from", she told reporters. No list was provided of the organisations and the minister said "more work was needed" to determine exactly how much Nigeria owed. "The committee had a figure of about $120 million but we are clear... that it is far more than that. Our subscriptions are in arrears in a number of major organisations," she said. Ministers were briefed on the recommendation at the weekly cabinet meeting and told the arrears were causing "some embarrassment" when Nigerian delegations travelled abroad. Soon after her appointment in 2015, Adeosun launched Nigeria's first efficiency unit as a first step to cutting government waste and boosting the economy. Not only did Africa's de facto biggest economy need to "put (its) fiscal house in order" but there was a need for "probity in the use of public funds", she said at the time. A review was also announced into the cost of Nigeria's foreign missions, raising the prospect some embassies and consulates could close. Nigeria has been forced to tighten its belt because of the slump in global oil prices that has slashed government revenues and triggered a months-long recession. President Muhammadu Buhari has said he inherited a "virtually empty" treasury and pledged to recover "mind-boggling" sums of public funds looted by previous administrations. Adeosun, a former PricewaterhouseCoopers accountant, described the latest move as "just prudence and value for money". "Nigeria doesn't need to be a member of every single organisation but those we are a member of, we have made a decision... that we must prioritise and pay our obligations because that is part of the nation's image," she added. "That is what gives Nigeria as a country the right to sit up very straight at international meetings. When you haven't paid up your subscriptions you can't necessarily do so." Some mothers of children with cerebral palsy have been able to register their children in an on-going registration exercise for all persons with disability. Mrs Ellen Affam-Dadzie, Head of the With God Cerebral Palsy Centre, an Inclusive education centre for children said for the first time she has been able to register the children at her centre with the LEKMA district assembly. She therefore urged other mothers of children with cerebral palsy to liaise with the Social Welfare Officer at the various district to also put the names of their children with cerebral palsy in the register of persons with disability. Usually children with cerebral palsy are excluded even from the disability fraternity due to their peculiar challenges, they may not be speaking nor walking, so it is left with the parents to become their number one advocate, she said. The National Council for Persons with Disability is embarking on a registration exercise to capture the data of all persons with disability. The exercise will also inform the disbursement of the three per cent District Assemblies Common fund for Persons with Disabilities in Ghana Ms Esther Sackey, a mother of a child with cerebral palsy in an interview said she hopes her child with also be captured in the data collection and subsequently benefit from the fund, saying, usually, they do not capture children with cerebral palsy even though they also have disabilities and their condition comes with a huge financial burden on family. She called on the Social Welfare workers in the various district to help capture all children and adults with cerebral palsy who may be brought by their parents for the registration. Mrs Hannah Awadzi, Initiator of the Special Mothers Project, an advocacy and awareness creation platform on cerebral palsy issues, said usually parents do not even have access to such important information. Only a negligible percentage of children with cerebral palsy benefit from the fund for persons with disabilities, yet parents make huge sacrifices to even keep the children alive we have issues with the educational system so most of the children are not in school, the lack of support and services including care-giver services is also huge, she added Mrs Awadzi urged government to pay attention to children with cerebral palsy and help formulate policies that will help enhance the lives of the children Tripoli (AFP) - Libya's navy warned it will seize activists' boats on migrant rescue missions that enter its waters unauthorised, after a run-in Wednesday with a German vessel during which a warning shot was fired. "This time we avoided an escalation. In future, we will seize the boats of NGOs that do not respect Libya's sovereignty," said navy spokesman General Ayub Kacem. The Libyan coastguard earlier boarded a boat operated by Germany's "Mission Lifeline" which had picked up 52 migrants at sea. "You are not welcome here," a coastguard official said in a videotape posted on the internet by the NGO. "They threatened us by telling us to hand over the people, which we refused," said the group's head Axel Steier, contacted by AFP. "It was a real act of piracy because they boarded our boat without any authorisation," he said. Kacem said the boat had tried to flee with a coastguard official still on boat. "Our patrol fired in the air to force the NGO boat to stop," the general said. "These NGOs must respect our authority and our sovereignty. Our patience has reached its limit," he added. In August, the navy ordered foreign vessels to stay out of a coastal "search and rescue zone" for migrants headed for Europe, a measure it said targeted NGOs. Six years since a revolution that toppled longtime dictator Moamer Kadhafi, Libya has become a key departure point for migrants risking their lives to cross the Mediterranean to Europe. Tens of thousands of migrants have resorted to paying people traffickers for the journey, often on overcrowded and unseaworthy boats. Charities have dispatched boats to rescue migrants from drowning, while Libya and Italy -- where the vast majority land -- have worked together to stem the flow. On Sunday, 17th September, 2017, the Hon. Member of the Council of State representing the Western Region and native of Nzema, Mad. Eunice Jaqueline Buah, joined the Nzema Community in Italy, comprising Ghanaian and Ivorian nationals, in the celebration of the 3rd Edition of the Kundum/Abissa Festival in Palermo. She was accompanied by her spouse, Nana Asomah Hinneh (DCOP), head of the Volta Regional Police Command. Also in her company were the Ambassador Extraordinary and Plenipotentiary of the Republic of Ghana to the Republic of Italy, Her Excellency, Ms. Paulina Patience Abayage and the Western Regional Chairman of the New Patriotic Party (NPP), Mr. Francis Ndede Siah. The Deputy Minister for Chieftaincy and Religions Affairs and Member of Parliament for Jomoro, Hon. Paul Essien, led a seventeen (17) member high-powered delegation made up of prominent Chiefs and Queen Mothers from Nzema, to participate in the Festival. Notable among the delegation was the President of the Nzema-West Traditional Council, Awulae Angama Tu Agyan II and the Queen Mother of Jomoro, Awulae Nda Bozomah II. Also present were the traditional authority representing the Nzema ethnic group in Palermo, led by Nana Miezah Seme and Obahima Asuah, as well as a cross-section of Ghanaian and Ivorian nationals and Italian-Sicilian businessmen and entrepreneurs. A grand colourful durbar of Chiefs and Queen Mothers as well as the people of Nzema was organized to climax the celebration of the Festival. The durbar, which displayed Africa's rich culture and tradition, as well as the history of the Nzema ethnic group, was marked by traditional music and dance performances from Nzemaland and speeches delivered by the dignitaries present. In a welcome address, Nana Miezah Seme expressed sincere appreciation to Hon. Eunice Buah for her presence and immense contribution making the celebration of the Festival possible and facilitating the trip as well as the participation of the high-powered delegation in the Festival. He assured of the support of the Nzema Diaspora including the traditional authorities toward the commitment and efforts of the Member of the Council of State at ensuring the development of Nzemaland to better the lives of the Nzema people. In two (2) separate statements delivered, respectively, by Awulae Angama Tu Agyan II and Awulae Nda Bozomah II, the personalities added their voices in expressing gratitude to Hon. Eunice Buah for the opportunity to witness and partake in the celebration of the Kundum Festival held in the Diaspora. They expressed willingness and readiness, as agents of development, to create the enabling environment in support of envisaged investment projects and programmes from Italy-Sicily for the benefit of the people of Nzema. In a statement, Hon. Eunice Buah, acknowledging the presence of the respective participants, commended the Nzema Diaspora for putting together a memorable Kundum Festival. She urged the Diaspora to seize the opportunity of making meaningful contributions toward the development of Nzema, in the light of the Government's flagship programmes of 'One District One Factory', 'Planting for Food and Jobs' and 'One Village one Dam, which are aimed at providing job opportunities, especially for the youth. She expressed the hope that, for example, the viable factories, when created, would ultimately, reduce the youth's desire to travel to Europe to seek greener pastures which were non-existent, and further produce material goods for consumption as well as for export purposes to generate increased revenue towards development. Mad. Eunice Buah encouraged the Diaspora to attract Italian-Sicilian investments marketing the available opportunities in Nzemaland for business. She further advised the Nzema Community and their leadership to work hard at acquiring skills, knowledge and expertise, taking advantage of the vast opportunities available abroad for their own benefit. The Member of the Council of State concluded her remark advising her people to be each other's keeper, disciplined and law abiding. On her part, Her Excellency the Ambassador, acknowledging the various contributions of the Diaspora, advised the Nzema ethnic group to work hard at winning more investments for Ghana to assist the Government achieve its objective of transforming the Ghanaian economy to move beyond aid. She stated that the Government of His Excellency, Nana Addo Dankwa Akufo-Addo, had prioritized the engagement of the Diaspora, and further assured of the readiness of the Embassy of Ghana to offer the relevant support and assistance towards the activities of the Diaspora encouraging the latter to identify practical ways of contributing to Government's development efforts back home. As part of the Festival, a conference, jointly organized by the Nzema group in collaboration with the Honorary Consulates of Ghana and Ivory Coast, in Palermo, was held under the theme: Traditional Authorities: Custodians of Culture and Tradition, Agents of Development. The conference, primarily, presented the various ongoing as well as envisaged projects for the Nzemaland. One of such projects, mainly supported by the Rotary Clubs in Palermo, involving Ghanaian and Ivorian designers as well as Sicilian craftsmen, is a 'Korai x Kente (KxK) Eco-Craft and Design', aimed at promoting African Art, particularly, fabrics and crafts. The project has, successfully, built a social cooperative 'KxK Craft Laboratory', situated at the heart of the city of Palermo, for the purpose of valorizing the Art to generate revenue for development. The occasion was also used to present an ongoing project of cooperation between the Mazara del Vallo Agricultural Production District in Sicily and the Government of Ivory Coast, in the area of Fisheries, towards the development of the Nzema coastal area of Cote d'Ivoire. In a brief remark, Hon. Eunice Buah, acknowledged the Sicilian business community for their support towards the development efforts of the Nzema Community in Sicily for the benefit of Nzemaland and emphasized the need to uphold the partnership established between the groups with the hope of recording significant economic successes for the mutual benefit of the two sides. She seized the opportunity to present to the Italian-Sicilian businessmen and entrepreneurs present, other investment opportunities available for business in Nzema, including agriculture, agro and cocoa processing, fisheries, energy, oil & gas, infrastructure, industry and mining, and highlighted the Government's flagship programmes of 'One District One Factory', 'Planting for Food and Jobs' as well as 'One Village one Dam'. The Hon. Member of the Council of State urged the businessmen to take advantage of Ghana's stable political climate, which continued to win the admiration of the investor community across the globe, to expand their investment portfolios and also encourage their Sicilian business counterparts to do same. Whilst proposing cooperation between the Mazara del Vallo Agricultural Production District in Sicily and Nzema, Madam Eunice Buah urged that the Fisheries project created in the Nzema coastal area of Ivory Coast be expanded to include the Nzema coastal area in Ghana. Adding to the Hon. Member's statement, Her Excellency the Ambassador intimated that Ghana was not only ripe for business, but had strong economic fundamentals which supported growth and development, as well as a very well developed human resource base ready to support such business activities. To that end, Her Excellency proposed cooperation by which Sicily, and for that matter, Italy, would assist Ghana to realize her objective of industrializing her economy by combining her rich expertise in technology with Ghana's raw materials and natural resources, enabling the latter to cut waste, add value, increase revenue and create jobs. Her Excellency continued that doing business in Ghana further opened a gateway to doing business in the ECOWAS sub-region and on the African Continent and encouraged the Sicilian business community to explore Ghana as a preferred destination for investment. On a final note, the Queen Mother, Awulae Nda Bozomah II, stressed the support of the Western Regional Traditional Authority and the people of Nzemaland toward the outcomes of the interactions held at the conference in furtherance of the envisaged goals. The Council of State member bore the expenses of the 17-member delegation's round trip, hotel accommodation et al. One of Nigerias comedians, Onyebuchi Ojieh better known as Buchi, has just welcomed a baby girl with his wife. The comedian got married to his wife earlier in the year and together they have just been blessed with a cute baby girl which they welcomed in a Texas hospital. According to the comedian who shared the good news, wrote, My pretty little angle. AZMIN LARISA OJIEH ..daddy's little gal..join me celebrate GOD's greatness on our family.Daddy loves you Az. 'The big truck is still on ... The Other Kids Movie Poster View Photos Sonora, CA A feature film shot in Tuolumne County, which has garnered some glowing national reviews, will be shown in November at Summerville High School. We reported last year that The Other Kids is a blend of fiction and non-fiction, where real-life students played versions of themselves in a constructed, fictional universe. San Francisco based director Chris Brown began auditioning Sonora and Summerville high school students for the film in late 2012 and shooting commenced in 2013, utilizing both high schools, and other sites throughout the county. Brown tells Clarke Broadcasting, None of the kids were professional actors. And another unorthodox aspect of the project is that we shot without a script, so all of the students and cast members were co-creators of the film and their characters. They had sort of an unprecedented degree of creative control and drew on aspects of their own lives, and other peoples lives, making it something that was heartfelt and real. The local actors featured in the film include Savannah Bailey, Hunter Gilmore, Kai Kellerman, Sienna Lapi, Natasha Lombardi, Joe McGee, Isaac Sanchez, Baylee Self and Abby Stewart. Brown has been showing the film at various festivals over the past year. A snapshot of the accolades include winning the Grand Jury Prize at the Florida Film Festival, Best Narrative Feature at the New Orleans Film Festival, Audience Award/Best Narrative Feature at the San Francisco Independent Film Festival, Indie Spirit Award at the Naples International Film Festival and El Rey Award For Excellence in Dramatic Narrative at the Barcelona International Film Festival. It has also garnered positive reviews from outlets such as the trade publication Variety, the Huffington Post and the San Francisco Chronicle. Brown adds, We were totally psyched (by the response). Its kind of a new thing (style), and not a normal film, so you dont know how people are going to respond. It was heartening to see that it touched people. The local showing is open to the public and being organized by the ITSA Film Festival and Tuolumne County Film Commission. It will be November 4th, from 6-9pm, in the Summerville High School Theatre. All net proceeds from the event will benefit the Tuolumne County Arts Alliance and the Yes Partnership. Brown concludes, Bringing the project home to Tuolumne County is so meaningful for us. This project started a few years ago, and the gesture of the film wont be finished until we bring it home. We cant wait. Cast and crew members are planning to be in the audience during the local screening. Tickets are available in advance for $10 by clicking here. Tickets will also be available at the door for $15. Who were the daughters of Job and why was his life so important for Christians? This man was one of the Gentiles prophets. He is a central figure in the book of Job. His daughters also played an important role in his story. Therefore, let's give you an answer tp the question 'how many daughters did Job have' and 'how important were they in his life?' How many daughters did Job have and what were their names? According to the Bible, Job had three daughters. The oldest one was named Jemimah. The second daughter's name is Keziah. The youngest daughter was named Keren-Happuch. According to the story of Job, all three daughters were the prettiest of all the women on Earth. The name of these daughters were only revealed towards the end of the Bible. Also, it was not all the daughters that were mentioned in the story of Job! To find out who the other daughters that Job fathered were, let us read the whole story, or at least, a summarised version of it. The Story of Job READ ALSO: How to overcome temptation as a Christian Job is mentioned in all Abrahamic religions. This includes Christianity, Judaism, and Islam. In all of these religions, he was known as the most loyal servant of God. As a result, God decided to test him. Job was a wealthy man who had a big family, house, and treasures. Within one day, he was stripped of all these treasures and wealth. Despite that, he did not blame God for all of his disasters. He acknowledged that his struggles were a test of his faith. These were not the only things God took from Job. One of these disasters was the death of his children. According to the Bible, a servant came to Job's house to report that all of his kids had been killed by a house that had fallen from above. In this story, it was also mentioned that Job had sons and daughters. All his children were drinking at the house of their oldest sibling when the disaster happened. Therefore, we were still not clear on the answer to the question How many daughters did Job have in the Bible? The very beginning of Job`s story explained that he already had daughters when the disaster happened. From the story, it became obvious that Job had more than three daughters. The name of the children that were lost were never mentioned in the tale. Despite not knowing their names, these children became a good example of the phrase: The Lord giveth, and the Lord taketh away. They were a lesson that people should be faithful to God even during bad times. You should not let your bad experiences or circumstances give you the idea that God is bad or that He has turned away from his people. Good times and bad times challenge our faith. Job knew that and that's why he did not turn away from God even when things went bad. This was a true test of his faith and Job remained faithful to God. At the end of the day, his wealth got restored and he went on to have more children. Meaning of Job daughters' names When Job's wealth was restored, he had three more daughters. They were the most beautiful women in the world. The name Jemimah means dove in Hebrew. Keziah means Cinnamon and Keren-Happuch means the child of beauty." Job and his daughters are viewed differently in different religions. Job and his daughters in Judaism The majority of Rabbinical scholars provides evidence that Job was an actual historical figure. He was one of the three advisers of Pharaoh who killed the children of Israel in the Book of Exodus. Therefore, Job was punished by God for not taking actions against Pharaoh. Despite his punishment, he did not abandon God, and that`s why he was blessed with three more daughters and seven sons. Job and his daughters in Quran Islam confirms that Job was one of the prophets of Allah. Still, Islam scholars emphasized the loyalty of Job to God. They also emphasized that his new sons and daughters were given to him as a reward for his loyalty. Some scholars also mentioned that these daughters had a special mission in Islam. They were a symbol of loyalty to God. Job and his daughters in Christianity Christianity prefers to focus on the story of Job in religious contexts. For instance, some scholars suggested that the new daughters symbolises a new beginning of life for Christians. Conclusion The main point of the story of Job is his loyalty to God. God rewarded him because of his faith. How many daughters did Job have? The answer will be - more than three! The Bible did not provide a lot of information about the other daughters who existed before the disaster. READ ALSO: Importance of culture in Nigeria Source: Legit.ng - The people of Ugboju community, Otukpo local government of Benue state, have been witnessing series of communal clashes - Hoodlums had reportedly taken over Ondo and Ogoli-Ugboju communities, killing dozens of persons and burning houses - Leaders of the community have however struck a peace deal in the Federal Capital Territory, Abuja Following the protracted crises that have continued to rock Ondo/Ogobia Communities of Ugboju District in Otukpo local government area of Benue state, a peace meeting involving prominent leaders of both communities has been held in Abuja. The clashes which led to loss of over 50 lives and property, has been lingering for over 3 years. Recently, the hoodlums attacked the 2 communities, killing over ten people, amongst them was a retired Army Major, Lawrence Ugbor, who was burnt alive inside his car. Consequently, the Nigeria police made some arrests in connection to the mayhem while a former chairman of Otukpo local government council, suspected to be one of the masterminds, has been declared wanted. In a meeting held in Abuja at the weekend, at the instance of Ugboju Country Club, the leaders succeeded in brokering peace between the two warring factions. The destruction caused by the crisis were monumental. Photo credit: Sodiq Adelakun READ ALSO: OPINION: Innocent blood haunts Abba Moro daily - Tahav Agerzua Legit.ng gathered that the meeting was anchored by the national commandant of Peace Corps of Nigeria Dr Dickson Akoh, president of the Club, Mr. Gabriel Iduh and member representing Adoka/Ugboju state constituency at the Benue state House of Assembly, Honourable Adam John Okloho. The peace forum was also attended by representatives of the warring factions, prominent among who are Dr. Mike Enokela Efu, Mr. Owoicho Ocheni, Inalegwu Amola, Honourable John Ojila, Thomas Ejugwu Amola, among others. A statement issued by the president of Ugboju Country Club, Gabriel Idajili Iduh on Monday, September 25, stated that: the two warring parties agreed to a cease fire, while members of UCC also agreed to visit Ondo/Ogobia for on-the-spot assessment of the situation. The forum condemned in very strong terms, those powerful individuals behind the perpetrators of this dastardly act, it also appreciated the state governor, Dr Samuel Ortom, the Otukpo local government chairman, Honourable George Ali and every other stakeholder, who have worked assiduously for peace to return to the hitherto peaceful and united agrarian communities. The meeting finally called on the federal government, the state government and good spirited private individuals, to collaborate with the Ugboju Country Club in its quest to ensure lasting peace in the warring communities. The statement also quoted the forum as calling on the federal government to set up a high-powered panel to investigate the crisis with a view to bringing to book those behind it. The people of Ugboju community had earlier called on the President Muhammadu Buhari-led government, to as a matter of urgency, come to their rescue. This was made known at a joint press briefing in Abuja on Thursday, September 14, by the leaders of the community. Watch the Legit.ng TV interview with a woman whose husband was abducted by Boko Haram: Source: Legit.ng - A Catholic reverend father has called for the proscription of Christian Association of Nigeria and Jamatul Nasrul Islam - The reverend father claimed such step would go a long way to stem the tide of religious crisis being instigated in the country - He also claimed proscription of the two organizations would show adherence to Nigerian Constitution which states that the country is a multi-religious state Reverend Father Gabriel Teruwose Ngbea, a Catholic priest, has urged the federal government to ban the two main umbrella bodies of religious organization in the country. The cleric urged the federal government to proscribe the Christian Association of Nigeria (CAN) and Jamatul Nasrul Islam (JNI) immediately. READ ALSO: Federal government crashes prices of registering companies in Nigeria The priest made this known in Abuja on Tuesday, September 26, at the public presentation of the book Constitutional Misconception of Secularism: Implications for Politics and Religion. The book was authored by him. The Reverend father claimed such step would go a long way to stem the tide of religious crisis being instigated in the country. Father Gabriel on page 302 of his book said that: CAN and JNI should be proscribed because apart from their failed mandate of advancing religious interests that these bodies have constituted themselves into a political organization, often deployed to pursue political interests. He said the proscription of the two organizations would show adherence to Nigerian constitution which states that the country is a multi-religious state. Going further, he also proposed the establishment of what he called Religious Equity Commission (REC) with a mandate to ensure that there is no discrimination among Nigerians on the basis of their faith, Nigerian Tribune reports. The establishment of an independent Religious Equity Commission whose mandate should be to ensure that there is no discrimination among Nigerians on basis of faith. CAN and JNI should be completely banned in the country. However, chairman of the occasion, Atiku Abubakar, Nigeria's former vice-president restated his position that the present administration should listen to demands of agitators for restructuring. PAY ATTENTION: Watch more videos on Legit.ng TV Atiku who was represented by former speaker of the Plateau state House of Assembly, George Daika said: Let me, however, use this opportunity to remind us all that at this delicate moment in our nations history with separatist agitations, militancy of the religious and secular varieties, calls for restructuring, and jostling for future elections, we should all be mindful of and sensitive to the feelings and preferences of those who may not think the way we think, the way we speak or worship, the way we worship or belong to the same political party as us. Our diversity ought to be our strength and, together, we can still build the Nigeria of our dreams. Meanwhile, in a report by Legit.ng, Nigeria is reputed to rank 9th among 40 most religious countries in the world. Watch video as christian group defends Apostle Suleman who was accused of extra marital affairs. Source: Legit.ng - The Independent People of Biafra (IPOB) seems to be losing relevance among Igbos - More and more Igbo leaders continue to denounce the group - The latest to do so is the Eze Ndigbo of Oyo state, Dr. Alex Anozie The Eze Ndigbo of Oyo state, Dr. Alex Anozie, has described the proscription of the activities of IPOB as a right step in the right direction. Anozie made his stance known in an interview with Daily Trust on Tuesday, September 26. He hailed the southeast governors and the Ohanaeze Ndigbo for taking the decision, describing it as a wise decision to save the region from further crisis. He noted that the Igbo regretted the civil war fought in the past, adding that the region could not afford to go into another war. IPOB seems to be going into extinction as many Igbos continue to denounce the group READ ALSO: What will happen to Senator Abaribe, others if Nnamdi Kanu fails to appear in court - Presidency His words: It is a wise decision taken by the leadership of Eze Ndigbo and southeast governors. This will douse the tension in the country. We dont want war again in Nigeria. We have fought war before and lost millions of lives and property worth billions. We dont want such a thing in this country again. Ill advise our people to take it easy and continue to appeal to the federal government to listen to us so that our agitation wont aggravate another crisis again. Igbos are the most committed group to the Nigeria project. Meanwhile, an Igbo group, Alaigbo Development Foundation (ADF) has said it has taken a step to file a suit against President Muhammadu Buhari; the Chief of Army Staff Tukur Buratai and some other individuals over the ongoing Operation Python Dance II in the southeast. The group said it has filed a petition before the International Criminal Court at the Hague over human rights abuses by the Nigerian army against members of IPOB. ADF further said the military exercise in the region was aimed ethnic cleaning of the people of Igbo extraction. READ ALSO: Fani-Kayode warns Buhari to take Obasanjo, Tinubus advice on Nnamdi Kanu, IPOB Watch Legit.ng TV video of Nnamdi Kanu's father talking about the activities of his son as IPOB's leader: Source: Legit.ng - There is currently a level of apprehension at the Aso Rock Presidential Villa over a reported would-be massive shake-up in Muhammadu Buhari's cabinet - The sweeping reform is also reportedly being considered in the military - Gen Abayomi Gabriel Olonisakin, one of the service chiefs is expected to retire soon Ministers and other appointees of President Muhammadu Buhari have remained in apprehension a month after his return from London where he spent at least 103 days over a health issue. Legit.ng learnt that the fear continues to grow because there was earlier speculation that the president could carry out a cabinet reshuffle once he returned from London. The Nation also reported that the president was further expected to announce some reforms. The report said some the presidents strategists are currently pushing for the retention of his Economic Team while seeking a split of the ministry of power, works and housing into three separate bodies. READ ALSO: Police arrest 31 suspected kidnappers, robbers near Niger, kill 5 While this is happening, there are reports that some of the presidents strategists have presented five options to him on the shape of his cabinet which Buhari is said to be weighing currently. Some of the reforms, according to the report, include key appointments in the public service and the military; cabinet; the fate of the suspended Secretary to the Government of the Federation (SGF), Babachir Lawal and the Director-General of the National Intelligence Agency (NIA), Amb Ayo Oke. Also included is the controversy over the appointment of the acting chairman of the Economic and Financial Crimes Commission (EFCC), Mr Ibrahim Magu. Now that the president has settled down, ministers, advisers and other top government functionaries are all anxious for his mid-term reforms. We know he has plans, which he has kept under wraps. The ministers are in the dark whether there will be a shake-up in the cabinet or not. No one knows the mindset of the president. We know that some issues/ matters had been pending before the President traveled for Sallah and the United Nations, the source said. Another top official was quoted as saying: For instance, some strategists/ kitchen cabinet members have been prevailing on the president to retain his Economic Team, having exited recession. They said the consolidation of the exit will be faster than the dissolution of the team. A few strategists have recommended the split of the ministry of power, works and housing into three as the case before the cost saving measures of the president. Although three ministers are now in charge of the ministry, they are calling for the assignment of full portfolio to each of them. On cabinet reshuffling, there are five options before the president. These are (a) a major shake-up; replacement of few ministers, especially those with political ambition; swapping of portfolios; allowing ministers to leave based on their own volition; and retention of all ministers till the end of the tenure of this administration. READ ALSO: Ambode unveils 20-ft statue of Chief Obafemi Awolowo The president, the report said, is further expected to take a decision on the military because of the imminent statutory exit of the Chief of Defence Staff, Gen Abayomi Gabriel Olonisakin, who was appointed on July 13, 2015. Olonisakin was due for retirement in 2016, but the president extended his tenure by one year because of the ongoing war against Boko Haram. The president had been contemplating some changes since it is obvious that Olonisakin will soon retire. The present service chiefs are the Chief of Army Staff, Gen.Tukur Yusuf Buratai (born on 24 November 1960 but commissioned as an officer in 1983); the Chief of Air Staff, Air Marshal Sadique Abubakar (born on April 8, 1960 but commissioned as a Nigerian Air Force officer in 1983); and the Chief of Naval Staff, Admiral Ibok-Ete Ekwe Ibas (born on 27th September 1960 but commissioned as a Sub-Lieutenant in 1983). If anything is worrying the president is the fear of losing good hands at a time the war against Boko Haram is at a crucial stage. Olonisakin, who is a gentleman, has been willing to leave were it not for the presidential extension of his service year. PAY ATTENTION: Read the news on Nigerias #1 new app It will be difficult to predict the nature of reform the President will carry out in the military but as a Commander-In-Chief, he knows what to do, one source reportedly said. Legit.ng earlier reported how some Nigerians started clamouring for some ministers to resign just four months into their appointment by President Buhari. What do you think President Buhari should do now that he is fully back? Watch this video: Source: Legit.ng - The Pan Yoruba socio-political group, Afenifere, has warned the federal government against militarisation in the southwest region - The group gave the warning after its meeting in Akure, Ondo state on Tuesday, September 26 - The meeting was held at the home of one of the leaders of the group, Pa Reuben Fasonranti The Pan Yoruba socio-political group, Afenifere, has warned the federal government against deploying soldiers to the southwest region due to the activities of the Badoo cult group. In a communique read by the publicity secretary of the group, Mr Yinka Odumakin, they opined that the police should be left to handle the cult group and not the military. Afenifere described the deployment of military personnel into different parts of the country as an invitation to military dictatorship and urged the federal government to stop encouraging the military to take over power. READ ALSO: Igbos in Oyo state okays IPOB proscription Part of the communique read: Meeting also considered the recent announcement by the military to launch Operation Crocodile Smile in the southwest region of the country after the Python Dance in the southeast which has been largely condemned locally and internationally. The operation ostensibly they said is to confront the badoo menace. We stated as follows: the badoo gang has been decimated by the Nigerian Police and the OPC in the area where it occurred, and we think if the group resurgence, it is the duty of the police to deal with it without causing tension, invasion and harassment as it happened in the southeast during Operation Crocodile Dance. We insist that the military has no duty in going after badoo even if it comes back. We want the federal government to be careful at the spate at which they deployed soldiers all over the country. The other day, the Speaker of the House of Representative lamented that 28 out of 36 states of the country are under one military operation or the other. The southwest has been adjudged the most peaceful area of the country and to now bring military here is to say that the entire country is not safe. They are sending a wrong signal to foreign investors and more importantly, the federal government should be reminded before the coup of 1966, this is was how Balewa government started to transfer civil duty to military and the military now said they can take over themselves. The government should be careful. We urged the federal government to tell the military not to bring any operation to southwest and to end the Operation Python Dance in the southeast and allow the police to do their duty and no crate militarisation across the country. The group also condemned the attack on the palace of Olubadan of Ibadanland, Oba Saliu Adetunji, during the installation of mogajis and baales in his palace on Monday, September 25. They described the attack as barbaric, uncultured and a direct attack on Yoruba traditional institution. This is not direct attack on Olubadan but attack on the sacred institution in Yorubaland, the value and our culture and this is not acceptable, it so condemnable. We call on the government of Oyo state and the governor, Abiola Ajimobi, to immediately make the effort to get the hoodlums and ensure that they are punished so that it will be a deterrent to others, the group said. Afenifere commended Yoruba leaders and groups for throwing their weight behind restructuring of the country during the last Yoruba summit in Ibadan. At the meeting were Chief Ayo Adebanjo, Chief Olu Falae, Chief Supo Sonibare and other notable Yoruba leaders. Meanwhile, rights group, Amnesty International (AI), has said that it is investigating the clash between the Nigerian army and members of the Indigenous People of Biafra (IPOB), in Umuahia, Abia state. In a statement sent to journalists on Friday, September 15, the director of the organisation, Osai Ojigho expressed concerns over the conduct of the Nigerian military. We are investigating all allegations of human rights violations and urge the authorities to investigate and quickly bring those suspected of unlawful killings and other serious violations to justice, the group said. READ ALSO: IPOB was tagged a terrorist group because of hate speech Defence minister Watch Legit.ng TV video of Nnamdi Kanu's father talking about the activities of his son as IPOB's leader: Source: Legit.ng - Former Vice President Atiku Abubakar claims to have created 50,000 direct jobs - He urged Nigerians to look inwards and focus on developing people instead of the oil sector - He boasted about the achievement of the Obasanjo's administration in growing the telecommunication industry Former vice president of Nigeria under Olusegun Obasanjo's administration, Atiku Abubakar, took to his Twitter page to boast about creating no less than 50,000 direct jobs. He claimed that Nigerians are the country's biggest asset and not the oil sector. He tweeted: "By the grace of God, I have created 50,000 direct jobs, and perhaps hundreds of thousands of indirect jobs because I believed that oil is not Nigerians biggest asset, Nigerians are." READ ALSO: A major shake-up reportedly expected in the Nigerian military He went further to boast of the Obasanjo's administration under which he served as vice president. He tweeted: "In 1999, Nigeria had less than 500,000 telephone lines. By 2007, we had grown that to over 50 million." Recall that Atiku was vice president of Nigeria from 1999 to 2007, a period when Nigeria witnessed a massive growth in the telecommunication industry. PAY ATTENTION: Read the news on Nigerias #1 news app Meanwhile, Legit.ng earlier reported that Junaid Mohammed, a second republic lawmaker, lashed out at Atiku Abubakar describing him as a nonentity who is not genuinely interested in restructuring. The former vice president had said that anyone opposed to the current clamour for the restructuring of the nation is lazy, but Mohammed in his reaction said Atiku was a nonentity. The former lawmaker said that Atiku thinks that by insulting the north, the south will support his presidential ambition. Watch Comrade Timi Frank give his perspective on the crisis in the APC on Legit.ng TV: Source: Legit.ng - The House of Representatives stance on Nigeria's unity has attracted commendation from the presidency - The lower house had declared its unequivocal support for the indivisibility of Nigeria as one nation - The presidency was elated with the lower house decision and pledged to continue to work with them The senior special assistant to the president on National Assembly Matters (House of Representatives), Honourable Abdulrahaman Kawu, on Tuesday, September 26, commended members of the House over their resolve to support the existence of Nigeria as one indivisible country. In a statement sent to journalists, Kawu, himself a former member of the green chamber, also commended the lawmakers for their resolve to work with President Muhammadu Buhari. He commended the 360 members of the House for unanimously passing a resolution to work for the unity of Nigeria in the face of daunting challenges and threats by certain groups. He noted that there is no better time to come out with such a strong position like now. The lawmakers resolved to work with Mr President for one Nigeria so as to take the country to the next level of development is laudable, the statement said. The House of Reps recently passed a resolution supporting the existence of one Nigeria. Photo credit: Twitter (@HouseNGR) READ ALSO: I feel for Biafrans, only God can help you now - IPOBs US coordinator He assured the lawmakers that President Buhari remains resolute and committed to bringing the change he promised Nigerians. It is our hope and belief that the house would continue to work hand-in-hand with the executive to achieve the laudable programmes and positive of this administration. We thank members of the house for their support and cooperation since their inauguration on June 9, 2015, the statement concluded. Meanwhile, Fulani herdsmen under the aegis of Miyetti Allah Cattle Breeders Association of Nigeria (MACBAN), has urged the federal government to commence probe into the activities of the Senate president, Bukola Saraki, to ascertain if he was among those sponsoring Nnamdi Kanu, the leader of the Indigenous People of Biafra (IPOB). The national coordinator of MACBAN, Garus Gololo, who made the call in Makurdi, the Benue state capital, while speaking with newsmen, noted that the activities of IPOB in recent times demonstrated that it was more of a danger to the unity of Nigeria than the clashes between Fulani herdsmen and farmers. According to him, the statement made by Saraki, faulting the proscription of the group by the federal government, was inciting and a clear signal that Saraki might be supporting the agitation by IPOB to divide Nigeria. READ ALSO: Abaribe under fire from colleagues over standing surety for Nnamdi Kanu Watch Legit.ng TV video of Nnamdi Kanu's father talking about the activities of his son as IPOB's leader: Source: Legit.ng - The Human Rights Watch (HRW) says Cameroonian soldiers torture and assault Nigerian asylum seekers in remote border areas - The human rights group accuses Cameroonian authorities of denying Nigerian asylum seekers access to the UN refugee agency - HRW says the mistreatment of the Nigerian refugees by the Cameroonians is driven by an arbitrary decision to punish them for Boko Haram attacks in the country The Human Rights Watch has accused the Cameroonian military of carrying out mass forced deportations of 100,000 Nigerian asylum seekers in an effort to stem the spread of Boko Haram. READ ALSO: Catholic priest tells FG to ban CAN, JNI The rights group in a report released on Wednesday, September 27, stated that Cameroonian soldiers have tortured, assaulted and exploited Nigerian asylum seekers in remote border areas, Premium Times reports. The document also indicted the military of denying Nigerian asylum seekers access to the UN refugee agency, and summarily deporting often violently, tens of thousands to Nigeria since 2015. HRW stated that there was violence, poor conditions, and unlawful movement restrictions in Cameroons only official camp for Nigerian refugees. PAY ATTENTION: Read the news on Nigerias #1 new app The Cameroonian military torture and abuse of Nigerian refugees seems to be driven by an arbitrary decision to punish them for Boko Haram attacks in Cameroon and to discourage Nigerians from seeking asylum, said HRW associate refugee director, Gerry Simpson. Meanwhile, the Nigeria police on Sunday, September 24, arrested a declared wanted Boko Haram terrorist Idris Babawo in Ondo state. Babawo, 42, also known as Idiko and Nagada, the police said is believed to be number 165 on the Nigerian military's Boko Haram wanted list. The spokesperson to the Nigerian army, Sani Usman, in a statement said Babawo was handed over to the 32 Brigade, 2 Division, Nigerian army, at about 2pm on Monday, September 25. You can watch this Legit.ng exclusive video of woman begging Nigerian government to rescue her husband from Boko Haram terrorists: Source: Legit.ng - Senator Abaribe has denied allegations that he was queried for standing surety for Nnamdi Kanu - Abaribe said no such thing happened as the Senate meeting was closed door and the public has no idea what happened inside - He warned that his constituency is worried over the unverified news flying about Senator Enyinnaya Abaribe has denied that he was queried by the Senate for standing surety for the leader of the Indigenous People of Biafra (IPOB), Nnamdi Kanu. Abaribe said what was discussed at the Senate on the matter was private and no newspaper has the information. He faulted a newspaper, Daily Trust, for misleading the public with a headline that claims he was queried by the northern senators for standing surety for Kanu. Recall that Legit.ng previously reported that Daily Trust indicated that Senator Abaribe was queried by his colleagues, mostly from the northern part of the country, for standing as surety for Kanu. READ ALSO: Jonathan offered me money, second term ticket to dump APC - Okorocha Abaribe, while reacting to the reports, said: "Our meeting was a closed door one. A headline like this purporting to say that this was what happened in the meeting is wrong. "I and you all know that this did not happen. My constituents have been worried and I have told them it is not true. "Daily Trust should produce who gave them this misleading information. "This report is trying to drive a wedge between northern and southern senators because it claimed northern senators made a demand which southern senators grudgingly agreed to." The deputy Senate president, Ike Ekweremadu, while corroborating Abaribe also said the meeting was a closed door one and the report of the meeting has not been made public. Ekweremadu said: "The matter was referred to committee on ethics. Publishing rumours will not help us in any way. "You all know that nothing like that happened in the meeting. What is closed door should remain so. Anything outside what the press officer says after the meeting are just rumours." PAY ATTENTION: Read the news on Nigerias #1 news app Meanwhile, the presidency has said that those who stood as sureties for Nnamdi Kanu risk imprisonment if he fails to appear in court on his next adjourned date. The special adviser to President Muhammadu Buhari on prosecution Okoi Obono-Obla said the court might also issue an arrest warrant for the IPOB leader. Obono-Obla said while the federal government has filed a motion on notice for the court to set the bail already granted Kanu, the fact that he (Kanu) has not been seen since the military exercise in his residence means he might not appear in court. Watch this Legit.ng TV video of Nnamdi Kanu's father talking about the activities of his son as IPOB's leader: Source: Legit.ng - An Ekiti state magistrate court has allegedly ordered that a certain Ahamed Kolo, a driver, be remanded in jail, for attempting to murder Governor Fayose - Kolo had allegedly attempted to murder the Ekiti state governor with his car, on September 24, 2017 - The presiding magistrate, Dolapo Akosile, reportedly ordered that the defendant be remanded till October 9, 2017 A 35-year-old driver, Ahamed Kolo, was allegedly arraigned before a magistrates court in Ado-Ekiti, Ekiti state, for attempting to murder Governor Ayodele Fayose. According to reports, Kolo had allegedly tried to kill the governor, by hitting him with his car. READ ALSO: Nigerian student studying in Bangladesh donates relief materials to Rohingya refugees Legit.ng gathers that the incident allegedly occurred at Ijigbo street in Ado-Ekiti, on Sunday, September 24. The prosecutor, Monica Ikebuilo, argued that the alleged crime contravened Section 320 of the Criminal Code, Cap C 16, Laws of Ekiti state, 2008. The presiding magistrate, Dolapo Akosile, reportedly ordered that Kolo be remanded in jail until October 9. Akosile further ordered for the case file to be duplicated and sent to the office of the Director of Public Prosecutions for legal advice. PAY ATTENTION: Install our latest app for Android, read best news on Nigerias #1 news app Meanwhile, Legit.ng previously reported that the Peoples Democratic Party (PDP) alleged that Aisha Buhari could actually plot the assassination of Governor Ayodele Fayose of Ekiti state, for exposing her secrets. The opposition party made its comments in reaction to Mrs. Buharis tweet, where she described the Ekiti governor as a mad dog, following allegations made by him that she was involved in a corruption scandal. Watch this Legit.ng TV video asking Nigerians who they would vote for in 2019- Buhari or Fayose? Source: Legit.ng By Bill Black, the author of The Best Way to Rob a Bank is to Own One, an associate professor of economics and law at the University of Missouri-Kansas City, and co-founder of Bank Whistleblowers United. Jointly published with New Economic Perspectives UMKC has just hosted a well-attended conference on Modern Monetary Theory (MMT) and job guarantee (JG) programs in which the federal government would provide the funds for employer of last resort programs. In conjunction, MMT and JG allow full employment to become the norm. MMT is based on reality, it explains how the monetary system in a nation with a sovereign currency actually functions. Most monetary theory taught in conventional economic classes is a fiction arising from carryovers from the era of the gold standard in which nations lacked a sovereign currency. Jared Bernstein has just published an op ed in the New York Times entitled Do Republicans Really Care About the Deficit. Republican elites, of course, have not really cared about federal budget deficits for decades. That is a good thing that Democrats should embrace in a bipartisan spirit. Bernstein, of course, is correct that the Republicans are hypocrites about federal budget deficits, pretending to care about them when the Democrats hold power and displaying their lack of any real care when Republicans hold power and the context is tax cuts for the wealthy. Democrats display a similar hypocrisy. Even Democrats like Bernstein who know that the Republicans proposed expansion of the federal budget deficit through tax cuts is not a real economic problem are primed to attack Republican hypocrisy by falsely asserting that the Republican deficits would harm the Nation. Democrats should embrace honesty as the best policy and stop embracing the politically attractive pose of claiming to be the Party that really cares about the federal budget deficit. That politically attractive pose is not simply dishonest and financially illiterate, it is also a trap. The Republican and New Democrat deficit strategy is to force Democrats to make an endless series of Sophies choices. Choose which excellent program to kill in order to save (temporarily) another from the chopping block because we supposedly cannot afford to provide both. Then repeat the process. The Republicans and New Democrats constantly, and falsely, claim that the federal government cannot afford to provide medical care availability that is routinely provided in most of Europe and Canada. It is a pure myth that the United States cannot afford to provide the safety net of Social Security, Medicare, and Medicaid. We need to start with first principles. In a nation with a sovereign currency like the United States, federal tax revenues do not fund federal expenditures. If that sentence, which is indisputably correct, strikes you as bizarre then it is a measure of the force of the propaganda you have been fed throughout your life. Today would be an excellent day to free yourself from the hold of that destructive lie. This web site, the Levy Institute, and Bill Mitchells sites all have excellent resources that will help you clear out the falsehoods about money that you were force fed. Money cannot be scarce for a nation with a sovereign currency. Real resources can be scarce, not a nations sovereign currency. Bernstein knows that federal tax revenues do not fund federal expenditures. His column shows that he is worried solely about realpolitik rather than real economics, conceding that deficits dont seem to hurt the economy. Do these forces mean deficits dont matter? Not at all. The problem with structural deficits ones that go up even in good times is that they reveal that were unwilling to raise the necessary revenues to support the government we want and need. This enables those who whose goal is to shrink government to point to deficits and debt as their proof that we cant afford it, whatever it is, except when it is tax cuts. We need to parse that paragraph carefully, because doing so reveals that Bernstein makes no economic argument that deficits matter. He makes only a political argument. Republicans and New Democrats whose goal is to shrink government will point to deficits and debt as their proof that we cannot afford the safety net. Of course they will. They constantly promote that propaganda. The answer to that cynical, dishonest tactic is not Bernsteins proposed strategy of embracing it and agreeing with the lies that federal budget deficits harm the economy or our children and grandchildren. Even if Democrats were to heed Bernsteins advice to base their budget policies on partisan political advantage, it is bizarre that Bernstein thinks that it would be good politics for Democrats to be known as the Party dedicated to increasing federal taxes. Bernsteins paragraph expressly makes a claim he knows is false that federal taxes provide the necessary revenues to [fund] the government we want and need. Bernstein makes an analogous criticism of Republicans. Back in 2015, I testified at a hearing on these issues before the House Budget Committee. One after another, Republican members on the committee denounced rising debt levels. Why then, I asked, do you want to cut taxes? Their answer: Its spending, not tax cuts that increases the deficit. That, of course, is crazy. I dont mean its bad economics, or lousy fiscal policy. I mean its disconnected from reality, or more precisely, from arithmetic. Bernsteins crazy claim that federal taxes provide necessary revenues is even more disconnected from reality than the Republican statements he rightly denounces. Worse, Bernstein doubles and then triples down on this claim. Do these forces mean deficits dont matter? Not at all. The problem with structural deficits ones that go up even in good times is that they reveal that were unwilling to raise the necessary revenues to support the government we want and need. This enables those who whose goal is to shrink government to point to deficits and debt as their proof that we cant afford it, whatever it is, except when it is tax cuts. Note Bernsteins critical concession federal elected officials are often unwilling, not unable to provide the government we want and need. Even Bernsteins sentence that makes this critical concession, however, doubles down on the crazy notion disconnected from reality that tax revenues fund government expenditures. Bernstein closes his column by tripling down on this falsehood. We need a functional government that raises ample revenues to meet the challenges we face, including an aging population, climate change (and the intense disasters it increasingly causes), inequality, poverty and the winds of geopolitical upheaval. No, we do not need high taxes to raise ample revenues to meet these challenges. Bernsteins taxation recommendations are bad politics and bad economics. They are so disconnected from reality [and] arithmetic that they are crazy. What Bernstein is right about is that the Trump tax and revenue cut plans will increase the federal budget deficit and, vastly more importantly, that they will cause inequality to surge, harm the poor, and intensify CEOs already perverse incentives. Democrats have valid, powerful arguments against Trumps tax cuts. Those are the arguments they should make. One of Earths Largest Living Organisms Is About to Have Its Genome Sequenced Motherboard (David L). Surprised this hasnt been done already. CONFIRMED: A Huge Gravitational Wave Announcement Is About to Happen Science Alert (David L) Why Your Orange Juice Might Be From Brazil: Floridas Trees Are Dying Wall Street Journal Forget Countdowns Climate Catastrophe Has Started in the High Mountains of Asia The Wire (J-LS) Armed with wet sacks, Indias poorest try to beat extreme heat Reuters The Answers To Climate Change Are Here They Arent Telling You! Lee Camp, YouTube End-of-life chatbot can help you with difficult final decisions New Scientist (Dr. Kevin) IF DATA IS THE NEW OIL, ARE TECH COMPANIES ROBBING US BLIND? Digital Trends The real gender gap: Young men falling behind women in everything but STEM subjects Montreal Gazette (Liam) Saudi Arabia driving ban on women to be lifted BBC. Note that contrary to the story above, women do better than men in math and science in high school in the Middle East. North Korea Arun Jaitley May Be the Fall Guy, But Modi Is Truly to Blame for Indias Economic Slowdown The Wire (J-LS) Rohingya Crisis: Focus on Intolerant Religion Disregards Complex Moral and Policy Challenges Engage A Tax Cut for Cleaning? Italians Take Up Bartering in Stagnant Economy Wall Street Journal Brexit Theresa May took dictation from Brussels in keynote EU speech when she agreed to pay Brexit divorce bill Telegraph Brexit Conundrum: What to Do With Thousands of Derivatives Contracts Wall Street Journal (Li). Note it would serve the EU to create doubt as to whether an overall agreement will be reached so as to encourage new contracts to be signed with EU rather than UK banks. Labour preparing for run on the pound, admits Corbyn The Times. The stock market was also supposed to crash if Trump won Fears for 4,000 British jobs as Bombardier hit with 219pc US tariffs in subsidy dispute Telegraph. So much for Mays expectation of getting a great trade deal with the US. Macron calls for new EU strategic culture Politico AfD politician says Germany should stop atoning for Nazi crimes Defend Democracy New Cold War Big Brother is Watching You Watch Trump Transition UserFriendly: Looks like enlisted men cant support DSA: Seeking IMMEDIATE counsel w/background in military law to rep servicemember re use of social media to support @DemSocialists. DMs open. DSA Legal ?? (@DSA_law) September 27, 2017 Moore wins Alabama primary The Hill. As my mother who lives in Alabama says, There are a lot of crazies running around, but hes the worst. I hope like hell the Democrats beat him in December. Nine Thoughts After the Alabama Senate Runoff Inside Elections (UserFriendly) Moores win spells trouble for GOP establishment in 2018 Politico Corker to end Senate career with this term The Hill GOP Tax Plan to Allow for Top Individual Rate Above 35% Wall Street Journal Please watch the video. This is a disgrace: I know that leaders arent supposed to cryBut we are having a humanitarian crisis here, San Juan mayor tells @DavidBegnaud pic.twitter.com/pa7Hd6HZ1n CBS News (@CBSNews) September 26, 2017 US wont waive shipping restrictions for Puerto Rico relief The Hill New Mexico governor wants politicians off investment council Associated Press. This a an about face resulting from International Business Times reporting. The Feds Actually Expect Wall Street Bankers to Police Themselves Vice. Ahem, the Republicans know exactly what they are doing, which is creating an excuse to cut CFTC funding and lower banks cost of doing business fines. A twofer! Feds Yellen says gradual hikes should continue, despite weak inflation Reuters (UserFriendly) Is CalPERS Going Private? El Cerrito Progressives Should We Move to a Mostly Cashless Society? Wall Street Journal (Li). Even the cash defender wants to get rid of $100 bills to reduce criminal activity. What about people who want to keep a stash for emergencies? During Sandy, there was no power in the dark zone for the better part of a week, so no Internet transactions were possible. I know well off people in August and September 2008 who pulled $50,000 out of their banks because thought a bank holiday was a real possibility. Global economy at risk a decade on from financial crisis, says WEF Guardian Class Warfare Antidote du jour. Stephen L: When you lied on your resume about having sheep herding experience And a bonus (furzy): See yesterdays Links and Antidote du Jour here. (Natural News) As more and more medical devices become connected to the so-called Internet of Things, hospitals and patients are being put more at risk of cyber attack by hackers, say experts at a recent cybersecurity forum discussing the rising threat. Medical care is the next cyber warfare, said technologist Janine Medina during a panel discussion last week held by the Atlantic Council, in an appearance with a number of other experts to talk about how Internet of Bodies poses potentially grave health risks that will require innovative regulatory solutions and intervention. The panel discussion comes amid a number of high-profile hacking incidents and attacks involving IoT devices, as well as a major leak of personal data obtained via a successful hack of the Equifax company, a credit rating agency, in July. According to Medina and co-panelist Andrea Matwyshyn, putting more Internet of Things devices into more patients is exposing them to never-before-experienced health risks for which they, along with hospitals, medical providers, health insurers, and the federal government are not yet prepared to deal with. The IoT, which is a reference to the scores of devices that rely on being connected wirelessly to the Internet in order to function properly, includes everything from home thermostats and appliances to computers and even alarm clocks. A recent analysis estimates that by 2020, more than 20 billion devices will be connected to the IoT and many of them are going to be medical devices. Matwyshyn said many healthcare industry devices will be body-related some medical in nature, and some not. Devices may be as trivial as a FitBit-type fitness tracker or as complex as an antenna, like the one artist Neil Harbisson had implanted into his skull so he could hear color. But more practically, IoT medical devices that directly affect patient health and patient care are what worry experts most in terms of hacking pacemakers, IV machines, and devices that push medications. (Related: Security Flaw: Smart Drug Syringes Found To Be Hackable) As the Washington Free Beacon reports further: The increasing prevalence of body-connected devices prompted Matwyshyn to develop her concept of the Internet of Bodies, referring to all of the internet-connected bodily devices, from heart monitors to pacemakers. As medicine and recreation both grow to increasingly depend on internet-connected body devices, she said, it will face novel legal and security challenges. The legal and technological challenges of the Internet of Things will transfer into this Internet of Bodies, particularly the challenges weve faced with respect to rampant security vulnerabilities in the Internet of Things, she said. Of particular concern to cybersecurity experts is the ease in which IoT equipment can be appropriated by hackers into what are called botnets. These are utilized to dramatically bolster processing power needed to attack websites. Last fall, the Mirai botnet attack temporarily crushed major sites like Twitter, PayPal, and Spotify, mostly by using a swarm of IoT devices. The Internet of Bodies, though, poses special hazards, the experts noted. The Internet of Bodies will for the first time mean that software will start causing physical harm to human bodies with some regularity, and this is a new step for law, in particular, to deal with, and to resolve the harms that will result from that, Matwyshyn said. Its one thing to hack a kitchen device, but its another thing entirely to hack a body part like a heart or a liver. As for who would exploit such a vulnerability, its hard to say at this point. Ultimately, any vulnerability can be exploited by anyone who can write the code, regardless of what their intentions are, Matwyshyn said. Experts have called on industry and government to team up to find security solutions for IoT- and IoB-related devices. J.D. Heyes is a senior writer for NaturalNews.com and NewsTarget.com, as well as editor of The National Sentinel. Sources include: FreeBeacon.com NaturalNews.com (Natural News) Hang on to that bag of coffee beans in your kitchen: a team of researchers estimated that the coffee-growing regions of Latin America will undergo a significant decline by 2050 due to environmental changes. In their study, published in Proceedings of the National Academy of Sciences, they predict that coffee-suitable areas can shrink by as much as 88 percent, threatening the livelihoods of millions of people involved in coffee production. All is not lost, however. The researchers have suggested one simple solution to put a stop to this scenario: save the bees to save coffee. Compared to past models that assessed the potential decline in coffee production, this is the first to have taken bees and other pollinators into account. We modeled the potential distributions of coffee and coffee pollinators under current and future climates in Latin America to understand whether future coffee-suitable areas will also be suitable for pollinators, they wrote in their study. Based on their findings, the researchers gauged a 20 percent increase in coffee crop yield when the local bee populations thrived. Lands no longer suitable for coffee growing would still do well if the farmers in those areas switched to crops that were suitable for bees of different species. In fact, the researchers themselves stated that managing the land and bees in a practical manner could offset the possible losses of dwindling coffee crops. Placing materials to support pollinators, like shade trees and nesting, would help as well. (Related: Declining pollinator populations threaten future crops, ecosystems) Study co-author and Smithsonian Tropical Research Institute senior scientist David Roubik cited one example wherein bee diversity positively impacted the environment. When Africanized honey bees were first released into the wilds of Brazil in 1957, the incident caused an uproar. People anticipated an upset in the balance between plants and native pollinators due to the presence of Africanized honey bees. As Roubik eventually found out, that wasnt the case. Plants that had been pollinated by Africanized honey bees such as those in lowland tropical forests flourished and produced more flowers, resulting in there being more nectar and pollen for the native bee population. The importance of bees Our daily cup of coffee isnt going to be the only beverage or food to disappear if the bees do. According to the British Beekeepers Association, about one-third of our food is dependent on pollinators, and bees themselves can pollinate upwards of 70 types of crops; a single colony of 50,000 bees can pollinate about 4,000 square meters of fruit trees and produce an average of 14 kilograms of honey. Pollination itself is a very important process to flowering plants as its how these plants supply us with the fruits and vegetables we consume. Pollen grains are transferred from the anther or male part of the plant to the stigma or female part either by the weather or by animals. These animals include birds, bats, and insects like honey bees, which are responsible for pollinating almonds, squash, apples, and broccoli. Even proud meat eaters need pollinators since the livestock that eventually becomes pork, beef, and chicken feeds on plants. So whether youve embraced the vegan lifestyle or are an avowed carnivore, you need bees to eat. Honey bees have been described as the perfect pollinator because of their anatomy. Everything from their wings to their antenna to their mouths have evolved to help them maximize nectar and pollen collection. While they can be replaced by other pollinators like bumblebees, hoverflies, and butterflies, they can never be matched in terms of sheer efficiency. If youd like to read up on more stories discussing the importance of bees to our food supply and more, simply go to Bees.news today. Sources include: ScienceDaily.com PNAS.org BBC.co.uk (Natural News) The slogan on the Whole Foods website says, Eat real food. Sure. Then at the top of the home page they claim, Were growing something good. Really? Since when is rapeseed good? Most of the signature Whole Foods brand 365 products contain rapeseed oil (also known as Canadian Low Acid Oil or canola for short). All canola oil needs to be thrown under the bus with every other blood-clogging food stuff product created in a laboratory, including margarine and genetically modified soybean, corn and palm oils. Most canola is chemically extracted using hexane, a highly flammable and carcinogenic solvent thats a constituent of gasoline. Yep, gasoline. Why? Rapeseed oil stinks and is toxic to all animals, including humans, so the crooks and scoundrels at the FDA had to approve a process to deodorize the funk and slide rapeseed under the radar of intelligent U.S. consumers (and the not-so-smart ones too). This process completely destroys the omega-3s and creates trans fats. Everybody and his brother knows the evil and destructive qualities of trans fats by now. Even if canola oil is expeller-pressed and organic, it still coagulates in your blood like margarine and beef fat. Take a bottle of canola oil and pour it into a bowl or an open container, then leave it sitting outside for a few weeks and watch what happens. It coagulates. Here is a consumer who tried it. Watch what happens in this short video. Could mass canola consumption be ushering in a mass epidemic of Americans who will suffer from heart disease and Alzheimers? Who will know to blame canola when they cant breathe properly or even remember their immediate relatives? Toxic canola doubles as a powerful insecticide and is listed as an ingredient in over 50 percent of the packaged products at Whole Foods Market. Along with other mainly genetically mutated oils like corn, soybean and palm, canola oil is brutal on your health. You should be very concerned about the dangers of consuming canola regularly. All of the deodorized oils contain trans fats. In fact, deodorization is the final step in refining ALL vegetable oils. This deodorizing step involves subjecting the oils to temperatures above 450 degrees Fahrenheit for long lengths of time just to attempt to remove some of the volatile compounds, but some still remain and can have adverse effects on blood cholesterol. Look for toxic, blood-clogging canola, organic or not, in these popular products at your local Not-So-Whole Foods Market Almost every brand of bagged potato chips, veggie chips, tortilla chips, etc. Frozen, seasoned pre-cooked vegetables. Nearly every salad dressing, including the organic ones. Almost every single mixed salad at the prepared food bar, including potato salad, egg salad, chicken salad and pasta salad. Most of the boxed cereals, including organic and 365 granola blends. Nearly every sauce, including mayonnaise, buffalo, hot sauces, Asian, etc. Just about every single protein bar and fruit bar. Jeff Bezos, Amazon.com, the Washington Post rag and Not-So-Whole Foods Market a conglomeration of fake supplements, fake news and fake food Jeff Bezos, the filthy rich globalist and king of fake news now owns Whole Foods. Do you really believe Whole Foods will label all their GMOs by 2018? Even the CEO manipulates every believer behind closed doors, helping Big Food and Biotechnology hide the truth by supporting the bill that shot down the nationwide GMO-labeling campaign, and annihilated a few states efforts that were already set to be stamped and delivered as such. On the Whole Foods Market (WFM) website it states, At Whole Foods Market, we believe you have the right to know whats in your food. Genetically Modified Organisms (GMOs), also referred to as products of genetic engineering, are organisms whose genetic makeup (DNA) has been altered in a way that does not occur naturally. Yet 90 percent of canola oil in the USA is genetically modified, and there is not one single mention of this dangerous ingredient at the Whole Foods prepared food bar, plus its in most of their packaged goods. Wait, though, it gets worse. The CEO of Whole Foods supports hiding GMOs in food all while the store pretends to advocate disclosing what is in their products. Make up your mind people! Whole Foods CEO Walter Robb CAUGHT LYING to customers while supporting the Monsanto-backed GMO fake labeling bill While WFM promoted labeling GMOs all across social media, the sneaky crook of a CEO sat on a committee and commended the FAKE labeling bill that would make identifying GMOs even more difficult for consumers. Why? Because WFM loads up the majority of their foods with raw materials that come from GM Frankencrops, and it saves them money and increases their profits, all at the expense of the health of their shoppers. Make no mistake, WFM is in bed with Monsanto and the globalist regime to sicken Americans and profit from their health demise and stupidity. The new QR code is nothing less than machine language to keep consumers in the dark about whats in their food. The new label is not even readable to humans. Walter Robb is a Monsanto shill in sheeps clothing. Want proof that WFM CEO Walter Robb supports hiding GMOs? Watch this Aspen Institute video where he commends the fake labeling bill. Its a long conference so you can jump to the part where he sells out every WFM customer beginning at the 36 minute mark. He talks like a Monsanto operative, claiming the Vermont labeling law is too complex for Americans to figure out. Yeah, none of us know what GMO means! It means youre eating bug killer and weed killer. Heres the brunt of what the Monsanto shill said: My view on the bill is that, and Im pretty intimately aware of it, is that I think its an incredible thing that Sen. Stabenow has put together with Sen. Robert, when you take a look at the atmosphere up there on Capitol Hill, that this much was accomplished together. See, that liar didnt think the world would see this video. He figured just the gurus who invest in WFM, chronic sick care medicine, and biotechnology. Walter Robb is a huckster and a charlatan who praises giving manufacturers the choice of whether or not to label pesticide-laden Frankenfood. The solution? Boycott Whole Foods Market entirely. Never shop there again. Odds in Vegas have it that theyll never label all the GMOs in their store because it would undermine all their corporate suppliers and cut profits. Period. End of sad WFM story. Sources for this article include: TruthWiki.org NaturalNews.com HSPH.harvard.edu FoodScience.news NaturalNews.com NaturalNews.com Press Release Steviva Ingredients is ushering in a new name and image that allows the company to expand past sweeteners and into other natural food ingredients. Effective today, Steviva Ingredients will be known as Icon Foods and is reflective of the companys strategy to support industry demand for consistent, dependable, clean-ingredient sourcing. The organization will also be forming a new integrated business unit called Icon Food Science which optimizes its research and development offerings and expertise. When I started the company in 1999, the name Steviva Brands was selected to build a consumer brand, said Thom King, president and CEO of Steviva. The strategy behind the name was to create name association with stevia. The B2B side of the company, Steviva Ingredients, was being pigeon holed into stevia when it has grown past stevia. The rebrand builds on the companys emphasis on food safety and marks its continuing support of manufacturers in bringing clean, healthy food and beverages to the global market. As the global demand for natural sweeteners has increased, so too has challenge of sourcing reliable, safe ingredients, said King. We differentiate ourselves from other suppliers on the basis of quality, reliability and professionalism. Ensuring the highest possible standards for quality control and food safety drives everything we do and Icon Foods reflects that. The name change will apply to Icon Foods ingredients entity only and will not affect the companys retail and consumer branding which will continue on as Steviva Brands. Visit Icon Foods at Supply Side West, Booth #C130, Mandalay Bay, Las Vegas, NV, September 27-28, 2017. Health officials in California are struggling to contain fierce outbreaks of hepatitis A among homeless people and drug abusers in three counties, including San Diego, where at least 17 people have died. Hundreds more have become ill and been hospitalized, mostly in the San Diego area, often not far from tourist destinations. The disease also has cropped up farther north in Los Angeles and Santa Cruz counties. Poor access to restrooms and sinks in homeless encampments is largely to blame. Public health officials say the crisis has caught them off guard because it's rare for the disease to spread so rampantly when it isnt tied to a common source, such as a tainted food product. Meanwhile, as cases mount with no end in sight, critics fault authorities' response as lethargic. The California Department of Public Health says San Diego County's is "the largest outbreak in the U.S. that is not related to a contaminated food product" since the U.S. first introduced a vaccine for hepatitis A in 1995. "This is an unprecedented outbreak," said Dr. Wilma Wooten, the county's public health officer and director of Public Health Services for the San Diego County Health & Human Services Agency. "This is new territory." Wooten, who earlier this month declared a public health emergency, said about 65 percent of the 461 people known to have contracted the liver-attacking virus in San Diego County since last November through Tuesday are homeless and/or illicit drug users. Under the direction of the county health department, the city is now power-washing heavily soiled sections of downtown sidewalks and streets with a bleach solution. Earlier this month, the county installed about 40 portable hand-washing stations throughout the downtown areas hardest hit by the virus. Also this month, city officials announced plans to add restrooms to downtown areas. And Los Angeles County announced that 10 cases had been identified among homeless people either on the streets or in shelters. Half of those patients had been to the San Diego or Santa Cruz areas, but at least two cases were locally acquired. In Santa Cruz County on the Northern California coast, about 70 people, mostly homeless or drug users, have been diagnosed since last April. Hepatitis A is a highly contagious but typically mild illness and often does not require treatment. It does not cause chronic liver disease, as do hepatitis B and C, and is rarely fatal. But among those with existing liver disease and other illnesses common among the homeless, it can cause an acute liver infection and death. The best way to prevent hepatitis A is to get vaccinated, according to the federal Centers for Disease Control and Prevention. Hepatitis A is usually spread when a person ingests fecal matter from an infected person even in microscopic amounts, according to the CDC. That can happen when an infected person doesn't wash his or her hands after defecating and then contaminates objects, food or water with which another person comes into contact. Once the virus gains a foothold in a crowded homeless community lacking enough restrooms and sinks, it can spread easily. It can also spread through sexual contact, according to the CDC. Leslie, 42, who asked that her last name not be used to protect her privacy, said she's been camping out on San Diego's streets for five years. She became ill with the virus last spring and was hospitalized. "It was awful," she said. "My skin was yellow, my pee my urine it looked like chocolate milk. And everything just hurt. I was achy all the time and tired. I couldn't sleep enough." It took Leslie more than two months to fully recover but, she says, she's grateful to have survived. The California Department of Public Health said it has no protocol on how best to deal with large outbreaks of this kind. However, state officials say they are consulting with the CDC and other states and working with county health authorities "to identify strategies that may be effective." In 2014, there were an estimated 2,500 cases of acute hepatitis A infections nationwide, according to the CDC. Michigan is currently experiencing a large hepatitis A outbreak, as well, apparently spread in part through intravenous drug use and sexual contact. At least 14 people have died. Also escalating this year are hepatitis A infections among men who have sex with men in Colorado and New York City, and other cities worldwide, according to California health officials. Slowing the spread among homeless people isn't easy. Hepatitis A has a long incubation period before a person shows symptoms between 15 to 50 days, in which a person can be infectious but not know it. What's more, not everyone who becomes infected shows symptoms, such as fever, fatigue, loss of appetite, nausea, vomiting, abdominal pain, dark urine, jaundice and joint pain. The transience of the homeless population makes it challenging to educate and vaccinate people once an outbreak happens. "This outbreak has really resulted in us needing to be creative and utilize strategies different from what we've utilized in the past," said Wooten of San Diego County. But critics say health officials have been too slow to act, especially to install toilets and sinks. "This whole crisis is man-made," Michael McConnell, a La Jolla, Calif., coin dealer and advocate for homeless residents, told the San Diego Union Tribune in a story published Monday. "The response is certainly much too late, based on when they knew they had a serious problem. Even today, all they've done is the most easy stuff. They have taken zero bold action." Some told the newspaper that the reaction is symptomatic of a lackluster response to the problems of poor and homeless people in their midst. The city and county of San Diego deny any unnecessary delays in handling the outbreak. Countywide, nearly 23,000 people have received vaccinations against the virus. "We'll continue to do whatever it takes to address this," said San Diego spokeswoman Katie Keach. Public health workers now are working with homeless outreach teams who have long-established ties to those living on the streets or in the wildlands of San Diego County. "We go into the canyons, we go everywhere," said Amy Gonyeau, chief operating officer for the Alpha Project, a nonprofit that provides homeless services. "We go out every day. We have our own vehicles and vans we educate people on what's going on." On a recent morning, an Alpha Project team delivered hygiene kits soap, hand sanitizer and other toiletries packaged in clear plastic bags to a crowded encampment in downtown San Diego's East Village neighborhood. Tents and shopping carts line the sidewalks in this section of downtown that's largely hidden from the city's tourists. "It looks like a war zone," said Larissa Wimberly, an outreach supervisor for Alpha Project. "There's people out here with HIV, people out here with cancer, there's people out here with heart issues. There are people who are just old and feeble and they're not eating right. It's really sad." As Wimberly rides shotgun in a large, white Alpha Project van driven by her colleague Cain Mariscal, she points to the myriad tents and shopping carts. Behind and between them, she says, many residents relieve themselves. "It's everywhere," she says of excrement. "It's just really bad right now." This story was produced by Kaiser Health News, which publishes California Healthline, an editorially independent service of the California Health Care Foundation. Exposure to Agent Orange sprayed during the Vietnam War has been linked to increased levels of certain hormones in women and their breastfeeding children decades later, potentially putting them at higher risk of health problems, according to a new study in Science of the Total Environment. Previous research has shown a link between exposure to herbicides that contain chemicals called dioxins - such as Agent Orange - and prostate cancer in men. The new study, by researchers at Kanazawa University in Japan, reveals for the first time the impact of dioxin exposure on women and babies. "Dioxin hotspots in the South of Vietnam are of the most severely polluted regions in the world," said Prof. Teruhiko Kido, lead author of the study from Kanazawa University, Japan. "We know exposure to dioxins has an impact on our hormone levels, and we wanted to know if this was being passed through generations and potentially putting babies at risk in these areas." Agent Orange is one of the dioxin-contaminated herbicides that were sprayed during the Vietnam War and used in different industrial and agricultural activities. Their use has resulted in hotspots of dioxin contamination, with concentrations of the chemical two to five-fold higher in affected areas in southern Vietnam than in non-contaminated regions. Dioxins are endocrine-disrupting chemicals (EDCs) - they interfere with how hormones send messages to each other around the body. EDCs have been implicated in causing birth defects, cancer and neurodevelopment disorders. In particular, dioxins have an effect on a hormone called Dehydroepiandrosterone (DHEA), which is responsible for male and female characteristics in humans. Dioxins put these out of balance, leading to health problems and disfigurement. "Decades of industrial development and chemicals released during the Vietnam War have led to high levels of dioxins in the soil and atmosphere and people are absorbing these chemicals from the food they eat and the air they breathe," said Prof. Teruhiko Kido. "We know dioxins have an impact on our hormones, so we wanted to see whether they were being passed from mother to baby." In the new study, the team assessed 104 women with their newborn babies from two carefully selected locations. They chose a region in northern Vietnam, which was not occupied by the United States Air Force, and Bien Hoa, an industrial city where the Americans stored approximately 50% of Agent Orange and where there were at least four leaks in 1969-1970. Despite the natural elimination of dioxins in the past five decades, environmental and human samples around this area still contain high levels of the chemical. The scientists analyzed the level of dioxin in the mothers' breast milk, and tested non-invasive samples of saliva from the babies for levels of the hormone DHEA. The results showed a nearly three-fold increase in DHEA in babies from the dioxin hotspot compared to non-contaminated regions. This was linked to dioxins being transferred from mother to baby through their umbilical blood and breast milk. "Our study confirms how sensitive and vulnerable children are to the environmental toxins their parents and even earlier generations have been exposed to," said Prof. Kido. "There is a lot we still don't know about what this means for children's health and what the long term impact could be, but studying people in these dioxin hotspots gives researchers the chance to understand the implications better." Prof. Kido and the team plan to follow the children in the study up to the age of 10 to assess more accurately the endocrine impact of dioxin exposure during pregnancy and early life. A central aspect of life sciences is to explore the symbiotic cohabitation of animals, plants, and humans with their specific bacterial communities. Scientists refer to the full set of microorganisms living on and inside a host organism as the microbiome. Over the past years, evidence has accumulated that the composition and balance of this microbiome contribute to the organism's health. For instance, alterations in the composition of the bacterial community are implicated in the origin of various so-called environmental diseases. However, it is still largely unknown just how the cooperation between organism and bacteria works at the molecular level and how the microbiome and body exactly act as a functional unit. An important breakthrough in deciphering these highly complex relationships has now been achieved by a research team from Kiel University's Zoological Institute. Using the freshwater polyp Hydra as a model organism, the Kiel-based researchers and their international colleagues investigated how the simple nervous system of these animals interacts with the microbiome. They were able to demonstrate, for the first time, that small molecules secreted by nerve cells help to regulate the composition and colonization of specific types of beneficial bacteria along the Hydra's body column. "Up to now, neuronal factors that influence the body's bacterial colonization were largely unknown. We have been able to prove that the nervous system plays an important regulatory role here," emphasizes Professor Thomas Bosch, evolutionary developmental biologist and spokesperson of the Collaborative Research Centre 1182 "Origin and Function of Metaorganisms", funded by the German Science Foundation (DFG). The scientists published their new findings in Nature Communications today. The research team, led by Bosch, use the freshwater polyp Hydra as the model organism to elucidate the fundamental principles of nervous system structure and function. Hydra represent an evolutionary ancient branch of the animal kingdom; they have a simple body plan with a nerve net of only about 3000 neurons. Applying modern experimental technology to these organisms that, despite their simplicity, still share a large molecular similarity with the nervous systems of vertebrates, enabled identification of ancient and therefore fundamental principles of nervous system structure and function. Genetics & Genomics eBook Compilation of the top interviews, articles, and news in the last year. Download a copy today Using this model organism, the researchers from Kiel University addressed the question of how messenger substances produced by the nervous system, known as neuropeptides, control the cooperation and communication between host and microbes. They collected cellular, molecular and genetic evidence to show that neuropeptides have antibacterial activity which affects both the composition and the spatial distribution of the colonizing microbes. In order to reveal the connections between neuropeptides and bacterial communities, the Kiel-based researchers first concentrated on the development of the freshwater polyp's nervous system, from the egg stage through to an adult animal. Cnidarians develop a complete nervous system within about three weeks. During this developmental time, the bacterial communities covering the animal's surface change radically, until a stable composition of the microbiome finally forms. Under the influence of the antimicrobial effect of the neuropeptides, the concentration of so-called Gram-positive bacteria, a subgroup of bacteria, decreases sharply over a period of roughly four weeks. At the end of the maturing process, a typical composition of the microbiome prevails, particularly dominated by Gram-negative Curvibacter bacteria. Since the neuropeptides are particularly produced in certain areas of the body only, they also control the spatial localization of the bacteria along the body column. Thus, in the head region, for example, there is a strong concentration of antimicrobial peptides, resulting in six times fewer Curvibacter bacteria than on the tentacles. Based on these observations, the scientists concluded that throughout the course of evolution the nervous system also participated in a controlling role for the microbiome, in addition to its sensory and motor tasks. "The findings are also important in an evolutionary context. Since the ancestors of these animals have invented the nervous system, it seems that the interaction between the nervous system and the microbiome is an ancient feature of multicellular animals. Since the simple design of Hydra has great basic and translational relevance and promises to reveal new and unexpected basic features of nervous systems, further research into the interaction between body and bacteria will therefore concentrate more on the neuronal aspects," said Bosch, to summarise the significance of the work. Source: http://www.uni-kiel.de/pressemeldungen/index.php?pmid=2017-294-nerven-bakterien&lang=en CAIRE Inc. (CAIRE), the manufacturer of the AirSep, CAIRE and SeQual brands of wearable, portable, and stationary oxygen concentrators, has appointed Altra Service Professionals, as the Authorized Service Center serving customers in New Jersey and the New England states. Altra Service Professionals will perform both warranty and non-warranty service for CAIRE products from their facility in Berlin, CT. Altra has been performing non-warranty repairs of our products for many years and were a natural fit to bring on board in support of our warranty repairs. They have experienced technicians who were confident will perform high quality repair work and represent CAIRE well, said Miguel Cervantes, Service Manager. Robert DeChello, President and co-owner of Altra, believes this strategic relationship with CAIRE is important for providers and customers in the region hell be supporting and provides growth opportunities for both Altra and CAIRE. In an industry where reimbursement continually shrinks, dealers are always looking for ways to cut costs without sacrificing quality of care. This relationship with CAIRE enables us to do this by providing exceptional training and processes so that we can provide efficient and affordable repair solutions. We are honored to have been chosen by CAIRE as the Authorized Service Center for the northeast and look forward to supporting our customers. Robert DeChello, President and co-owner of Altra The Berlin, CT, location will be entrusted with the repair of wearable, portable, and stationary concentrators for Maine, New Hampshire, Vermont, Massachusetts, Rhode Island, Connecticut, and New Jersey. The National Institutes of Health has awarded a five-year $9.6 million grant to the Center for Infection and Immunity (CII) at Columbia University's Mailman School of Public Health to create the Center for Solutions for Myalgic Encephalomyelitis/ Chronic Fatigue Syndrome (CfS for ME/CFS), an inter-disciplinary, inter-institutional research group dedicated to understanding the biology of the disease in order to develop effective means to diagnose, treat and prevent it. This Center will be one of three ME/CFS Collaborative Research Centers (CRCs) that will be awarded, together with a Data Management and Coordinating Center (DMCC). As many as 2.5 million Americans have ME/CFS, a debilitating disease characterized by extreme fatigue after exertion that is not relieved by rest, and other symptoms, including muscle and joint pain and cognitive dysfunction. There are no laboratory tests for diagnosis or specific treatments for ME/CFS. The CfS for ME/CFS is led by W. Ian Lipkin, director of CII and John Snow Professor of Epidemiology at the Mailman School and is one of the NIH's ME/CFS CRCs for ME/CFS research. The CRCs will each conduct independent research but will also collaborate on several projects, forming a network to help advance knowledge on ME/CFS. The data will be managed by a Data Management Coordinating Center and will be shared among researchers within the CRCs and more broadly with the research community. (Read the NIH announcement.) The CfS for ME/CFS grant will be managed by the NIH's National Institute of Allergy and Infectious Diseases (NIAID), together with a Steering Committee made up of the Directors of each CRC and the DMCC and other Program Officers who are part of the Trans-NIH ME/CFS Working Group. Research Aims The CfS for ME/CFS will pursue basic research and develop tools to help physicians and individuals with ME/CFS monitor the course of illness. In laboratory studies, the researchers will use state-of-the-art methods to analyze molecular footprints of potential bacterial, fungal, and viral triggers, together with corresponding immune responses, including autoantibodies. Other studies will analyze metabolites and gene expression in individuals with ME/CFS after physical activity, and mine databases for insights into clinical features, comorbidities, and sub-types that could refine laboratory analyses and enhance their care. ME/CFS scientists will also work with the ME/CFS community, including clinicians and people with ME/CFS, to design a mobile app called myME/CFS that will allow them to track symptoms in response to stressors and interventions. Aggregated data from the apps may yield insights into triggers that initiate or exacerbate disease, including links between infection and disease in a subset of patients. Overall, the CfS for ME/CFS studies may lead to the future development of animal models of ME/CFS and/or clinical trials of antibiotics, pre- and probiotics, antifungals, antivirals or immunomodulatory treatments. Outreach and Partnership With the ME/CFS Community The CfS for ME/CFS will work closely with ME/CFS community through partnerships with the Solve ME/CFS Initiative, #MEAction, and the Microbe Discovery Project, representatives from which will be represented on the Center's Scientific Advisory Board and a separate Community Advisory Committee. CfS for ME/CFS will also engage with the ME/CFS community and disseminate findings, including its own and those from the other ME/CFS CRCs and share research presentations, both online and through social media. In addition, CfS for ME/CFS will solicit input from the community in developing the careers of junior scientists to forge lasting connections between the two groups. "One of our goals is to dissolve barriers between scientists, clinicians, individuals with ME/CFS, and advocates," says Dana March, assistant professor of Epidemiology at the Mailman School and deputy director and administrator of CfS for ME/CFS. "By connecting with the global digital ME/CFS community, we aim to increase the visibility and reduce the stigma of what many have described as an invisible population." Leading Clinicians and Scientists Other members of CfS for ME/CFS include clinicians Lucinda Bateman (Bateman Horne Center), Anthony Komaroff (Harvard University), Susan Levine (New York City), Jose Montoya (Stanford University), Daniel Peterson (Sierra Internal Medicine), as well as laboratory-based investigators Oliver Fiehn (University of California, Davis), John Greally (Albert Einstein College of Medicine) and Mady Hornig (Columbia University). Many in the group have a history of research collaborations, including an NIH-funded study led by Ian Lipkin that ruled out XMRV (xenotropic murine leukemia virus-related virus) as a trigger for ME/CFS; studies funded by Hutchins Family Foundation through its Chronic Fatigue Initiative that uncovered immune evidence of biological disease, disease stages, subtypes of ME/CFS, and disturbances of fecal microbiota; and research supported by the Microbe Discovery Project, a crowdfunding effort, to explore the role of infection, immunity and the microbiome in ME/CFS and to identify biomarkers. "The pace of research has increased, thanks largely to advocacy by the ME/CFS community and the generous support of the Hutchins Family Foundation," says Lipkin. "We are grateful to NIH for recognizing the potential of this ME/CFS CRC to capitalize on this momentum, bringing together the very best clinical and scientific talent and technology to do work needed to turn a corner on this disease." A new study has found that one in every six persons diagnosed with HIV is over the age of 50 years. This new study was published yesterday (26th September 2017) in the journal Lancet HIV. Anatomically correct HIV Virus floating in the bloodstream. 3D Illustration. Image Credit: Spectral-Design / Shutterstock Statistics show that over the last decade (between 2004 and 2015) the diagnosis of HIV among populations has increased by 2.1 percent yearly among those in their fifties. In 2015, the study showed that the persons with HIV and over the age of 50 were 17.3 percent of all the new cases of HIV diagnosed in Europe. Sexual health programs are mainly targeted towards younger populations at present. According to experts, this age group should also be recognized to be at risk and these programs should also address this age group. Lara Tavoschi, a scientific officer at the European Center for Disease Prevention and Control (ECDC), who led this latest study, said that the new findings show the new direction in which the HIV epidemic is moving towards. She said the older adults are at risk. They are infected mostly via heterosexual routes she said and this calls for increasing awareness among this population. For this study the team looked at HIV surveillance data from 31 countries. And they collated the data in the European Surveillance System between 2004 and 2015. The ECDC analyzed all the new HIV cases among persons over the age of 15 years. They found that the rates of diagnosis of HIV among persons over the age of 50 have increased in 16 countries that include Germany, Ireland and Belgium. The rates were highest in Estonia, Latvia and Malta. In these countries 7 new cases were detected per 100,000 older adults by 2015. In these countries the numbers for those aged between 15 and 49 were also discouraging. There has been a decrease in numbers of new HIV cases among these older adults in only one country Portugal. There was a decrease in new HIV cases among younger populations below 50 years such as in United Kingdom and Norway. In the UK and Norway however the rise of new cases of HIV was 3.6 percent yearly. Tavoschi said this is reflection that awareness campaigns are not targeting older populations. Targets for HIV prevention should be to promote HIV testing and also reduce the stigma surrounding HIV. Increasing awareness regarding condom use and safe sex practices and sexually transmitted infections is also an important part of HIV prevention. Tavoschi explained that there is a stigma related to sex lives of older adults and it is assumed that this age group does not indulge in sex. This is one of the reasons why this age group is not targeted she said. Most health care providers do not speak about safe sex and sexual health with older adults she said. Older women are more at risk than younger women she said. The reason behind this is not clear. Also those over 50 are more likely to be diagnosed with advanced HIV disease and are likely to be infected for longer without being diagnosed. ECDC, for example analyzed the levels of CD4 immune cells that are damaged by HIV and are markers of the extent of the disease. They noted that 47 percent were diagnosed late and 63 percent of the adults over 50 delayed going to their clinic to be diagnosed. Compared to this the delay of getting diagnosed was seen in 43 percent of those under 50. Tavoschi said not knowing that a person is HIV positive endangers others by transmitting the infection unknowingly. Study author Dr Anastasia Pharris said that HIV is associated with younger people and this study changes that notion. Almost 37 million people worldwide are living with HIV AIDS as per statistics. Most of these cases are in the underdeveloped and developing nations where there is little access to testing and prevention. HIV epidemic is also widely prevalent in the developed nations and has been difficult to curb. Source: http://www.thelancet.com/journals/lanhiv/article/PIIS2352-3018(17)30155-8/fulltext?elsca1=tlpr Babies classified as low birth weight (under 2.500 grams) are at risk of iron deficiency, which is linked to impaired neurological development. A long-term randomized study now shows that providing such babies with iron supplements can prevent behavioral problems at school age. The study, led by Staffan Berglund of Umea University in Sweden, is published in the journal Pediatric Research which is published by Springer Nature. The findings are part of ongoing Swedish research involving 285 late preterm and term infants who weighed between 2000 grams and 2500 grams at birth, and were defined as being marginally low birth weight. This group represents a significant number of all births. The babies were randomly selected to receive either no iron supplements, or specific doses from the age of six weeks to six months. Research up until now has shown that those babies given iron supplements had a lower risk of suffering from iron deficiency or iron deficiency anemia by the time they were six months old. When the participants were tested again when they were 3 and a half years old, the ones in the supplement group had fewer behavioral problems than those who went without extra iron. In this study, 207 of the participants from the initial investigation were tested at the age of seven. Berglund and his fellow researchers wanted to see if the early iron intervention influenced the children's cognitive and neurobehavioral abilities. The Wechsler Intelligence Scale for Children was used to assess the children's cognitive abilities. Their parents completed two standardized questionnaires about their children's behavior. No major differences were found in the intelligence scores of the children in the two separate test groups. The magnitude of the intervention group to show externalizing problems was however significantly reduced compared to that of the children in the other. They had lower levels of aggressive and rule-breaking behavior and did not suffer as many thought problems. The thought problems in question were recently shown to be the best independent predictor of autism spectrum disorders. This suggests that the behavioral and emotional profiles of low birth weight children who did not receive iron supplements include different symptoms of subclinical neurodevelopmental problems. "Our findings suggest that iron supplementation may have long-lasting effects on behavioral functions in children born of a low birth weight," says Berglund. "This clinically important benefit from early iron supplementation gives further support to recommend iron supplementation of all low birth weight children, including those with marginally low birth weight." On the population level this finding is important, since marginally low birth weight infants represent a relatively large proportion of all births. Up to five percent of infants born in high income countries and fifteen percent of those in low income countries are defined as such. Source: http://www.springer.com/gp/about-springer/media/research-news/all-english-research-news/iron-supplements-have-long-term-benefits-for-low-birth-weight-babies/15089156 The chemical compound bromate is formed when drinking water is disinfected through ozonation. At mg/L levels, bromate is potentially carcinogenic to mice and rats. Based on recent toxicological studies, the International Agency for Research on Cancer (IARC) has classified bromate as a group-2B carcinogen to humans, with concentrations greater than 0.05 g/L associated with kidney tumor risk. In view of this, the US Environmental Protection Agency (USEPA) has called for comments on setting bromates maximum contaminant level goal to zero. Ultratrace determination of bromate in drinking water In this study, the goal was to establish a method for routine determination of bromate in drinking water using IC with mass-spectrometric detection. The IC-ICP/MS technique was selected for its simplicity compared with other mass-spectrometric techniques. Using this technique, the presence of bromate in drinking water can be determined at concentrations in the sub-g/L range. The sample does not have to be pre-treated and it takes 15 minutes to analyze a single sample. Results A technique was developed to determine ultra-trace levels of bromate in drinking water by IC-ICP/MS. In this method, the microbore column method is used in combination with a self-made high-performance and high-capacity anion-exchanger. Direct analysis of almost all water samples was possible without matrix elimination, owing to the high capacity of the separation column and an optimized elution system based on NH 4 NO 3 . In addition, large injection volumes can be used. Due to the sensitivity of ICP/MS detection, there is no need for trace enrichment, meaning the sample does not have to be pre-treated. In the mineral and drinking waters analyzed, the method detection limits for bromate were in the range of 5065 ng/L, corresponding to absolute detection limits of 44 to 58 pg. The sample composition influenced the retention of bromate, as well as the signal-to-background (SBR) and signal-to-noise (SNR) ratios. At a concentration of 500 ng/L bromate, the within-run imprecision of the presented IC-ICP/MS coupling was 5%. As shown in Figure 1, complete analysis took 8 to 15 minutes, depending on the samples bromide content. Given the sensitivity, precision, sensitivity and analysis duration of the described IC-ICP/MS coupling, it is well suited for accurate routine analysis of bromate content in drinking water at sub-g/L levels. Figure 1. Separation of 1 g/L bromate, 100 g/L bromide, and 100 g/L monobromoacetic acid. Sample volume: 585 L; column: self-made; eluents: 100 or 60 mmol/L nitric acid or 100 mmol/L hydrochloric acid, pH adjusted to 6 with ammonia (25% w/w); m/z 79 Nowak, M.; Seubert, A. (1998) Anal. Chim. Acta 359, 193204 Bromate further applications with IC-ICP/MS Comparison of ion chromatographic methods based on conductivity detection, post-column-reaction and on-line-coupling IC-ICP/MS for the determination of bromate Schminke, G.; Seubert, A. (2000) Fresenius J. Anal. Chem. 366(4), 387391. Trace analysis of bromate in drinking waters by means of online coupling IC-ICP/MS Seubert, A.; Nowak, M. (1998) Fresenius J. Anal. Chem. 360(7), 777780. Further applications with IC-ICP/MS Sulfur Measurement of sulphur isotope ratio (34S/32S) in uranium ore concentrates (yellow cakes) for origin assessment - Han, S:H.; Varga, Z.; Krajko, J.; Wallenius, M.; Song, K.; Mayer, K. (2013) J. Anal. At. Spetrom. 28(12), 19191925. Aluminum Characterization of an aluminium(III) citrate species by means of ion chromatography with inductively coupled plasma-atomic emission spectrometry detection Peukert, A.; Seubert, A. (2009) J. Chrom. A 1216(45), 79467949. References Aschner, M.; Syversen, T. (2005) Methylmercury: Recent advances in the understanding of its neurotoxicity. Ther. Drug Monit. 27, 278283. Bianchi, A.; Calabi, L.; Corana, F.; Fontana, S.; Losi, Maiocchi, A.; Paleari, L.; Valtancoli, B. (2000) Thermodynamic and structural properties of Gd(III) complexes with polyaminopolycarboxylic ligands: Basic compounds for the development of MRI contrast agents. Coord. Chem. Rev. 204, 309393 Burger, J.; Gochfeld, M. (2005) Heavy metals in commercial fish in New Jersey. Environ. Res. 99(3), 403412 Dietary Supplement Fact Sheet: Selenium. US National Institutes of Health; Office of Dietary Supplements. Retrieved Oct 11, 2016. Gochfeld, M.; Burger, J. (2005) Good fish/bad fish: A composite benefitrisk by dose curve. Neurotoxicology 26(4), 511520 Herrmann, T. Einsatz der On-line-Kopplung von Ionenchromatographie und ICP-MS zur Bestimmung von Anionen. Diploma thesis, Philipps-Universitat Marburg, Germany, 2006 Knoll, J. Ph.D. Ultratrace determination of aminopolycarboxylic acid based chelating agents using inverse on-line coupling of IC with ICP-MS. PhD thesis, Philipps-Universitat Marburg, Germany, 2013 Knoll, J.; Seubert, A. (2012) Indirect ultra trace determination of aminopolycarboxylic acids in surface water using ion exchange chromatography coupled on-line to inductively coupled plasma mass spectrometry. Journal of Chromatography A 1270, 219-224. Kummerer, K.; Ed. Pharmaceuticals in the environment: Sources, fate, effects, and risks. Springer-Verlag Berlin Heidelberg, 2008; 3rd ed. Kunnemeyer, J.; Terborg, L.; Meermann, B.; Brauckmann, C.; Moller, I.; Scheffer, A.; Karst, U. (2009) Speciation analysis of gadolinium chelates in hospital effluents and wastewater treatment plant sewage by a novel HILIC/ICP-MS method. Environ. Sci. Technol. 43(8), 28842890. Kunnemeyer, J.; Terborg, L.; Nowak, S.; Telgmann, L.; Tokmak, F.; Kramer, B. K.; Gunsel, A.; Wiesmuller, G. A.; Waldeck, J.; Bremer, C.; Karst, U. (2009) Analysis of the contrast agent Magnevist and its transmetalation products in blood plasma by capillary electrophoresis / electrospray ionization time-of-flight mass spectrometry. Anal. Chem. 81(9), 36003607 Levenson, C. W.; Axelrad, D. M. (2006) Too much of a good thing? Update on fish consumption and mercury exposure Nutr. Rev. 64(3), 139145. Montaser, A.; Golightly, D. W.; Eds. Inductively coupled plasmas in analytical atomic spectrometry. VCH Publishers, Inc.: New York, 1992. Rahman, G. M. M.; Martone, N.; 'Skip' Kingston, H. M. (2012) Determination of hexavalent chromium in NIST SRM 2701 by speciated isotope dilution mass spectrometry (EPA Method 6800) using IC-ICP-MS. In Handbook of hyphenated ICP-MS applications, 2nd edition; Agilent, 2012; pp 3335. http://www.agilent.com/cs/library/applications/5990-9473EN_icpmsSpeciationHB_lr.pdf (accessed Oct 7, 2016) Saranko, C. J. et al. Fact Report for toxicity of arsenite and arsenate, Florida Dept. of Health, Nov 6, 1998 Schedlbauer, O. F.; Heumann, K. G. (2000) Biomethylation of thallium by bacteria and first determination of biogenic dimethylthallium in the ocean. Appl. Organomet. Chem.14(6), 330-340 Wilber, C. G. (1980). Toxicology of selenium: A review.Clin. Toxicol. 17 (2), 171230. About Metrohm At Metrohm is one of the worlds most trusted manufacturers of high-precision instruments for chemical analysis. Metrohm was founded in 1943 by engineer Bertold Suhner in Herisau, Switzerland. Today, Metrohm is represented in 120 countries by subsidiaries and exclusive distributors. The global Metrohm Group also includes the Dutch companies Metrohm Applikon and Metrohm Autolab, manufacturers of online analyzers and instruments for electrochemical research, respectively. Recently, the Metrohm Group was joined by Metrohm Raman, a leading manufacturer of handheld Raman spectrometers. Metrohm is the global market leader in analytical instruments for titration. Instruments for ion chromatography, voltammetry, conductivity, and stability measurement make the Metrohm portfolio for ion analysis complete. Instruments for Near-infrared and Raman spectroscopy are another, strongly growing segment of the Metrohm portfolio. Metrohm is a problem solver, both in the laboratory and within the industrial process. To this end, the company offers their customers complete solutions, including dedicated analytical instrumentation as well as comprehensive application know-how. More than 30% of the companys employees at the Metrohm international headquarters in Herisau work in R&D. Metrohm has been owned 100% by the non-profit Metrohm Foundation since 1982. The Metrohm Foundation, which does not exert any influence on the companys business operations, sponsors gifted students in the natural sciences, supports charitable and philanthropic purposes and, above all, ensures the independence of the company. Sponsored Content Policy: News-Medical.net publishes articles and related content that may be derived from sources where we have existing commercial relationships, provided such content adds value to the core editorial ethos of News-Medical.Net which is to educate and inform site visitors interested in medical research, science, medical devices and treatments. GamesRadar+ is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Heres why you can trust us. You are clearly a super-user of NUVO.net. Thats a good thing. It means you depend on independent and local news sources to keep you informed. You are a smart person. Coincidentally, independent and local news sources depend on you too. Youve read 25 articles this month and now, wed like you to be join our mission and become a NUVO Supporter. For as little as $4 a month, you can keep us alive and fighting -- and can have unlimited access to the independent news that cant be found anywhere else. 75 locations identified as vulnerable to Rohingya infiltration India oi-Vicky By Vicky A day after India decided to review the free movement regime with Myanmar, security forces have managed to push back several Rohingya Muslims trying to cross over. Following the decision by the government to deport Rohingya Muslims, the Border Security Force has reviewed several vulnerable locations along the border. During this operation, the BSF managed to push back over 15 Rohingya Muslims. BSF officials also identified 75 locations and termed them as vulnerable to infiltration. Meanwhile India continued to review the free movement regime. This agreement allows free movement of Indian and Myanmarese citizens within 16 kilometres of the border. This has on several occasions been exploited by terrorists and smugglers. To review the situation, the Home Ministry sent two of its senior officials to four states along the Indo-Myanmar border. Special secretary (internal security) Rina Mitra and joint secretary (northeast), Satyendra Gard met with senior officials of the four states where the regime is in force. India has a 1,643-km border with Myanmar and it is unique in many ways as it has a visa-free movement regime for people living within 16 km on either side of the border. They can stay up to 72 hours with effective and valid permits issued by the designated authorities on either side. This regime has been in place keeping in view the traditional social relations among the border people. It helps genuine people living in close proximity of the border. "However, it is misused by militants and criminals who smuggle weapons, narcotics, contraband goods and Fake Indian Currency Notes (FICN)," Union Home Minister Rajnath Singh said. OneIndia News For Breaking News and Instant Updates Allow Notifications Story first published: Wednesday, September 27, 2017, 7:03 [IST] Latest updates on pay hike for pensioners Government sources say that the pay hike would mean tinkering with the fitment factor. This would be applicable to both the serving employees as well as the pensioners. This news comes as a major relief to the pensioners under the Central Government who have been awaiting for good news on the same. Latest updates on fitment factor The government is set to raise the fitment factor from 2.57 to 3 times. This will be a big step by the government since it approved the recommendations of the pay panel in June. If the 2.57 fitment factor is tinkered with fitment factor 3.00, then salary and pension will go up. Good news for pensioners The tinkering with the fitment factor is crucial for both the CG employees and the pensioners. Sources say that once the fitment factor is raised to 3 times it would be applicable to both the CG employees as well as the pensioners. The National Anomaly Committee would meet in October. Once the hike is approved through a majority vote, a report would be prepared and then handed over to the Finance Minister. The Finance Minister had assured that the matter would be looked into and there would be good news for both pensioners as well the employees. Nightmare of 7th Pay Commission to end For CG employees and pensioners the 7th Pay Commission was a nightmare and had led to a great deal of frustration. The committee formed in 2016 had given its recommendations and suggested that the pay hike be at Rs 18,000. However this had not brought any relief to the employees and pensioners. Now the demand is that it be hiked to Rs 26,000. However the government would raise the fitment factor 3 times which would mean that the hike would be at Rs 21,000. 7th Pay Commission: Rajasthan employees to get benefits before Diwali India oi-Vicky By Vicky Employees in Rajasthan have good news as they will start reaping the benefits of the 7th Pay Commission from Diwali onwards. The D C Samant committee, submitted its report to the government. The report was received by the finance department. Committee's member secretary M S Bhukar submitted the report to additional chief secretary (finance) D B Gupta. The finance department would examine the report and present it to the cabinet in the coming days. The report would affect the salaries of nearly seven lakh state government employees as well as around three lakh pensioners. As the Navratri festivities are on and the next month would have the Diwali festival, the employees are hoping the government would accommodate their demands and implement the Pay Commission's recommendations as has been done by the central government. Recommended Video 7th Pay Commission: Latest update on fitment factor, to be raised 3 times | Oneindia News With assembly elections due next year, the ruling BJP too would like to win over the employees by implementing the recommendations. Sour ces said the state government could make the announcement and even release some benefits before Diwali, while grant the revised salaries from January next year. As per estimates, the state government will have to spend around Rs 10,000 crore in salaries and allowances if all the recommendations of the 7th Pay Commission are implemented. The All Rajasthan State Government Employees Federation presided by Ayudan Singh Kaviya has asked the government to implement the 7th Pay Commission recommendations without any further delay . "The Centre implemented the pay commission for its employees in July 2016. Rajasthan is already late by more than a year. The chief minister should ensure that government employees in the state do not have to suffer any longer," said Tej Singh, the Federation's general secretary . The Samant committee headed by retired bureaucrat D C Samant was formed in February this year to remove anomalies in salaries of state government employees while implementing the 7th Pay Commission. It was mandated to recommend new pay scales for government employees and to make an estimate of financial burden the pay commission recommendations would add to the exchequer. OneIndia News For Breaking News and Instant Updates Allow Notifications Story first published: Wednesday, September 27, 2017, 9:16 [IST] Ashok Choudhary's ouster as chief deepens rift in Bihar Congress, split imminent? India oi-Anusha He lost his minister post in June and now Ashok Choudhary has lost his party president post in Bihar Congress. While his ouster was imminent given the recent meetings of state leaders with the central leadership, his removal from the post, one he held since 2013, has only widened the split in the Congress' Bihar unit. 18 MLAs of the party are now all set to stage a walkout, splitting the party. His proximity to Bihar Chief Minister Nitish Kumar may have cost Ashok Choudhary, the longest-serving PCC president in Bihar, his post but it was his rebellion against his party's camaraderie with Lalu Yadav's Rashtriya Janata Dal that proved to be the last nail in the coffin. The 49-year-old leader is said to have asked the senior leadership of the party to 'put him out of his misery'. The tension between Congress legislators and those of Lalu Yadav's RJD is no secret in Bihar, especially after the failure of the grand alliance between Congress-RJD-JD(U) in June. Choudhary has not minced words in being critical of his party's 'lack of effort to save the alliance' in Bihar. He had at least 18 legislators including 14 MLAs of the Congress backing him. The Congress has 27 MLAs in Bihar and six MLCs. The central leadership of the COngress got a whiff of the rebellion within the party after MLAs wrote to Sonia Gandhi complaining of then state unit chief Ashok Choudhary was seeking signatures from MLAs to quit Congress and join the JD(U). If Choudhary decides to leave the party, he will leave with enough numbers to ensure that the anti-defection law does not apply. , the anti-defection law cannot apply to the Congress MLAs who choose to jump to the JD(U) if the number reaches two-thirds of current assembly strength of the party. The rebellion will then be considered a split in the party. In August this year, the central leadership of the Congress was jittery with speculations of a rebellion within the Bihar unit. Letters had been acquired from Congress legislators pledging their support to Choudhary. So strong was the hint of a split that the central leadership rushed Jyotiraditya Scindia to foil the bid. Incidentally, owing to the treatment he had been receiving within the party, Ashok Choudhary, has pestered the party to make its stand clear on him. The exit was inglorious but the events behind it were too. OneIndia News For Breaking News and Instant Updates Allow Notifications Story first published: Wednesday, September 27, 2017, 12:23 [IST] What GST has got to do with Kautilya, globalisation with Manu? A lot for BHU BHU row: Uttar Pradesh tops 'sexual harassment against women on campus' list India oi-Anusha The highest number of sexual harassment against women in campus are reported from Uttar Pradesh. If one were to go by the University Grants Commission's data, the complaints, protest, violence in Benaras Hindu University is only the tip of the iceberg. Out of a total of 103 complaints of sexual harassment on campus between April 1, 2016 and March 31, 2017, 24 were from Uttar Pradesh. The official data collected by the UGC as part of its first attempt to check the problem of sexual harassment on campuses says Punjab and Kerala stand second in the number of cases. None of the 24 cases reported from Uttar Pradesh, however, were from the BHU BHU protests: Varsity's chief proctor resigns "Our universities have never been safe for women. Women are treated as though the administration is extending them a favour by allowing them to study in the university. There have been cases of professors harassing women and universities doing nothing about it. Students are made to suffer in silence since marks are in the hands of the perpetrator. Until the government steps in to check on such instances, the situation won't change," said Brinda Adige, a women's rights activist from Bengaluru. According to the UGC's data, in Uttar Pradesh, cases were registered from Aligarh University, Ambedkar University, and Sharda University. Punjab and Kerala both have registered 16 cases of sexual harassment against women on campuses. Eight from Haryana, six each from Uttarakhand and Telangana, five from West Bengal, three from Gujarat and two from Rajasthan. The highest numbers of cases came from Uttar Pradesh in concurrence with National Crime Records Bureau statistics. The sheer population may be a contributor as well. The UGC's data includes instances of eve-teasing, stalking, to sending vulgar messages. The commission had asked all colleges under its purview to tackle sexual harassment of students and staff seeking action on complaints of all sexes. The regulation allows third-party complaints. If the victim is unwilling to come forward with a complaint, victim's friends, colleagues or any other person can file a complaint on their behalf. If the administration refuses to take action on the complaint within three months of the offence, the university or college would have to face action including fund cuts if they failed to follow regulations. OneIndia News For Breaking News and Instant Updates Allow Notifications Story first published: Wednesday, September 27, 2017, 10:45 [IST] What GST has got to do with Kautilya, globalisation with Manu? A lot for BHU Varanasi: Student shot at in BHU, condition said to be critical BHU violence: Probe suggests role of anti-social elements, says Adityanath India oi-PTI Gorakhpur (Uttar Pradesh), September 27: The recent incidents in the Banaras Hindu University smacked of a "conspiracy" as prima facie reports suggest the role of anti-social elements, said Uttar Pradesh Chief Minister Yogi Adityanath. A number of students, including women, and two journalists were injured in a baton-charge by the police in BHU where a protest on Saturday night against an alleged eve- teasing incident turned violent. An inquiry has been ordered into the violence on the campus. The chief minister told reporters that those involved in spreading anarchy on the campus will not be spared at any cost. "Prima facie investigation suggests it is a conspiracy by anti-social elements," he said. The chief minister said the proctorial board of the university should have taken timely measures to ensure that the trouble did not escalate. He suggested better communication between students and vice chancellors of central universities to prevent such incidents. On alleged baton-charge on journalists, he said action will be taken immediately after getting the final report. Hitting back at opposition parties, he said the law and order situation in the state has improved even though his political opponents were spreading canard against the government. The violence on the campus had erupted after some students protesting against the incident wanted to meet the varsity's vice-chancellor at his residence. PTI For Breaking News and Instant Updates Allow Notifications Story first published: Wednesday, September 27, 2017, 10:58 [IST] BJP tries to woo Patidar voters ahead of Gujarat elections India oi-Vikas By Vikas All the major parties are trying to lure the Patidar community in Gujarat, which has been agitating for the past 3 years demanding reservation, ahead of state assembly elections. Congress vice-president Rahul Gandhi on Monday began his Gujarat campaign from Patidar stronghold Saurashtra. Rahul's roadshow was planned in such a way that he could reach out to Patidars in areas of the legislators who defected recently. On Tuesday, Gujarat Deputy CM Nitin Patel and cabinet ministers Nanu Vanani and Chimanbhai Shaparia met close to 100 Patidar leaders. Patidar Anamat Andolan Samiti (PAAS) chief Hardik Patel also took part in the meeting along with six important Patidar organisations representing the Leuva and Kadva Patel community in State. Following the meeting, Nitin Patel said that commission would be formed to look into the issue of reservation. A Special Enquiry committee headed by high court judge would also be created to quash cases pending against members of Patidar community during and post the Patidar quota agitation event held at GMDC ground on August 25, 2015. Prominent Patidars leaders like Reshma Patel, Varun Patel, Dinesh Bhambaniya and others welcomed the formation of the commission but said the stir for reservation in the OBC category would continue. After the meeting, Hardik Patel told Ahmedabad Mirror that the government did not touch upon the reservation issues. "However, they have agreed to withdraw cases against the Patidar and give compensation to the family members of the victims," he added. According to reports, some PAAS members, during the meeting, shouted slogans like 'Hum ladenge choro se' (We will fight the thieves) and were shunted out of the room. Commenting on this, Nitin Patel said that some groups would use the Patidar community for personal gains OneIndia News Cattle smugglers open fire at British woman India oi-PTI Gurgaon, September 27: Two women, including a British national, who tried to free animals packed into a speeding tempo, were fired at by a group of cattle smugglers on the Gurgaon-Alwar road. The incident took place around 2.30 am on Tuesday when Sonia Sharma, a British national, and her friend Archie Baranwal were driving their new SUV and noticed five to six cows in the tempo that was speeding, a police official said. The tempo had no rear tyres and was running on its rims. "We found some boys sitting on its roof. We chased the vehicle to prevent the illegal cattle lifting. The person sitting next to the driver was abusing us," Sharma told PTI. Seeing the plight of animals, the women called the police and asked the driver to stop. Smelling trouble, the assailants opened fire. "We immediately called the police citing the torture on animals. We also signalled and asked these chaps to stop. To our horror, they started firing! They fired a shot at us also, fortunately it missed us," Sharma said, recapping what had happened. But the two women were undeterred and continued the chase. The police came around 2.45 a.m and the goons fled from the spot, abandoning the vehicle. They managed to get away due to traffic congestion on the way, Sharma added. Gurgaon Police PRO Ravinder Kumar said a case had been registered in Sohna Police Station against four to five unidentified cattle smugglers following the complaint by the two women. "No arrest has been made," he said. Sharma, who is finding it hard to get over the trauma, alleged that there was little evidence of police patrolling or police vigil at that hour of the night and would like to leave the country. "I have an impression about living in an independent country where I can go anywhere without any fear. But now, I am disgusted and appalled at what happened and just want to leave this country," she said. Sharma further said that the incident had completely shaken her faith in the country s administration and legal system. PTI For Breaking News and Instant Updates Allow Notifications Story first published: Wednesday, September 27, 2017, 14:18 [IST] Assam doc seeks faith healers' help to ensure zero deaths due to snake bites Bengaluru: 27-year-old doctor killed by fiancee for uploading private photos on social media BJP leader booked for threatening doc at gun point in UP Dr. Rinky Kapoor- One of the best celebrity cosmetic dermatologists Central cabinet extends retirement age for doctors to 65 India oi-Madhuri Recommended Video Central cabinet extends doctor's retirement age to 65 | Oneindia News In a bid to reduce shortage of doctors in the state, the Central cabinet on Wednesday decided to extend their retirement age of Central Government doctors, other than Central Health Service doctors to 65 years. The decision was taken at a meeting of the Union cabinet chaired by Prime Minister Narendra Modi. While addressing media, Union minister Ravi Shankar Prasad said,''Retirement age of Central Government doctors, other than Central Health Service doctors, to be increased to 65 yrs.'' Cabinet also approved permanent transfer of land measuring 1899 sq mtr at Lucknow Intl Airport by AAI to Lucknow Metro Rail Corporation. Several other announcements were also made during the cabinet meeting. Home Minister Rajnath Singh said,''An umbrella scheme for Police modernisation approved by CCS with an investment of Rs 25,060 Cr for 2017-18, 18-19, 19-20. An additional allocation of Rs 100 Cr has been provided for North East.'' Rajnath also said,''Internal security, law & order, women security, weapons procurement, hiring of helicopters etc to be covered under the scheme. Additional allocation of Rs 100 Cr provided for NE for police infrastructure upgradation, training institutes, investigation facilities.'' In order to improve mobile phone connectivity, the Cabinet approved installation of telecom towers in all army cantonments, Union Minister Ravi Shankar Prasad said. Cabinet also approved signing of India-Ethiopia Agreement on cooperation in Information, Communication and Media. It further approved signing and ratification of Bilateral Investment Treaty between India and Belarus The Cabinet further announced that the India-Afghanistan MoU will be signed, on Technical Cooperation in Police Training and Development. OneIndia News Dawood funded Zakir Naiks NGO reveals brother India oi-Vicky By Vicky Dawood Ibrahim funded Zakir Naik's NGO, his brother Iqbal Kaskar revealed during interrogation. The funding had taken place through a mediator called Sultan Ahmed he also revealed. This revelation will give the NIA more material to seek the extradition of Naik, an Islamic preacher wanted in several cases. Kaskar being questioned in an extortion case said that the funding was frequent. When the NIA had questioned Aamir Gazdar, the CFO of Naik's NGO, he had said that there were times when funding came from Dawood. He also confirmed that it would happen through a middleman. Dawood not only uses hawala, but Angadias too The Thane police which is probing this case is all set to seek the help of the Enforcement Directorate. The decision was taken after the police found a diary belonging to Kaskar which indicated several transactions made by him through hawala channels. When he was questioned about the transactions he said that Dawood Ibrahim relies heavily on hawala and the Angadias to receive money. Kaskar, it may be recalled was arrested in connection with an extortion racket and the police believe that he was doing so at the behest of his brother. The revelation regarding the hawala channels and Angadias came to light when the police seized a diary. There were several entries in the diary pointing towards the hawala network and the Angadias. Who are the Angadias and how do they operate The Thane police will soon begin questioning the hawala operators and the Angadias. It would be a herculean task for the police as the hawala operators are spread across the country. The D-Company relies heavily on the hawala operators from Delhi and Gujarat. Most of the hawala operators to be summoned will be from these two places. With the money trail on the radar of the probe agencies, the police will also seek the help of the Enforcement Directorate and the Financial Intelligence Unit to crack the case. OneIndia News Dileep to remain in jail until October 3 as Kerala High court defers order on bail plea India oi-Anusha Recommended Video South Actor Dileep to remain in jail till Oct 3; Kerala HC defers order on bail plea| Oneindia News The Kerala High Court on Wednesday deferred its order over actor Dileep's bail petition. Dileep will now continue to be in the Aluva jail until October 3. This is the fifth time that the actor, accused of conspiracy in the infamous actress molestation case, has approached the court seeking bail. After two days of hearing arguments on the petition, the court deferred its verdict to next Tuesday. The defense completed its arguments on Tuesday while the prosecution concluded it on Wednesday. The prosecution urged the court not to grant bail to Dileep, an influential man in the state before the investigating authorities find the mobile phone, a crucial piece of evidence in the case, which was used to film the actress in February when she was abducted. Dileep was arrested in July earlier this year and has spent more than two months in jail after being accused of hiring prime accused Pulsar Suni to abduct the actress. Dileep has approached the magistrate court twice and the Kerala High Court twice seeking bail earlier. His bail pleas have been rejected four times before. This is Dileep's last chance to seek bail before the Special Investigating Team files its chargesheet in the case. OneIndia News For Breaking News and Instant Updates Allow Notifications Story first published: Wednesday, September 27, 2017, 12:55 [IST] Dreaded terrorist Najar was returning to Kashmir to revive Hizbul Mujahideen India oi-Vicky By Vicky In a major operation, Abdul Qayoom Najar, the longest surviving Hizbul Mujahideen commander and most dreaded terrorist of the Valley was shot dead by the Indian Army in an encounter at Uri near the Line of Control. Najar, 43 had broken away from the Hizbul Mujahideen, but over the past few months had brokered peace with the outfit's head Syed Salahuddin. Sources say that he was returning to Kashmir in a bid to revive the Hizbul Mujahideen. He was sent to India on the instructions of Salahuddin who is also the chief of the United Jihad Council. Najar had exfiltrated into Pakistan in 2015. He was accused of killing several security personnel and was also wanted for the bombing of mobile towers in the Valley. Najar, most dreaded terrorist in Kashmir's history killed Najar carried a bounty of Rs 10 lakh on his head and was classified as a Grade A++ terrorist. He had broken away from the Hizbul Mujahideen and formed the Lashkar-e-Islam. Najar was expelled by Hizbul chief Syed Salahuddin blaming him in playing a key role in murdering innocent persons and indulging in character assassination of Hurriyat leaders and attacks on the telecommunication set-up in the Valley. For years Najar, one of the most wanted militants of North Kashmir had kept the police and the army on toes. Najar came to the limelight after the attacks on mobile towers and killings of six civilians in Sopore and its adjacent villages. Though the Hizbul Mujahideen had been blaming the Indian agencies for these attacks, police officials were convinced that these killings and attacks are the handiwork of Najar and his associate Imtiyaz Kundoo. The police had announced a reward of rupees 10 lakhs for information leading to the arrest of Najar. Najar, the longest surviving militant, was one of the top commanders of Hizbul Mujahideen. A resident of Sopore town, he joined militancy barely at an age of 16. He was arrested in 1992 and later released. After his release, Najar recycled into the militancy in 1995. Though for many years, Najar was a militant, but he always aspired to become a top commander after killing and arrest of top Hizbul commanders, Najar was the senior most active commander and thus the de-facto operational chief of Hizbul Mujahideen. OneIndia News I have been assaulted by Rabri Devi, driven out of her house: Tej Pratap's wife Aishwarya Rai ED summons Rabri Devi, Tejaswi Yadav in railway hotels corruption case India oi-Deepika By Deepika Keeping up the pressure on Bihar politician Lalu Yadav's family that has been accused of corrupt land deals, the Enforcement Directorate on Wednesday issued fresh summons to former Bihar chief minister Rabri Devi and Tejaswi Yadav in connection with its money laundering probe in the railway hotels allotment case. Rabri, wife of Rashtriya Janata Dal chief Lalu Prasad, has been summoned to be present before the investigating officer of the case on October 11, and Tejaswi Yadav on October 10. The Enforcement Directorate had taken cognisance of a Central Bureau of Investigation first information report in this regard to initiate its own criminal complaint. In July, the CBI had registered a criminal FIR and conducted multiple searches against former Bihar chief minister Lalu Prasad and others. The ED will investigate the alleged "proceeds of crime" generated by the accused, purportedly through shell companies, officials said. Rabri, son Tejashwi Yadav, and others will be probed by the agency under charges filed in the Enforcement Case Information Report, the ED equivalent of a police FIR. The case dates back to the time when Lalu was the railway minister in the UPA government. For Breaking News and Instant Updates Allow Notifications Story first published: Wednesday, September 27, 2017, 17:43 [IST] On camera: Varanasi folks in panic as 'ghost in white' goes for a walk on rooftops Varanasi to light up for Deep Deepavali, a festival of lights that is not Diwali How big dreams of girl students have been hit hard post violence in BHU India oi-Oneindia By Oneindia Varanasi, Sep 27: The prestigious Banaras Hindu University (BHU) in Varanasi, Uttar Pradesh, shares a love-hate relationship with its female students. The 100-year-old varsity has often hit the headline as its female students have raised their voices against sexual harassment and gender discrimination, to name a few issues. However, on Saturday evening when the female students of the BHU decided to hit the streets to protest over an eve-teasing incident that occurred inside the campus, the authorities of the varsity called the police to control the angry students and in the process the girls were beaten up by police personnel. As video clippings of male police beating girl students of the BHU went viral on social media, the repercussions of it were felt directly at Delhi since Varanasi, where the sordid incident took place, is the parliamentary constituency of Prime Minister Narendra Modi. Now, more than the issue of the girl students facing harassment in an educational institution, the entire controversy in the BHU has turned "political". While the Congress vice-president Rahul Gandhi has asked the PM to apologise to the girl students as the incident happened in his parliamentary constituency, the Yogi Adityanath government claimed that the violence in the BHU has been instigated by the opposition political parties. As the BHU is currently embroiled in a political turmoil, girl students, especially those who are hostel boarders, have left the varsity campus for their native places in the wake of festival holidays, hope that their family members allow them to return to their alma mater. A lot of female students in the BHU are from various parts of the country, including the Northeast region and the southern states. Earlier, students mostly from the Northern states of the country used to study in the BHU. Over the years, the historic university has started attracting girl students from several small towns and villages of India to help them realise their dreams of making it "big" in the world stage. In fact, the varsity has witnessed a surge in admission of women students in various departments in the last 10 years. According to a report by The Indian Express, the university records show that in the last 10 years, the campus has seen a 131 per cent increase in women admission, much more than the 78 per cent rise in men's admission. In 2007-2008, BHU admitted 7,754 women and 13,282 men across courses and in its four affiliated institutions. Last year, 17,950 women and 23,665 men were enrolled. The reason behind such a huge rise in the admission of female students in the varsity lies in the aspirations of women staying in the hinterlands of the country. Many of the young women in the BHU are the first ones from their families to study in a university. Such a progressive step in the history of the varsity got a big blow when violence and protest rocked the campus on Saturday as the police decided to brutally beat girl students. "With time, female-only courses and colleges were started along with good hostel accommodation. Students not just from nearby states but also states in the North-East and South began opting for BHU. Most students are those whose parents feel that BHU is a safe haven for their daughters and they are distrustful of political disturbances in JNU and DU," the registrar of the BHU told The Indian Express. "But this fiasco has changed everything. It will certainly impact admissions next year, especially applications from women. Parents will be very scared," the registrar added. OneIndia News For Breaking News and Instant Updates Allow Notifications Story first published: Wednesday, September 27, 2017, 11:57 [IST] How Rahuls Vikas has gone crazy' jibe is causing headache to BJP in Gujarat India oi-Oneindia By Oneindia Recommended Video Rahul Gandhi attacks PM Modi's Vikar model in Gujarat | Oneindia News Wherever Prime Minister Narendra Modi goes, vikas (development) follows him. This is the narrative the ruling Bharatiya Janata Party (BJP) has built around its tallest leader for the last couple of years after the then chief minister of Gujarat Modi caught the nation's imagination with his "Gujarat Development" model. The cry to emulate the "Gujarat Development" model across the country got louder during the previous "corrupt" regime of the United Progressive Alliance (UPA) under the Congress at the Centre. Thus India chose Modi as its PM during the 2014 Lok Sabha elections with a huge mandate. Three years down the line, the BJP's promise to bring "achhe din (good days)" to the nation seems elusive especially at a time when the economy is in doldrums with the shock waves created by demonetisation and the Goods and Services Tax (GST). As Modi's home turf Gujarat is gearing up for the Assembly elections later this year, the opposition Congress has decided to touch its base with the large-scale population of small-time traders and businessmen of the state, who are said to have faced the biggest blow of demonetisation and the GST and are up in arms against the BJP regime both at the Centre and in the state. So, when Congress vice-president Rahul Gandhi embarked on his three-day long sojourn to the poll-bound state, the Congress decided to target the BJP government over its "vikas" model. In fact, the Patidar Anamat Andolan Samiti (Paas), led by Hardik Patel, and the Congress had run a campaign recently under the theme "Vikas Gando Thayo Chhe (Development has gone crazy)" to attack the BJP. Thus Rahul during his journey from Rajkot to Jamnagar kept on asking the assembled crowd, "Vikas ko kya ho gaya hai (What has happened to development)?" Every time Rahul asked the question,"Vikas kaise pagal hua, kya hua (How did development go mad, what happened)?", the crowd broke into laughter, in a way agreeing with the Congress VP's taunt against his opponent, the BJP. Several video clippings on social media showed that the tired and helpless voters of Gujarat are still left with enough humour to make fun of the BJP's "Gujarat Development" model. "Jhooth bol bol kar vikas pagal ho gaya hai. Ye jo vikas pagal hua hai, use patri pe lana hai (Development has gone crazy by parroting lies. This development that has gone crazy has to be brought back onto the tracks)," Rahul said. The Congress VP added that the problem could be rectified if his party returned to power in Gujarat. "Modiji has been telling so many lies that vikas had to go crazy. 'Two crore jobs every year, Rs 15 lakh in every bank account, input cost plus 50 per cent profit to farmers'-- development was doomed to go mad digesting so many lies. Modi's model of development was a false model. People realise Modi betrayed them. They whisper into my ear, tell me they are angry. But they are fearful now, they will speak this time through their votes," Rahul said. Reports say the BJP is worried about the way the Congress and Patil are targeting the ruling saffron party over its "vikas" model. OneIndia News If Cong is elected in HP, decision on 1 lakh govt jobs, pension scheme in 1st cabinet meet: Rahul If brought to power, will waive off farmers loan within 10 days: Rahul Gandhi India oi-Chennabasaveshwar By Chennabasaveshwar Congress Vice-President Rahul Gandhi on Wednesday promised farm loan waiver within 10 days if Congress party is voted to power in the state. Rahul Gandhi was speaking in a rally in Rajkot. Rahul Gandhi, who is on three days campaign in Gujarat, also promised easy bank loans to the needy. The Congress Vice-President said, "Congress has 3 aims - to fight China, not by anger but by helping small business here and provide employment." "As soon as Congress comes to power here, we will waive off farmers' loan within 10 days and provide easy bank loans to people who need it," Rahul Gandhi said. He targeted PM Modi and said that he had waived off loans of 15 industrialists, amounting to Rs 130000 crore. "Had companies here been helped similarly, people would've been employed," he added. Congress has 3 aims - to fight China, not by anger but by helping small business here & provide employment: Rahul Gandhi in Rajkot pic.twitter.com/IMGX5Bo1oa ANI (@ANI) September 27, 2017 Congress Vice-President Rahul Gandhi has begun his roadshow on the third day of his campaign in Gujarat. He started his day by offering prayers at the Chamunda Mataji Temple and continued meeting with the party workers and locals during the day. He held a special meeting with village women at Chobari Village in Surendranagar district. Targeting PM Modi-led NDA government, Rahul Gandhi said that India gives employment to only 400 new youths per day, while China gives to 40,000. Therefore anger is growing in India. Money that is being given to big industrialists should be given to small manufacturers. Rahul Gandhi is now on his way to Gondal town in Rajkot district. OneIndia News For Breaking News and Instant Updates Allow Notifications Story first published: Wednesday, September 27, 2017, 18:08 [IST] India-Japan Study Centre at IIMB gets thumbs up from Japans Ambassador to India India oi-Oneindia By Oneindia H E Kenji Hiramatsu, Ambassador of Japan to India, and Takayuki Kitagawa, the Consul General of Japan in Bangalore, led a delegation to the Indian Institute of Management Bangalore on Wednesday to understand the goals of the newly launched India-Japan Study Centre and interacted with the faculty body of the premier management school. The India-Japan Study Centre was inaugurated at IIM Bangalore on September 14, when the two Prime Ministers were meeting in Ahmedabad to inaugurate the high speed rail project in Gujarat. The Ambassador welcomed IIMB's initiative, saying: "The setting up of the India-Japan Study Centre is a very valuable and timely initiative, especially at a time when the India-Japan relationship in business and investment is perhaps at its very best in history, guided by two very strong leaders - Prime Minister Modi and Prime Minister Abe. Your study centre has our whole-hearted support." Explaining that he would like to focus on people-to-people exchange programmes between the two countries, especially faculty teaching Japanese language here, the Ambassador said it was a privilege to work on more collaborations with IIM Bangalore, "a place where talented students train to be global managers". The delegation sought details on the language training program, the student exchange program and the training program for executives. Prof. Krishna Sundar, Chairperson, India-Japan Study Centre spoke of the growing number of IIMB's students choosing country-specific programmes to Japan among other countries. "We have increased the number of students going on an exchange programme to Japan from 30 to 60 in our two-year MBA programme in the last year," he said. OneIndia News For Breaking News and Instant Updates Allow Notifications Story first published: Wednesday, September 27, 2017, 22:22 [IST] ISI chooses UK for week-long event to mark Geelani's death anniversary, but no one's surprised NIA raids at 50 locations expose the dirty nexus between ISI, Khalistanis and gangsters ISI officer embarrasses own agency, says Pak officials backing terrorists India oi-Vicky By Vicky In a major embarrassment to the ISI, an officer from Pakistan has accused his own agency of protecting terrorists. Malik Mukhtar Ahmed Shahzad, a serving assistant sub-inspector of Intelligence Bureau (IB), has accused his senior officers of not taking action against terrorism suspects. In a petition filed in the Islamabad High Court (IHC), he requested the court to refer the matter to the Inter Services Intelligence (ISI) for a thorough probe, Dawn reported. The IHC Registrar's Office fixed the petition before Justice Aamer Farooq who referred the case yesterday to Chief Justice Mohammad Anwar Khan Kasi, with a note that the matter may be transferred to Justice Shaukat Aziz Siddiqui since an identical matter is pending in his court, the paper quoted a court official as saying. The petition filed through his counsel Masroor Shah, Shahzad claims that he reported against terrorist groups from various countries but no action was taken. "However, to the petitioner's utter dismay, no action was ever been taken by IB in this respect despite concrete evidence provided to it in the form of the intelligence reports," the petition says. "Upon thorough intelligence gathering process, it transpired that certain high officials of the IB themselves are directly involved with the terrorist organisations having linkages with hostile enemy intelligence agencies," it reads. It goes on to say that the matter was even reported to the IB director general, who also did not take any steps. It claims some IB officials travelled to Israel and had direct links with Afghan intelligence which, it was found later, had links with another terrorist group from Kazakhstan. "These terrorists used to disguise themselves as citrus dealers in Kot-Momin and Bhalwal, Sargodha. The business was a mere camouflage," the petition says. The petition claims that the son of joint director IB (Punjab) was dealing with the said terrorist groups. It also names certain IB officials who are allegedly on the payroll of foreign intelligence agencies which include a joint director general, directors and deputy directors. Shahzad said he "has been running from pillar to post including approaching the prime minister of Pakistan to raise this issue of national security." OneIndia News For Breaking News and Instant Updates Allow Notifications Story first published: Wednesday, September 27, 2017, 7:22 [IST] ED is 'completely independent' in what it does: Nirmala Sitharaman FM Nirmala Sitharaman hints at possibility of Centre considering restoration of state status to J&K India will continue to rely on close cooperation of US to address global economic challenges: Sitharaman Nirmala Sitharaman chairs first DAC, clears upgraded sonars for Navy India oi-Deepika By Deepika Defence Minister Nirmala Sitharaman on Wednesday cleared two projects related to the Indian Navy, including the purchase of indigenous sonars worth Rs 200 crore for naval ships. Chairing her first Defence Acquisition Council (DAC) meeting, she said holding DAC meets fortnightly will enable speeding up the process of capability development of the armed forces. These sonars are designed, developed and manufactured indigenously by the DRDO and the Naval Physical and Oceanographic Laboratory, Kochi and will provide a significant boost to the Navy's anti-submarine warfare capabilities. The DAC additionally cleared procurement of missiles for replenishing the naval inventory. Sitharaman also reviewed the status of the Capital Acquisition Schemes and directed that the schemes are to be meticulously monitored and brought to maturity within stipulated timelines. OneIndia News (with agency inputs) For Breaking News and Instant Updates Allow Notifications Story first published: Wednesday, September 27, 2017, 19:40 [IST] Only "point of debate" is retrieving Pakistan occupied Kashmir: Jitendra Singh India oi-PTI New Delhi, September 27: Union minister Jitendra Singh has said there is need to "change the discourse" around Jammu and Kashmir as there is no such thing as the Kashmir issue. He stressed that the only "point of debate" is retrieving Pakistan occupied Kashmir (PoK). The minister of state in the Prime Minister's Office said this after paying a pictorial homage to martyrs of Jammu and Kashmir Police and slain Army officer Lt Ummer Fayyaz here yesterday. Lt Fayyaz's Facebook page, letters during his Army training days as well as the photographs of slain J-K officers Mohammed Ayoub Pandith, Feroz Ahmed Dar and others were on display at the event. "There is need to change the discourse (on Jammu and Kashmir) for future generations. We have to change the agenda.There is no such issue as Kashmir issue. It is as much a part of India as Uttar Pradesh, Bihar or any other state. "The only issue if at all is how to retrieve a part of Kashmir which is under the illegal occupation of Pakistan for the past 70 years and restore the Valley in the same format as was handed over by Maharaja Hari Singh," Singh said. He underlined the central government's "proactive" steps in bringing development to the Valley, especially with respect to neutralising extremist forces. "The border dwellers, in spite of the hardships they face, have asked us to take strong action against cross-border shelling. We have given our forces confidence and freedom to act on the borders, and the results are for everyone to see. "We have been able to neutralise many terrorists and foil infiltration bids. Our crackdown on terror funding in the Valley is another step to step towards restoring normalcy in the state," he said. Hitting out at the past political regimes for "mishandling Kashmir", Jammu and Kashmir Deputy Chief Minister Nirmal Singh, who was also present on the occasion, said the Modi government was the only "ray of hope" for the people. "In a first, the Centre and the state government are on the same page with regard to dealing with terrorism and separatism," he said. On questions being raised against the PDP-BJP coalition in the state, the Deputy CM said such an alliance was a "bold decision". "We had to leave a lot of issues dear to us for the larger interest of the state," he said. Union minister Jitendra Singh said the foreign outreach by Prime Minister Narendra Modi was one of the major achievements of the current dispensation at the Centre. "Many nations that were earlier not convinced with India's position on Kashmir have come around. It gives the country a major boost in putting forth its stand on the matter on a global platform," he said. Talking about the return of Kashmiri Pandits to the Valley, the MoS said it was imperative to "create a conducive atmosphere so that the community members returns voluntarily". Former MP Tarun Vijay, who was also present at the event, saluted the sacrifice of civilians, policemen and army personnel who laid down their lives while battling terrorist forces. Srinagar DySP Mohammed Ayub Pandith was lynched to death outside Jamia Masjid in Nowhatta on June 22 while Sub inspector Feroz Ahmed Dar was killed by LeT terrorists in Anantnag on June 16. Lt Fayaz, an Army officer of Rajputana Rifles, was abducted and killed by militants in south Kashmir's Shopian district on May 9 this year. PTI For Breaking News and Instant Updates Allow Notifications Story first published: Wednesday, September 27, 2017, 14:45 [IST] Pacts by Exim Bank under BRICS mechanism gets Cabinet nod India pti-PTI New Delhi, Sep 27: The Union Cabinet on Wednesday approved signing of interbank local currency credit line agreement and cooperation memorandum relating to credit ratings by Exim Bank with member banks under BRICS Interbank Cooperation Mechanism. Exim Bank finances, facilitates and promotes India's international trade. It provides competitive finance at various stages of the business cycle. "The agreements will promote multilateral interaction within the area of mutual interest which will deepen political and economic relations with BRICS nations," an official statement said after the Cabinet meeting chaired by Prime Minister Narendra Modi. As the agreement and the MoU are umbrella pacts and non-binding in nature, the Board of Directors of Exim Bank has been authorised to negotiate and conclude any individual contracts and commitments within their framework. Signing of the agreements, the release said, will position Exim Bank in the international platform along with large development finance institutions like CDS, VEB and BNDES. At an appropriate time, Exim Bank, leveraging this umbrella agreement, could enter bilateral agreement with any of these member institutions to raise resources for its business, it said. "As and when an opportunity arises for co-financing in commercial terms, by any two member institutions (say India and South Africa), lending in single currency by both the institutions would also be possible," it said. The initial Master Agreement on Extending Credit Facility in Local Currency under the BRICS Interbank Cooperation Mechanism had a validity of five years, which expired in March 2017. "It is understood that some of the member banks (like CDB and VEB; CDB and BNDES) have entered into bilateral agreements for local currency financing under the Master Agreement signed in 2012," the release said. It further said although the current conditions are not conducive to usage, it was useful to keep the same alive as an enabling feature in case a suitable opportunity materialises in future. Exim Bank raises resources in the off-shore market in diverse currencies and swaps to mitigate the risk. The umbrella agreement would serve as an enabler to enter into bilateral agreements with member banks. Cooperation Memorandum Relating to Credit Ratings would enable sharing of credit ratings amongst the BRICS member banks, based on the request received from another bank. This, the release said, would be an ideal mechanism to mitigate the credit risks associated with cross-border financing. "In future, such a mechanism could also serve as pre- cursor to the proposal of having an alternate rating agency by BRICS nations," it said. The agreement and the MoU were highlighted in the BRICS Leaders Xiamen Declaration made in Xiamen, China earlier this month. PTI This cop from Pakistan became a millionaire overnight: Here is how With the number of anonymous rogues from Pak rising, here's how BSF is beating down the drones Pakistan shamed at UN: Photographer confirms that picture was taken in Gaza India oi-Vikas By Vikas Pakistan had to cut a sorry figure for showing a fake picture at the United Nations General Assembly in a bid to highlight alleged atrocities in Kashmir. The picture was originally taken by photographer Heidi Levine, who confirmed that it was indeed taken in the Gaza. "I am very surprised to see my photograph being shown at the United Nations. Grateful that media caught and pointed it out.It's unfair for the dignity of Rawya who's still struggling to overcome her injuries," news agency ANI quoted Levine as saying. "Yes, my photograph was taken during the war between Israel and the Hamas controlled Gaza Strip," she added. Pakistan's Permanent Representative at the UN Maleeha Lodhi on Saturday held up a picture of an injured Palestinian girl from Gaza that had been published two years ago by The New York Times claiming she was a victim from Kashmir. In a major embarrassment to Pakistan, Lodhi even claimed that it was a pellet gun victim from Kashmir. In reply, Indian diplomat Paulomi Tripathi held up a photograph of Lt Umar Faiyaz, a young army officer from Jammu and Kashmir who was brutally killed by Pakistan-backed terrorists, and said, "This is a true picture." The Permanent Representative of Pakistan misled this Assembly by displaying this picture to spread falsehood about India. A fake picture to push a completely false narrative," said Paulomi Tripathi. [India nails Pak lie at UN with 'real picture' of slain Kashmiri army officer] Meanwhile, United Nations, General Assembly President Miroslav Lajcak has said that he will "certainly think" about how to deal with the erroneous use of pictures. OneIndia News For Breaking News and Instant Updates Allow Notifications Story first published: Wednesday, September 27, 2017, 16:50 [IST] Amitabh Bachchan reveals he had to get stitches after he cut a vein on his leg Panama papers case: ED summons Amitabh Bachchan, Aishwarya Rai India oi-PTI The Enforcement Directorate has issued notice to actor Amitabh Bachchan and Aishwarya Rai Bachchan with its probe in the Panama Papers case. Officials in the anti-money laundering agency said they had issued notices to the Bachchan family some time back asking them to explain their foreign remittances since 2004 under the Liberalised Remittance Scheme (LRS) of the RBI. They said the Enforcement Directorate has now received their replies to the notices issued under the Foreign Exchange Management Act (FEMA). "The replies have been received. They could be soon summoned as part of the probe," sources said. Amitabh Bachchan's name had cropped in the Panama Papers case which is also being probed by the Income Tax Department. The taxman is probing Bollywood megastar's offshore remittances. Dubbed as Panama Papers , an investigation of a stockpile of records from Panamanian legal firm Mossack Fonseca by the International Consortium of Investigative Journalist had named several world leaders and celebrities who had allegedly stashed away money abroad in offshore companies. PTI Always admired his zeal, energy: PM Modi greets VP Naidu on his birthday 'Ramrajya' not possible without 'Gram Rajya', says Venkaiah Naidu India oi-PTI Vice President M Venkaiah Naidu on Wednesday said it was not possible to achieve 'Ramrajya' without 'Gram Rajya' and that a nation cannot develop without working on its villages. Naidu, who was in Mehsana to inaugurate a water pipeline project under the government's 'Sujalam Sufalam Yojana', also briefly addressed the gathering in Gujarati, a state government release said. The vice president praised the Narendra Modi government at the Centre for undertaking the project to link rivers. "The government is working in the direction of converting 'Swaraj' (self governance) into 'Suraj' (good governance) by ensuring electricity, water and education to all the villages in the country," he said. Naidu laid the foundation stone for six water pipelines as part of a Rs 1,243 crore project, which aims to carry Narmada waters to 195 villages in Mehsana and neighbouring Gandhinagar district for irrigation purpose. The pipelines will connect 245 lakes and checkdams and aim to irrigate 55,640 acres of land. PTI The role ideology played in the Kashmir unrest India oi-Vicky By Vicky The NIA has got more evidence in the terror funding case following the questioning of a PhD scholar from Kashmir. During the questioning of the other accused the names of the scholar and also a trader cropped up. It was found that these persons had played different roles in the case. While one was ideological, the other is suspected to have helped in the movement of funds. NIA officials said that these persons were accused of helping further the unrest in the Valley. It was alleged that they had helped raise, receive, collect funds and also spread the ideology on several forums. Yasin Khan of the Kashmir Traders and Marketing Federation and Aala Fazil, the Ph.D student were the ones to be questioned. NIA sources say that the case is a water tight one and the next to be questioned will be S A S Geelani. He is centric to the probe and following the death of Burhan Wani, he is alleged to have played a major role. The entire probe shows that the entire operation was carried out in a systematic manner. Each of the separatists had played a major role. What was more ironic is that most of these persons became post office for the terrorists too who would collect funds from them. Money was allocated separately to terrorists and the stone pelters. OneIndia News For Breaking News and Instant Updates Allow Notifications Story first published: Wednesday, September 27, 2017, 7:15 [IST] JNU Admissions 2022: PG First merit list to be released today; how to check UGC committee questions disbanding of JNU GSCASH India oi-PTI New Delhi, September: The Jawaharlal Nehru University's decision to disband Gender Sensitisation Committee against Sexual Harassment (GSCASH) was questioned by members of UGC-appointed 'Saksham Taskforce' for ensuring gender sensitisation in universities. In an open letter to the JNU administration, the taskforce committee said, "We are consequently at a loss to understand why a well functioning body in JNU needed to be disbanded. Had we missed some important aspect that we need to know about"? Anjali Bhardwaj, Janaki Abraham, Kulwinder Kaur, Mary E John, Meenakshi Gopinath, Sanjay Srivastava, Susie Tharu and Uma Chakravarti are the members of the taskforce. The JNU administration, which replaced GSCASH with Internal Complaints Committee(ICC), on September 18 in it 269th executive council meeting , was extensively criticised by its students and teacher bodies, apart from women's rights organisations. The administration attributed the dissolution of GSCASH to the UGC's (Prevention, Prohibition and Redressal) of Sexual Harassment of Women Employees and Students in Higher Education Institutions Regulations 2015), which was formed based on Saksham task force committee report. A section of students even approached the Delhi High Court which directed the administration to maintain status quo on the sealing of GSCASH office and sought a reply on the plea. "Our report made it clear that our proposals for the composition of anti-sexual harassment committees were intended for campuses where ICCs were not in existence or were not Vishakha-compliant they were never intended to replace or supersede committees like those of JNU s GSCASH which we had found to be fully Vishakha-compliant," the letter further said. The members of the task force also questioned the varsity's decision in making the newly-formed ICC a nominated body. "The report had specifically advised that ICC members must be representatives and that such representation must not be directly nominated by the employer, rather, transparency and a principled basis for membership on the ICC should be arrived at after involving all sections of the HEI community," the letter said. Meanwhile, GSCASH student election committee has decided to go ahead with its polls to elect four representatives despite resistance from the varsity. JNU chief proctor in a letter said disciplinary action would be taken against Bhagat Singh Saini, chairperson of the disbanded GSCASH Students Election Committee, if he continued to conduct the elections. In another letter that was issued today, varsity Registrar Pramod Kumar said there were efforts to hold "illegal elections to a non-existing body and ICC was the only body responsible to handle sexual harassment complaints". "Appropriate action will be taken against all indulging in illegal activities in JNU," he said. JNUTA president Ayesha Kidwai said the Registrar had no business issuing notices about ICC jurisdiction, in reply to the later's letter. PTI For Breaking News and Instant Updates Allow Notifications Story first published: Wednesday, September 27, 2017, 9:49 [IST] India's stand on Rohingyas gracious so far but housing them would be risky Varun Gandhi supports asylum for Rohingyas, BJP fumes India oi-Oneindia By Oneindia New Delhi, Sep 27: As a raging debate is going on in the country over the controversial issue of deporting Rohingyas, who are currently facing violence and persecution in Myanmar, Bharatiya Janata Party (BJP) leader Varun Gandhi has spoken in favour of giving them asylum in India. Varun expressed his opinion in regard to the minority Rohingyas from Myanmar in an article in the Hindi daily, Navbharat Times. "My recent piece focused primarily on defining India's asylum policy, with clear demarcations on how we would accept refugees," Varun wrote on Twitter. "As for the Rohingyas, I've called for empathy, leading potentially to asylum, while vetting each applicant for national security concerns." The Member of Parliament (MP) from Sultanpur, Uttar Pradesh, took a completely different stand from what the ruling BJP had to say over the entire matter. In a recent affidavit to the Supreme Court, the Narendra Modi government outlined its plan to deport around 40,000 "illegal Rohingya immigrants", staying in various parts of the country, as they pose "security threat" to India. Varun's opinion in the Hindi daily evoked sharp reactions among his colleagues in the BJP. Union minister Hansraj Ahir said those who have national interest in mind should not make such statements. Ahir, while criticising Varun's stand, told reporters that, "Jo desh ke hith mein sochenga woh is tarah ke bayan nahi dega (Anyone who has national interest in mind, won't make such statements)." Last week, home minister Rajnath Singh said Rohingyas were not refugees who have applied for asylum in India but illegal immigrants who "will be deported". The BJP, in its national executive meeting on Monday, adopted a resolution supporting the government's stand on the Rohingya issue, saying it fulfilled its responsibilities by providing humanitarian relief to Bangladesh for Rohingya refugees while ensuring that internal security was not compromised for its 125 crore citizens. This is not for the first time Varun's opinions have clashed with that of the BJP. Early this year, Varun decided to stay away from campaigning in the UP Assembly elections after his name did not appear in the list of the BJP as its campaigner in the initial days. The BJP included Varun's name as one of its campaigners at a later stage which angered him, says a BJP insider. Meanwhile, two Rohingyas have submitted a counter affidavit in the apex court saying that they have come to India as they faced violence and persecution in Myanmar and as per the international laws they are refugees and India should let them stay in the country. According to an estimate by the United Nations (UN), around four lakh Rohingyas have fled from Myanmar to Bangladesh in the last one month after they faced violence and persecution in their "homeland". OneIndia News West Bengal Group D Result 2017: Interview call letter released, how to download India oi-Vicky By Vicky The West Bengal Group D Result 2017 has been declared and the interview call letter has been released. The results are available on the official website. The interviews would be held from October 16 2017 onwards. There are WBGDRB has selected candidates three times the total number of 6,000 vacancies. The provisionally qualified aspirants, according to the official results statement published by WBGDRB, will be informed about the West Bengal Group D Recruitment Interview schedule either through sms or email in their registered Mobile number or email Id. The OMR sheets of the candidates, who appeared in the West Bengal Group D written examination have been scanned and evaluated electronically, said a statement from the organisors. Approximately, three times the total number of 6000 Group D vacancies will be intimated for the interviews. The candidates who are selected after the West Bengal Group D written exam, on the basis of the provisional Merit list will be called for Interview in a phased manner. The West Bengal group D interviews are proposed to start from October 16, 2017, said a statement. The recruitment of group D employees is being organised in West Bengal after a long interval. The last Group D recruitment was done during the erstwhile Left Front regime. The results are available on wbgdrb.in. West Bengal Group D Result 2017, download call letter: Click on download your interview call letter Enter nine-digit application number and date of birth on the next page Submit the details and download your call letter Take a printout OneIndia News For Breaking News and Instant Updates Allow Notifications Story first published: Wednesday, September 27, 2017, 8:06 [IST] India's first Night Sky Sanctuary to be set up in Ladakh to boost Astro tourism in India On Sonali Phogat's death, Goa min says not every event in state should be linked to tourism How will Germany's tourism industry get through the winter? Why PM Modi has urged everyone to visit Nadabet, the 'Wagah of Gujarat' World Tourism Day: PM invites foreigners to explore 'Incredible India' India oi-Chennabasaveshwar By Chennabasaveshwar Prime Minister Narendra Modi welcomed people from all over the world to explore 'Incredible India' and hospitality of Indians on the occasion of World Tourism Day. PM Modi took to twitter to offer the invitation, also urged youngsters to travel across India and experience the the diversity of the country. "On World Tourism Day, I invite people from all over the world to come & discover the beauty of Incredible India & hospitality of our people," he tweeted. On #WorldTourismDay, I invite people from all over the world to come & discover the beauty of #IncredibleIndia & hospitality of our people. Narendra Modi (@narendramodi) September 27, 2017 "I specially urge my young friends to travel across India & see first hand the diversity of our vibrant nation," he said. I specially urge my young friends to travel across India & see first hand the diversity of our vibrant nation. #WorldTourismDay Narendra Modi (@narendramodi) September 27, 2017 PM Modi had talked about tourism and its benefits during 'Mann Ki Baat' last Sunday. Here is what I said on tourism and its benefits during #MannKiBaat last Sunday. https://t.co/zZk6HyCdUl #WorldTourismDay Narendra Modi (@narendramodi) September 27, 2017 Separately, Union Tourism Minister K J Alphons has called upon the youths to make India a better place by keeping the surroundings clean and thus promote tourism. "India, with 5,000 years old civilisation, amazing culture, beaches, back waters, hill stations and philosophical school of thoughts, is lagging behind in tourism," Tourism minister Alphons said. The tourism minister called upon youths to carry in their hearts a mission to make India a better place and to take steps to ensure that in the next five years, over 25 million come to the country every year. PTI Murmu vs Sinha: India to get its 15th President today; Counting begins at 11 am Cross-votes for Murmu, TMC's abstinence from VP Poll: All's not well in opposition's camp Will not join any other political party: Yashwant Sinha Yashwant Sinha has echoed our criticism of Government: Chidambaram India oi-Chennabasaveshwar By Chennabasaveshwar After tweeting in support of Yashwant Sinha's article over BJP government's poor performance, former Finance Minister P Chidambaram once again slammed the incumbent government for mismanagement of the economy . In a press conference, Chidambaram said the Congress has exposed many weaknesses in the economy and the terrible mismanagement. He said, "We are happy that Mr Yashwant Sinha has echoed our criticism (of the Govt)." He stated that Congress has, for nearly 18 months, highlighted these very grave weaknesses in economy, adding " We were told, in effect, to shut up." He also said the GST design was itself flawed and the implementation of the tax regime was, indeed, terrible. "As I travel around the country, what I hear is "Achhe din to aaye nahi, ye bure din kab jaayenge?" My appeal to all, especially those knowledgeable about economy, is to speak and write without fear; Darr ko chhod do," he added. OneIndia News For Breaking News and Instant Updates Allow Notifications Story first published: Wednesday, September 27, 2017, 17:09 [IST] Murmu vs Sinha: India to get its 15th President today; Counting begins at 11 am 163 killed, 91 missing in attacks by Rohingya Muslim militants: Myanmar Govt International oi-PTI Yangon, September 27: Myanmar government officials said at least 163 people have been killed and 91 others have gone missing over the past year in attacks carried out by Rohingya Muslim militants in Myanmar's restive Rakhine state. The comments yesterday came after the bodies of at least 45 Hindus were discovered in three mass graves earlier in the week. The government blames Muslim insurgents for the killings. The government's Information Committee released a statement on its Facebook page saying that from October 2016 to August 2017, at least 79 people were killed in the attacks and 37 have gone missing, including local officials, public servants and security forces. Another 84 were killed and 54 have gone missing since Aug. 25, when the Arakan Rohingya Salvation Army, or ARSA, launched attacks on at least 30 police outposts. The government had previously said that nearly 400 alleged insurgents had been killed since August 25. On Monday, Myanmar officials said they had discovered at least 45 slain Hindus in three mass graves in conflict-torn northern Rakhine state. Twenty-eight were uncovered from two mass graves on Sunday and 17 were discovered in a different mass grave in the same area on Monday. Local authorities said the 45 bodies were among about 100 Hindus missing since ARSA carried out the simultaneous attacks on the police outposts. "We are still searching for more mass graves in that same area," said Maj Zayar Nyein of Border Guard Police Headquarters in Maungdaw. "I don't know exactly why these terrorists killed that many people. The Hindu village was very much up north and communication was not that good, and that's why security forces were not able to reach out to the area sooner." There was no immediate way to independently verify the government's assertions. A government crackdown that followed the attacks left more than 200 Rohingya Muslim villages burned and sent at least 420,000 Rohingya fleeing into Bangladesh. Hindu families who crossed from Myanmar to Bangladesh to flee the violence said their family members and relatives were among those who were killed and buried in the shallow mass graves that were discovered this week. Hindu women who are now in refugee camps in Bangladesh told The Associated Press that the attackers killed their family members and relatives and later brought them to Bangladesh. "Most of our neighbors are Muslims," said Bina Sharma, a Hindu villager who survived the violence. "Masked men threatened us and asked us to give them cash and gold. Later they killed 10 of my family members. They brought us to Bangladesh and confined us in a camp. They wanted to torture and kill us, but we told them we would convert to Islam and abide by the rules, but later with the police help we were taken to a refugee camp." Meanwhile, a Japanese doctor who just returned from the Rohingya refugee camps in Bangladesh said the situation there was "extraordinary." Masamichi Yokoe, who was a part of the Japanese Red Cross Society advanced relief team, said in addition to suffering from malnutrition and poor sanitation, many of the refugees appeared to be traumatized by the violence they encountered in Myanmar. Yokoe said the rapid speed of the refugees arriving at the camps is "abnormal" and making it difficult for aid workers to assess whether sufficient aid is coming in. PTI For Breaking News and Instant Updates Allow Notifications Story first published: Wednesday, September 27, 2017, 17:15 [IST] Major fire at ammunition depot in Ukraine prompts evacuation International pti-PTI Kiev, Sep 27: A fire tore through a major munitions depot in Ukraine, setting off artillery shells, forcing the closure of airspace for 50 kilometres around and the evacuation of residents, officials and reports said. The fire broke out at around 10pm near the town of Kalynivka in the central Vinnytsia region, the Ukrainian army high command said on Facebook. It was the second major incident affecting a Ukrainian weapons depot this year. And while the cause was not immediately clear, military authorities were investigating the possibility of sabotage or negligence. Police spokesman Yaroslav Trakalo said the fire had caused artillery shells at the facility to explode one after the other, news outlet Pravda said on its website. It was not immediately clear how extensive the damage from the explosions was but local media described the depot as one of the largest in the country. Local authorities said they had ordered the evacuation of Kalynivka and two neighbouring villages, while urging people not to panic. "Airspace has been closed in a radius of 50 kilometres around the area of the fire," deputy infrastructure minister Yuriy Lavrenyuk said on Facebook. Prime Minister Volodymyr Groysman arrived at the site shortly after midnight to coordinate the emergency response, his office said. The city of Vinnytsia, the administrative centre of the region, was not in danger, its mayor said. Some road and rail traffic in the region had been affected by the blast. In March, at least one person was killed when an arms depot exploded in the town of Balakliya, in the east. Authorities at the time pointed the finger at Moscow and pro-Russian separatists fighting Ukrainian troops in the east, and said they were considering the possibility that the fire was caused by explosives dropped from a drone. Vinnytsia lies around 200 kilometres west of Kiev, far away from the area where Ukrainian troops have been fighting pro-Russian rebels since 2014 in a conflict that has left more than 10,000 people dead. Kiev and many Western countries accuse Moscow of supporting the insurgents, which Russia vehemently denies. The conflict broke out after Moscow annexed the Black Sea peninsula of Crimea from Ukraine in March 2014, soon after the overthrow of Ukraine's pro-Russian president Viktor Yanukovych following mass protests in Kiev. PTI Pak Minister Ishaq Dar indicted by anti-corruption court International pti-PTI Islamabad, Sep 27: Pakistan's Finance Minister Ishaq Dar was indicted by an anti-corruption court on Wednesday even as he pleaded not guilty to possessing assets beyond his means. Dar's indictment comes a day after the Accountability Court decided to indict Sharif on October 2 after the former prime minster for the first time appeared before it to face graft charges against him in the Panama Papers scandal. The 67-year old minister pleaded not guilty to all charges against him, terming them baseless. Dar was swept up in the corruption case stemming from documents leaked from a Panama law firm, which appeared to show that senior officials, including Sharif, had undisclosed assets. Anti-corruption watchdog National Accountability Bureau (NAB) on September 8 filed the case against Dar, 67, for possessing assets beyond his known sources of income following the July 28 verdict of the Supreme Court. The apex court had disqualified Sharif as the prime minister and ordered corruption cases against him, his children Maryam, Husain and Hasan and son-in-law Muhammad Safdar. Chaos prevailed outside the accountability court when Dar arrived for the hearing. The doors to the court were shut for reporters, and the finance minister had to wait at least 20 minutes before he was allowed to enter the court premises from the back door. The minister refused to accept the charges read out by accountability court judge Muhammad Bashir and said his assets were in accordance with income and he will prove it with evidence during the trial. The court ordered the NAB to present evidence and the NAB prosecutor submitted a list of 28 witnesses whom it would present in the court to testify in support of the charges. Dar also appealed to the court to allow him to skip personal appearance during the trial and the court said it will decide later. The court adjourned hearing till October 4 though it earlier decided to conduct day-to-day hearings in the case. Under Pakistan's laws, Dar can continue to work as a minister until he is found guilty. However, opposition leaders have asked him to resign on moral grounds. Minister of state for information Tariq Fazal Chaudhry told media that Dar was not given mandatory seven days before indictment which was against the NAB laws. "Dar has been indicted today though our lawyer urged the court to postpone indictment and give seven days from September 25 when the court decided to indict him, he said. Chaudhry said that the court has summoned evidence on October 4. "Initially two bankers have been summoned as witness on the next hearing but the prosecution plans to present more witnesses in the case during the trial," he said. Arif Chaudhry, President Islamabad High Court Bar Association, said that evidence of prosecution will be important as the court would decide the case on the basis of it. "The evidence will be judged and defence lawyers will be given an opportunity to present counter evidence to reject the charges," he said. Rana Sanaullah, law minister of Punjab Province and a vocal member of ruling Pakistan Muslims League-Nawaz (PML-N) rejected the charges against Dar. "The charges and indictment of Dar is a joke," he said. Dar has close familial ties to former Sharif. Dar's son has been married to Sharif's daughter Asma Nawaz. He was also imprisoned when the Sharif government was toppled in 1999. He was under pressure by the Opposition to resign after the NAB filed case against him but so far he has refused to do so. The NAB has filed three cases of corruption and money laundering against Sharif, his sons -- Hassan and Hussain, daughter -- Maryam, son-in-law -- Safdar, and Finance Minister Dar in the Accountability Court in Islamabad and Rawalpindi recently. Sharif's family has alleged that the cases are politically motivated. PTI From hijab to Kashmir, Zawahiri was Al-Qaeda's voice for everything anti-India For the dark rule in Afghanistan, blame is on the US Kabul Airport attack: Narrow escape for 180 SpiceJet passengers International oi-Madhuri Recommended Video Afghanistan airport come under attack as US Defense Secretary Jim Mattis arrives | Oneindia News Nearly 180 passengers and crew on board a Delhi-bound SpiceJet plane from Kabul had a narrow escape today when the Taliban launched a rocket attack on the Hamid Karzai International Airport in the Afghan capital. The rocket attack started at around 1.15am with eyewitnesses saying as many as 20-30 were fired at airport. However, Najib Danish, the acting spokesman for Interior Ministry, said that the rockets left no casualties. According to Afghan media, flights have been cancelled and airport is being evacuated. Meanwhile, at a joint press conference with US Secretary of Defence James Mattis and President Ashraf Ghani, NATO chief Jens Stoltenberg said Wednesday's attack on Kabul airport was a sign of weakness on the part of the Taliban. Meanwhile, two more explosions reported in vicinity of airport in Kabul city following earlier rocket attack. The Taliban claimed responsibility for the attack and said the target had been Mattis. Mattis is the first member of the US president's cabinet to visit Afghanistan since the strategy announcement to keep American boots on the ground there indefinitely. The unannounced high-level visit comes as Afghan security forces struggle to beat back the Taliban which has been on the offensive since the withdrawal of US-led NATO combat troops at the end of 2014. OneIndia News Sri Lanka vs Pakistan: When and where to watch Asia Cup 2022 Final Match live online? Rohingyas attacked in Sri Lanka: Govt condemns mob violence International pti-PTI Colombo, Sep 27: The Sri Lankan government on Wednesday condemned the conduct of a group of Buddhist monks who mobbed a UN-run safe house for Rohingya Muslims, claiming that they were terrorists and should be sent back to Myanmar. Dozens of protesters from Sri Lanka's majority Buddhist community led a mob that entered a multi-storied house on the outskirts of the Sri Lankan capital yesterday following which about 30 Rohingya Muslims were taken into police custody to be moved to a safe location. Sri Lankan government spokesman and Health Minister Rajitha Senaratne slammed the conduct of the monks and the police over the harassment of Rohingya refugees lodged here. "This behaviour was most disrespectful of Buddhism," Senaratne said, adding that police behaviour also needs to be questioned as they allowed the monks to threaten the refugees. A spokesman from the nationalist group Sihala Ravaya' yesterday said they had raided a house in the Colombo south suburb of Dehiwela. "There were 32 of them, their children are even attending school here," he said. Senaratne said that Rohingya refugees have been in Sri Lanka since 2008 and yet monks were protesting only now. The mob led by the monks had called for their eviction. Officials said the group which included 16 children had been allowed to remain under the aegis of UN pending repatriation. The UNHRC Colombo office said they were alarmed and concerned. "UNHCR urges the public and all those concerned with refugees to continue extending protection and to show empathy for civilians fleeing persecution and violence," it said in a statement. More than 436,000 refugees have crossed the border from Myanmar's Rakhine state since August 25 when a military crackdown was launched following attacks on security forces allegedly by Rohingya militants. PTI Published September 27, 2017 by Sol FH After a thrilling night in the Champions League last night, the action continues tonight with some key matches across Europe. The biggest match of the night is between Atletico Madrid and Chelsea, who go head-to-head from Wanda Metropolitano stadium in Madrid. Atletico has been incredible against the Blues, going unbeaten in their last four matches against them, including two wins and two draws. Tonight, Antonio Conte will be going for his second straight Champions League win but needs to overcome the odds in order to do so. Chelsea opened their Group Stage campaign with a 6-0 thrashing of Qarabag. Atletico opened with a scoreless draw against Roma, but they have an excellent record against the Blues, especially at home. In fact, under Diego Simeone, Atletico have won 18 of their last 23 Champions League matches when playing on home turf. Chelsea, however, is unbeaten in their last 9 away games in Spain, with 2 wins and 7 draws. Injuries Chelsea is in great shape with only one player on the injured list. Danny Drinkwater is still out with a calf injury. Conte will be considering starting Belgium star Eden Hazard after his recovery, having only been substituted on in recent Premier League matches. The midfielder scored 16 goals in last season's league-winning campaign and Conte hopes to have him on the pitch for as long as possible tonight. Augusto Fernandez is the only player missing from Atletico's lineup and the Central Midfielder is expected to make his return sometime next month. Not injured, Diego Coste completed his move from Chelsea to Atletico but he is not eligible to play until the transfer window ban is lifted in January 2018. Champions League Betting At bet365 Sports, the Champions League gets the utmost focus and this blockbuster match has 121 different betting markets to choose from. Chelsea is the underdog to win at 3.80, whilst Atletico is in the driver's seat at 2.20. Article Not Found Sometimes, authors delete their articles after publishing them. To see if the article was renamed or re-published, please click here. Quicklink Not Found Sometimes, authors delete their quicklinks after publishing them. To see if the quicklink was renamed or re-published, please click here. See original here By *Adam Johnson Journalist Alexei Wood being arrested by a DC police officer while covering the inauguration protests (Image by Lex Shoots) Details DMCA For over two years, many in corporate media have been trumpeting the looming threat to a free press posed by Donald Trump. "Would President Trump Kill Freedom of the Press?" Slate (3/14/16) wondered in the midst of the primaries; after the election, the New York Times (1/13/17) warned of "Donald Trump's Dangerous Attacks on the Press," and the Atlantic (2/20/17) declared it " A Dangerous Time for the Press and the Presidency." Reporter Aaron Cantu (Image by Santa Fe Reporter) Details DMCA It's strange, then, that the attack on the press that kicked off the Trump administration -- the arrest and subsequent threatening of two journalists with 70 years in prison -- has been met with total silence from most of these same outlets. Aaron Cantu, Santa Fe Reporter staff writer and editor at the New Inquiry (and a contributor to FAIR.org), and professional photographer Alexei Wood are both facing decades in prison for the act of covering the January 20 unrest in DC -- charged with felony rioting for little more than being in the proximity of window-breaking and brick-throwing. (Prosecutors initially brought and then dropped felony charges against six other reporters, though how their cases differ from Cantu and Wood's is unclear.) ACLU lawyer Scott Michelman insists that these arrests "punish journalists for being near the action" and will "inevitably chill freedom of the press and, with it, First Amendment rights not only of the journalists themselves, but of all of us." The three most influential media reporters in US media -- CNN's Brian Stelter, New York Times' Jim Rutenberg and Washington Post's Erik Wemple -- have completely ignored the felony rioting charges leveled against the two #J20 journalists altogether. In their dozens of columns, reports, and on-air segments since the arrests nine months ago, neither Stelter nor Rutenberg nor Wemple has made a single mention of the reporters facing jail time. "Top Journalists Warn of Threats to Press Freedom Under Trump," warned Stelter (11/22/17) right after Trump's election. Citing his boss (and the person most responsible for Trump) CNN head Jeff Zucker and his colleague Christiane Amanpour, Stelter sounded the alarm on the authoritarian tendencies of the incoming Trump regime. Jim Rutenberg (7/2/17) later joined in with a Fourth of July-themed breakdown of press freedoms under siege by the Trump administration. Rutenberg lamented Trump's "personal attacks against journalists," mean GIFs and misuse of the "fake news" label, as well as Republican politician Greg Gianforte's body-slamming Guardian reporter Ben Jacobs. But Rutenberg, like Stelter, was entirely silent on the Trump Department of Justice threatening two journalists with generations in prison for the crime of reporting. For some unknown reason, this doesn't register as an attack on the press. The Post's Erik Wemple -- though not as vocal in his warnings about Trump's attacks on press freedom as Stelter and Rutenberg -- still holds one of the most influential media columns in the country. His total silence also speaks to the broader near-blackout on the #J20 mass arrest and prosecution. As FAIR (7/13/17) has noted before, corporate media have expressed collective indifference to the unprecedented mass arrests of the #J20 protesters, while moral-grandstanding at the Russian government for its mass arrests of protesters in June. The Times' Rutenberg found time for not one, not two, but four different articles (9/18/16, 12/4/16, 4/17/17, 9/17/17) on the corrosive effects on American democracy of the Russian government-run outlet RT (Russia Today) -- a network that reaches less than 30,000 people per show, or roughly 0.3 percent of the ratings of Judge Judy. Evidently, the topic of RT needed more attention, since profiles in PBS, Fortune, Politico (fourof them), Time Magazine, Washington Post (halfdozen or so), Mediaite, The Guardian, Bloomberg, Foreign Affairs, Wall Street Journal, Daily Beast, National Review, Christian Science Monitor, Slate, Washington Times, BuzzFeed, New York Times (another Times profile) and Huffington Post were presumably not enough. The fact that there are millions more Americans reading profiles hand-wringing over RT than actually watching it wouldn't stop intrepid media critic Jim Rutenberg from speaking truth to power...in another country. Stelter and Rutenberg would not respond to FAIR's request for comment. Wemple told FAIR, "There are hundreds of worthy and important stories that I don't get to." But for journalists covering US media in 2017, the prosecution of Cantu and Wood is not just another story: These are journalists facing decades in prison for doing exactly what journalists are supposed to be doing -- covering the opposition to an administration that establishment media reporters have been warning about since 2015. *Media watchdog Fairness & Accuracy In Reporting (FAIR), journalist Adam Johnson Mt. Bental, Golan Heights, Israel (Image by tcees) Details DMCA Franklin Lamb Oxford For Israel, the initial phase of its next long predicted war with Hezbollah is focused on neutralizing Iranian arms shipments to Hezbollah while destroying factories allegedly under construction to build long-range missiles. Some Israeli recently bombed sites are also claimed to have been housing chemical weapons. Earlier this month Israeli jets attacked a Syrian military installation near the city of Masyaf that allegedly produces chemical weapons and advanced missiles. Israel has recently increased its targeting of claimed Hezbollah/Iranian sites followed by diplomatic warnings by Israel's leadership that it will not accept an enhanced Iranian and Hezbollah presence on its northern borders. Israel has bombed more than 100 targets since 2011 including some Iranian positions around Damascus military airport, West and South Syria as well as in Lebanon's Bekaa valley and down south. The latest reported attack comes only days after Israel shot down an Iranian-made drone operated by Hezbollah after it entered the demilitarized zone along the border between Israel and Syria on the Golan Heights. Israel insists that it will continue to target Hezbollah's expanding military operations in Syria and in Lebanon. In addition, this month (9/2017) Israel conducted the largest military exercise in decades in what an IDF/IAF spokesperson suggested was a rehearsal for the certain coming war with Hezbollah. While Israeli rhetoric has focused attention on the widely predicted soon to ignite Hezbollah-Israel war, it is Hezbollah which has this month launched the first stage of its fateful war with Israel. Its activation this month of more than a dozen intense initiatives includes but is not limited to those noted below and they enumerate how Hezbollah intends to achieve another Devine Victory by being adjudged the winner of the approaching conflagration. For security reasons, other Hezbollah initiatives now being activated have been omitted from discussion for the time being per a request from Hezbollah's politburo. Despite its November 2013 offensives in the strategic Qalamoun region close to the Syria-Lebanon border as an insurgency and then recently switching to becoming a counter-insurgency / conventional force in Syria, Hezbollah will discard the conventional force model to battle Israel. Especially in the early stages of the coming conflict according to a Party of God official in Damascus. Next Page 1 | 2 | 3 | 4 (Note: You can view every article as one long page if you sign up as an Advocate Member, or higher). See original here By Jen Hayden The hangover from the Emmy Awards is finally wearing off and things are getting more serious now for the former White House spokesman. The Daily Beast reports Sean Spicer has lawyered up: "The president's former press secretary has tapped Chris Mead, a high-powered criminal defense attorney based, to handle issues related to the special counsel Robert Mueller's probe, The Daily Beast has learned. "According to his bio page at the firm London & Mead, Mead specializes in white collar criminal defense and Congressional investigations, as well as issues related to the Foreign Corrupt Practices Act -- a law that bars Americans from bribing foreign government officials. His law firm bio also boasts that he gained 'extensive experience in money laundering' prosecutions when he was a prosecutor for the U.S. Attorney for the District of Maryland." In fact, three of Mead's specialty areas might be/are of particular interest: Foreign Corrupt Practices (FCPA) Investigations Chris has represented a nationally-elected leader of a large African country and his wife in a Foreign Corrupt Practices investigation. He has represented corporate employees in FCPA investigations. Congressional Committee Investigations Chris has represented business owners, lawyers, and government officials called for testimony before House and Senate committees. Public Corruption/Election Law Violations Chris has represented congressional staffers in public corruption and election law investigations. He was part of the defense team for a major D.C. developer charged with public corruption violations. After a successful trial defense, the client received probation. The move comes after Mike Allen at Axios drew attention to Sean Spicer's habit of meticulously taking notes in every meeting: "Now we can tell you about another potential honey pot for Mueller. Former colleagues of Sean Spicer tell Axios that he filled 'notebook after notebook' during meetings at the Republican National Committee, later at the Trump campaign, and then at the White House. "When Spicer worked at the RNC, he was said to have filled black books emblazoned with the party's seal. Spicer was so well-known for his copious notes that underlings joked about him writing a tell-all." Next Page 1 | 2 (Note: You can view every article as one long page if you sign up as an Advocate Member, or higher). From Consortium News Map of Mexico (Image by nathanh100) Details DMCA The earth under Mexico continues to shake and Mexicans continue to sleep with one eye open, ready to take to the streets when the next quake hits. Indeed, a strong tremor in southern Mexico temporarily suspended the search for survivors of last week's damaging earthquake in Mexico City. On Saturday, Mexicans rushed into the streets as alarms sounded all over Oaxaca, some 300-plus miles south of Mexico City. Tremors from the 6.1 quake on Saturday were felt in various parts of Mexico City, where people also took to the streets as earthquake warning alarms sounded. Last week's 7.1 quake in Mexico City has claimed the lives of over 300 people and counting, as rescue crews continue to dig through the rubble for possible survivors. As of this writing, there were reports of people still trapped in different locations around the sprawling city, and the Mexican government's response, according to many reports, has been inadequate. I spoke late Monday to Pacifica's Flashpoints Special Correspondent Molly Kate Goss for an update on the situation on the ground. Goss said the recovery is going slowly and that civil society continues to play a major role in offering assistance to those who were most affected by the quake. Dennis Bernstein: Why don't you give us a sense of what happened over the weekend and what these latest quakes and tremors are doing to people's nerves? Molly Goss: At about 7:50 on Saturday morning I woke up to the earthquake alert and couldn't believe I was hearing it again. This is the third major earthquake in two weeks. I definitely think that people's anxiety level has gone up a lot. I am from Northern California where we have a lot of quakes and I have never been very afraid of them until now. Many people will tell you it is difficult for them to get to sleep, it is difficult every time they hear an ambulance go by. This quake was a little over six on the Richter scale. People are trying to return to their lives to a certain extent. A lot of restaurants and shops are open, though most of the schools in Mexico City are still closed. When you go out to the sites where they are looking for people, there are still hundreds of people waiting to help out in whatever ways they can. DB: People don't even really know at this point how dangerous each building is. MG: There are so many things we don't know. We don't know which buildings are unsafe to inhabit. There is a lot of uncertainty about many of these buildings. In the 1990's there was a huge push toward building very tall buildings here. Now there are questions about whether those buildings have the correct permits and who issued those permits. In the weeks and months and years to come, there is going to be a lot of questioning about the urbanization that has been going on in Mexico City for the last couple decades. DB: Did you say that people are still looking for survivors under the rubble? MG: At one site about 20 minutes from here, they are still looking for upwards of 40 people on the fourth floor of a six-floor building. In the last couple of days they haven't reached anyone but they are still there. Family members staged a protest today complaining that the government, with the navy and the army, are not giving them the correct information. In situations like this in Mexico, many people don't believe the government. There are many reports of the government not letting in civilians, who are turning up at these sites in the thousands. Right now the major issue for many Mexicans is that they don't want the heavy equipment brought in yet. In 1985 people were found at least a week after the earthquake occurred. People don't want the tractors and other heavy equipment to go in yet because that could lead to the deaths of their loved ones. Next Page 1 | 2 (Note: You can view every article as one long page if you sign up as an Advocate Member, or higher). Colin Kaepernick (Image by BlueberryFiles) Details DMCA [...this is part 2. For part 1 you can find it HERE ] My TV is off and the network is too. There will be some fans that lose their loyalties to the League and stop consuming their brand. Good. This will only accelerate the punitive effects of mistreating players who elect to exercise their right of free speech. Kaepernick hasn't called for a boycott, but that doesn't mean we won't. The longer he's kept out of the League the more protests; the more damage to the NFL. So what? If the price of exercising our Constitutional rights is to end a sport that leaves its players permanently brain damaged, then so be it. If the NFL is so anti-American as to deny its players a right to play simply because the act of kneeling is destructive to their brand image, then let it be even more destructive and costly. The New York Times reports that at least six members of the Trump administration used personal email accounts to discuss White House matters. Given president Donald Trump's campaign and post-campaign harping (as the Times puts it) on former Secretary of State Hillary Clinton's illegal use of a private server and mishandling of classified information, it's unsurprising to hear charges of hypocrisy from Democratic quarters. But the hypocrisy here a matter of political class elitism, not partisan politics. Those in power, regardless of party, want to know what you're doing, but think what they're doing is none of your business (except when they send you the bill for all of it). The US government and its state and local subsidiaries operate the largest and most far-reaching surveillance apparatus in the history of humankind. Their intelligence and police agencies intercept, analyze and catalog our phone calls and emails, create and install malware on our computers to keep track of what we do online, and watch us via satellite and over vast networks of cameras in public areas. They track our activities using our Social Security numbers, drivers' licenses, car VINs and license plates, banking and employment information, and electronic device IP address and MAC IDs. Modern America puts the Third Reich's death camp tattoo system and the Soviet Union's internal passport scheme to shame in this respect. Whenever we mere mortals notice and complain about any aspect of this surveillance state, the response consists of operatic appeals to "national security," "fighting crime," and other variations on the theme of "we're just trying to protect you." But whenever an Edward Snowden or Chelsea Manning or Julian Assange pulls back the curtain, revealing crimes committed by the political class, all hell breaks loose. How DARE these pesky whistle-blowers show the serfs that their emperor isn't just naked, but also killing and stealing on a scale that would make Ted Bundy and Bernie Madoff blush? And how dare the serfs notice? Excuse me for a moment while I break out the world's smallest violin and compose "Dirge for the Lost Privacy of Sarah Palin, Hillary Clinton, Jared Kushner, Stephen Bannon, Reince Priebus, Gary Cohn, Ivanka Trump and Stephen Miller." So long as American politicians and bureaucrats continue to put the rest of us under a magnifying glass, they deserve no sympathy when they get caught trying to hide their own actions from public view. See original here Syria is bracing for a U.S. attack and the Russians are helping the Assad government. (Image by YouTube, Channel: CNN) Details DMCA Something rather unprecedented just happened in Syria: US backed "good terrorist" forces attempted a surprise attack against Syrian government forces stationed to the north and northeast of the city of Hama. What makes this attack unique is that it took place inside a so-called "de-escalation zone" and that it appears that one of the key goals of the attack was to encircle in a pincer-movement and subsequently capture a platoon of Russian military police officers deployed to monitor and enforce the special status of this zone. The Russian military police forces, composed mainly of soldiers from the Caucasus region, fought against a much larger enemy force and had to call for assistance. For the first time, at least officially, Russian special operations forces were deployed to rescue and extract their comrades. At the same time, the Russians sent in a number of close air support aircraft who reportedly killed several hundred "good" terrorists and beat back the attack (Russian sources speak of the destruction of 850 fighters, 11 tanks, three infantry fighting vehicles, 46 armed pickup trucks, five mortars, 20 freighter trucks and 38 ammo supply points; you can see photos of the destroyed personnel and equipment here). What also makes this event unique is the official reaction of the Russians to this event. Head of the Main Operations Department at Russia's General Staff Colonel General Sergei Rudskoi declared that: "Despite agreements signed in Astana on September 15, gunmen of Jabhat al-Nusra and joining them units that don't want to comply with the cessation of hostilities terms, launched a large-scale offensive against positions of government troops north and northeast of Hama in Idlib de-escalation zone from 8 am on September 19 (...) According to available data, the offensive was initiated by American intelligence services to stop a successful advance of government troops east of Deir ez-Zor." Today, other Russian officials have added a not-so-veiled threat to this accusation. The Russian Defense Ministry's spokesman, Major General Igor Konashenkov has declared that: "Russia unequivocally told the commanders of US forces in Al Udeid Airbase (Qatar) that it will not tolerate any shelling from the areas where the SDF are stationed (...) Fire from positions in regions [controlled by the SDF] will be suppressed by all means necessary." This is unprecedented on many levels. First, the Russians clearly believe that this attempt to kill or capture a platoon of the Russian military police was planned by the United States. The fact that they are making this accusation officially shows the degree of irritation felt by the Russians about the duplicity of the Americans. Second, this is the first time, at least to my knowledge, that Russian Spetsnaz forces had to be sent in to rescue a surrounded Russian subunit. All Spetsnaz operators survived, but three of them were wounded in the operation (the Russians are not saying how badly). The close air support by very low flying SU-25 aircraft was obviously coordinated by Spetsnaz forward air controllers and probably saved the day. In other words, this was a close call and things could have ended much more badly (just imagine what the Takfiri crazies would have done, on video, to any captured Russian serviceman!). Finally, a US-organized attack on what was supposed to be a "de-confliction" zone combined with an attempt to capture Russian soldiers raises the bar for American duplicity to a totally new level. The big question now is "do the Russians mean it?" or are they just whining with real determination to hit back if needed. There are a couple of problems here. First, objectively, the Russian contingent in Syria is a tiny one if compared to the immense power of CENTCOM, NATO and the ever-present Israelis. Not only that, but in any US-Russian confrontation, Russia as a country is objectively the weaker side by any measure except a full-out nuclear exchange. So the Russians are not in a position of force. Furthermore, for historical and cultural reasons, Russians are much more concerned by the initiation of any incident which could lead to all-out war than the Americans who always fight their wars in somebody else's country. This might seem paradoxical, but the Russians fear war but they are ready for it. In contrast to the Russians, the Americans don't fear war, but neither are they ready for it. In practical terms this means that an American miscalculation could very well lead to a Russian military response which would stun the Americans and force them to enter an escalatory spiral which nobody would control. Remember how Hillary promised that she would unilaterally impose a so-called "no-fly" zone over Syria? She promised not only to deploy US aircraft above Russian forces in Syria, but she also promised that she would force the Russian Aerospace forces out of the Syrian skies. Thank God, this crazy witch was not elected, but it appears that folks with the same arrogant and, frankly, completely irresponsible point of view are now back in power under Trump. My fear now is that the incompetent, arrogant, not too bright and generally ignorant commanders at the Pentagon and the CIA will simply ignore clear warning signs coming from the Russians, including the public announcement that the Kremlin has given the authority to use force to protect Russian personnel to the local Russian commanders in Syria. In plain English, this means that if they are attacked the Russians in Syria do not need to consult with Moscow before using force to protect themselves. By the way, such rules of engagement are pretty common, there is nothing earth shattering here, but the fact that they were made public is, again, a message to the AngloZionist and the "good" terrorist they use to try to conquer Syria. This time around we (the world) were lucky. The Syrians fought hard and the "good" terrorists were probably surprised by the ruthless determination of the Russian military police forces (in reality, mostly Chechen special forces) and of the Spetsnaz operators. It is one thing to fight Syrian conscripts, quite another to deal with these hardened warriors. But the next time around the outcome could be different. Next Page 1 | 2 (Note: You can view every article as one long page if you sign up as an Advocate Member, or higher). The Napalm Girl In Vietnam (Image by flickr.com) Details DMCA One of the most hyped "events" of American television, The Vietnam War, has started on the PBS network. The directors are Ken Burns and Lynn Novick. Acclaimed for his documentaries on the Civil War, the Great Depression and the history of jazz, Burns says of his Vietnam films, "They will inspire our country to begin to talk and think about the Vietnam war in an entirely new way." In a society often bereft of historical memory and in thrall to the propaganda of its "exceptionalism," Burns' "entirely new" Vietnam war is presented as "epic, historic work." Its lavish advertising campaign promotes its biggest backer, Bank of America, which in 1971 was burned down by students in Santa Barbara, California, as a symbol of the hated war in Vietnam. Burns says he is grateful to "the entire Bank of America family" which "has long supported our country's veterans." Bank of America was a corporate prop to an invasion that killed perhaps as many as four million Vietnamese and ravaged and poisoned a once bountiful land. More than 58,000 American soldiers were killed, and around the same number are estimated to have taken their own lives. I watched the first episode in New York. It leaves you in no doubt of its intentions right from the start. The narrator says the war "was begun in good faith by decent people out of fateful misunderstandings, American overconfidence and Cold War misunderstandings." The dishonesty of this statement is not surprising. The cynical fabrication of "false flags" that led to the invasion of Vietnam is a matter of record -- the Gulf of Tonkin "incident" in 1964, which Burns promotes as true, was just one. The lies litter a multitude of official documents, notably the Pentagon Papers, which the great whistleblower Daniel Ellsberg released in 1971. There was no good faith. The faith was rotten and cancerous. For me -- as it must be for many Americans -- it is difficult to watch the film's jumble of "red peril" maps, unexplained interviewees, ineptly cut archive and maudlin American battlefield sequences. In the series' press release in Britain -- the BBC will show it -- there is no mention of Vietnamese dead, only Americans. "We are all searching for some meaning in this terrible tragedy," Novick is quoted as saying. How very post-modern. All this will be familiar to those who have observed how the American media and popular culture behemoth has revised and served up the great crime of the second half of the twentieth century: from The Green Berets and The Deer Hunter to Rambo and, in so doing, has legitimized subsequent wars of aggression. The revisionism never stops and the blood never dries. The invader is pitied and purged of guilt, while "searching for some meaning in this terrible tragedy." Cue Bob Dylan: "Oh, where have you been, my blue-eyed son?" I thought about the "decency" and "good faith" when recalling my own first experiences as a young reporter in Vietnam: watching hypnotically as the skin fell off Napalmed peasant children like old parchment, and the ladders of bombs that left trees petrified and festooned with human flesh. General William Westmoreland, the American commander, referred to people as "termites." In the early 1970s, I went to Quang Ngai province, where in the village of My Lai, between 347 and 500 men, women and infants were murdered by American troops (Burns prefers "killings"). At the time, this was presented as an aberration: an "American tragedy" (Newsweek ). In this one province, it was estimated that 50,000 people had been slaughtered during the era of American "free fire zones." Mass homicide. This was not news. To the north, in Quang Tri province, more bombs were dropped than in all of Germany during the Second World War. Since 1975, unexploded ordnance has caused more than 40,000 deaths in mostly "South Vietnam," the country America claimed to "save" and, with France, conceived as a singularly imperial ruse. The "meaning" of the Vietnam war is no different from the meaning of the genocidal campaign against the Native Americans, the colonial massacres in the Philippines, the atomic bombings of Japan, the levelling of every city in North Korea. The aim was described by Colonel Edward Lansdale, the famous CIA man on whom Graham Greene based his central character in The Quiet American. Quoting Robert Taber's The War of the Flea, Lansdale said, "There is only one means of defeating an insurgent people who will not surrender, and that is extermination. There is only one way to control a territory that harbors resistance, and that is to turn it into a desert." Nothing has changed. When Donald Trump addressed the United Nations on 19 September -- a body established to spare humanity the "scourge of war" -- he declared he was "ready, willing and able" to "totally destroy" North Korea and its 25 million people. His audience gasped, but Trump's language was not unusual. His rival for the presidency, Hillary Clinton, had boasted she was prepared to "totally obliterate" Iran, a nation of more than 80 million people. This is the American Way; only the euphemisms are missing now. Returning to the US, I am struck by the silence and the absence of an opposition -- on the streets, in journalism and the arts, as if dissent once tolerated in the "mainstream" has regressed to a dissidence: a metaphoric underground. Next Page 1 | 2 (Note: You can view every article as one long page if you sign up as an Advocate Member, or higher). Country United States of America US Virgin Islands United States Minor Outlying Islands Canada Mexico, United Mexican States Bahamas, Commonwealth of the Cuba, Republic of Dominican Republic Haiti, Republic of Jamaica Afghanistan Albania, People's Socialist Republic of Algeria, People's Democratic Republic of American Samoa Andorra, Principality of Angola, Republic of Anguilla Antarctica (the territory South of 60 deg S) Antigua and Barbuda Argentina, Argentine Republic Armenia Aruba Australia, Commonwealth of Austria, Republic of Azerbaijan, Republic of Bahrain, Kingdom of Bangladesh, People's Republic of Barbados Belarus Belgium, Kingdom of Belize Benin, People's Republic of Bermuda Bhutan, Kingdom of Bolivia, Republic of Bosnia and Herzegovina Botswana, Republic of Bouvet Island (Bouvetoya) Brazil, Federative Republic of British Indian Ocean Territory (Chagos Archipelago) British Virgin Islands Brunei Darussalam Bulgaria, People's Republic of Burkina Faso Burundi, Republic of Cambodia, Kingdom of Cameroon, United Republic of Cape Verde, Republic of Cayman Islands Central African Republic Chad, Republic of Chile, Republic of China, People's Republic of Christmas Island Cocos (Keeling) Islands Colombia, Republic of Comoros, Union of the Congo, Democratic Republic of Congo, People's Republic of Cook Islands Costa Rica, Republic of Cote D'Ivoire, Ivory Coast, Republic of the Cyprus, Republic of Czech Republic Denmark, Kingdom of Djibouti, Republic of Dominica, Commonwealth of Ecuador, Republic of Egypt, Arab Republic of El Salvador, Republic of Equatorial Guinea, Republic of Eritrea Estonia Ethiopia Faeroe Islands Falkland Islands (Malvinas) Fiji, Republic of the Fiji Islands Finland, Republic of France, French Republic French Guiana French Polynesia French Southern Territories Gabon, Gabonese Republic Gambia, Republic of the Georgia Germany Ghana, Republic of Gibraltar Greece, Hellenic Republic Greenland Grenada Guadaloupe Guam Guatemala, Republic of Guinea, Revolutionary People's Rep'c of Guinea-Bissau, Republic of Guyana, Republic of Heard and McDonald Islands Holy See (Vatican City State) Honduras, Republic of Hong Kong, Special Administrative Region of China Hrvatska (Croatia) Hungary, Hungarian People's Republic Iceland, Republic of India, Republic of Indonesia, Republic of Iran, Islamic Republic of Iraq, Republic of Ireland Israel, State of Italy, Italian Republic Japan Jordan, Hashemite Kingdom of Kazakhstan, Republic of Kenya, Republic of Kiribati, Republic of Korea, Democratic People's Republic of Korea, Republic of Kuwait, State of Kyrgyz Republic Lao People's Democratic Republic Latvia Lebanon, Lebanese Republic Lesotho, Kingdom of Liberia, Republic of Libyan Arab Jamahiriya Liechtenstein, Principality of Lithuania Luxembourg, Grand Duchy of Macao, Special Administrative Region of China Macedonia, the former Yugoslav Republic of Madagascar, Republic of Malawi, Republic of Malaysia Maldives, Republic of Mali, Republic of Malta, Republic of Marshall Islands Martinique Mauritania, Islamic Republic of Mauritius Mayotte Micronesia, Federated States of Moldova, Republic of Monaco, Principality of Mongolia, Mongolian People's Republic Montserrat Morocco, Kingdom of Mozambique, People's Republic of Myanmar Namibia Nauru, Republic of Nepal, Kingdom of Netherlands Antilles Netherlands, Kingdom of the New Caledonia New Zealand Nicaragua, Republic of Niger, Republic of the Nigeria, Federal Republic of Niue, Republic of Norfolk Island Northern Mariana Islands Norway, Kingdom of Oman, Sultanate of Pakistan, Islamic Republic of Palau Palestinian Territory, Occupied Panama, Republic of Papua New Guinea Paraguay, Republic of Peru, Republic of Philippines, Republic of the Pitcairn Island Poland, Polish People's Republic Portugal, Portuguese Republic Puerto Rico Qatar, State of Reunion Romania, Socialist Republic of Russian Federation Rwanda, Rwandese Republic Samoa, Independent State of San Marino, Republic of Sao Tome and Principe, Democratic Republic of Saudi Arabia, Kingdom of Senegal, Republic of Serbia and Montenegro Seychelles, Republic of Sierra Leone, Republic of Singapore, Republic of Slovakia (Slovak Republic) Slovenia Solomon Islands Somalia, Somali Republic South Africa, Republic of South Georgia and the South Sandwich Islands Spain, Spanish State Sri Lanka, Democratic Socialist Republic of St. Helena St. Kitts and Nevis St. Lucia St. Pierre and Miquelon St. Vincent and the Grenadines Sudan, Democratic Republic of the Suriname, Republic of Svalbard & Jan Mayen Islands Swaziland, Kingdom of Sweden, Kingdom of Switzerland, Swiss Confederation Syrian Arab Republic Taiwan, Province of China Tajikistan Tanzania, United Republic of Thailand, Kingdom of Timor-Leste, Democratic Republic of Togo, Togolese Republic Tokelau (Tokelau Islands) Tonga, Kingdom of Trinidad and Tobago, Republic of Tunisia, Republic of Turkey, Republic of Turkmenistan Turks and Caicos Islands Tuvalu Uganda, Republic of Ukraine United Arab Emirates United Kingdom of Great Britain & N. Ireland Uruguay, Eastern Republic of Uzbekistan Vanuatu Venezuela, Bolivarian Republic of Viet Nam, Socialist Republic of Wallis and Futuna Islands Western Sahara Yemen Zambia, Republic of Zimbabwe From Consortium News Make no mistake about it: the United States has entered an era of a New McCarthyism that blames nearly every political problem on Russia and has begun targeting American citizens who don't go along with this New Cold War propaganda. A difference, however, from the McCarthyism of the 1950s is that this New McCarthyism has enlisted Democrats, liberals and even progressives in the cause because of their disgust with President Trump; the 1950's version was driven by Republicans and the Right with much of the Left on the receiving end, maligned by the likes of Sen. Joe McCarthy as "un-American" and as Communism's "fellow travelers." The real winners in this New McCarthyism appear to be the neoconservatives who have leveraged the Democratic/liberal hatred of Trump to draw much of the Left into the political hysteria that sees the controversy over alleged Russian political "meddling" as an opportunity to "get Trump." Already, the neocons and their allies have exploited the anti-Russian frenzy to extract tens of millions of dollars more from the taxpayers for programs to "combat Russian propaganda," i.e., funding of non-governmental organizations and "scholars" who target dissident Americans for challenging the justifications for this New Cold War. The Washington Post, which for years has served as the flagship for neocon propaganda, is again charting the new course for America, much as it did in rallying U.S. public backing for the 2003 invasion of Iraq and in building sympathy for abortive "regime change" projects aimed at Syria and Iran. The Post has begun blaming almost every unpleasant development in the world on Russia! Russia! Russia! For instance, a Post editorial on Tuesday shifted the blame for the anemic victory of German Chancellor Angela Merkel and the surprising strength of the far-right Alternative for Germany (AfD) from Merkel's austerity policies, which have caused hardship for much of the working class, or from her open door for Mideast refugees, which has destabilized some working-class neighborhoods, to -- you guessed it -- Russia! The evidence, as usual, is vague and self-interested, but sure to be swallowed by many Democrats and liberals, who hate Russia because they blame it for Trump, and by lots of Republicans and conservatives, who have a residual hatred for Russia left over from the Old Cold War. The Post cited the Atlantic Council's Digital Forensic Research Lab, which has been pushing much of the hysteria about alleged Russian activities on the Internet. The Atlantic Council essentially is NATO's think tank and is financed with money from the U.S. government, Gulf oil states, military contractors, global financial institutions and many other sources which stand to gain directly or indirectly from the expanding U.S. military budget and NATO interventions. Blaming Russia In this New Cold War, the Russians get blamed for not only disrupting some neocon "regime change" projects, such as the proxy war in Syria, but also political developments in the West, such as Donald Trump's election and AfD's rise in Germany. Russian President Vladimir Putin addresses UN General Assembly on Sept. 28, 2015. (Image by (UN Photo)) Details DMCA The Atlantic Council's digital lab claimed, according to the Post editorial, that "In the final hours of the [German] campaign, online supporters of the AfD began warning their base of possible election fraud, and the online alarms were 'driven by anonymous troll accounts and boosted by a Russian-language bot-net.'" Of course, the Post evinces no evidence tying any of this to the Russian government or to President Vladimir Putin. It is the nature of McCarthyism that actual evidence is not required, just heavy breathing and dark suspicions. For those of us who operate Websites, "trolls" -- some volunteers and some professionals -- have become a common annoyance and they represent many political outlooks, not just Russian. Plus, it is standard procedure these days for campaigns to issue last-minute alarms to their supporters about possible election fraud to raise doubts about the results should the outcome be disappointing. Next Page 1 | 2 | 3 (Note: You can view every article as one long page if you sign up as an Advocate Member, or higher). The United States is supporting and profiting from a war being waged by the richest Arab country, Saudi Arabia, against the poorest Arab country, its neighbor Yemen. Since March of 2015 a Saudi-led coalition has destroyed much of Yemen's infrastructure--ports, factories, warehouses, farms, roads, schools and medical facilities, leading to widespread misery and death. The Saudi coalition of Sunni governments includes oil-rich absolute monarchies such as the UAE and Bahrain, and the corrupt dictatorship of Egypt's Al Sisi. They are trying unsuccessfully to restore an unpopular Sunni government forced out by Houthi Shiite rebels in 2015. This Yemeni civil war is partly a reflection of the wider civil war within Islam between Sunni and Shia, with Saudi Arabia and Iran as the leading powers on each side. The Obama and Trump administrations have accepted Saudi claims that Iran is a major arms supplier for the Houthis. However, as award-winning investigative journalist Gareth Porter points out , the Houthis received Iranian guided missiles only after the Saudis began their bombing campaign, "to allow the Houthis to have some means of retaliation." As Bruce Riedel of the Brookings Institution explains, from Iran's point of view supplying arms and training to the Houthis is an inexpensive way to bog down its Saudi adversary in a very costly quagmire. And, as Trump made clear on his May 20 visit when he joined Saudi King Salman in a traditional male-only sword dance, the U.S. will continue to help, with more multibillion-dollar weapon sales to the Saudis, intelligence sharing and aerial refueling of coalition aircraft so they can spend more time raining destruction on Yemen. Given the Trump administration's mounting hostility to Iran, there seems to be no end in sight for the proxy war in Yemen. Gruesome numbers reveal the scale of the disaster overtaking this nation of 25 million. In July the UN special envoy to Yemen told the UN Security Council that seven million--including 2.3 million children under the age of five--are on the "cusp of famine." Stephen O'Brien, UN Under-Secretary-General For Humanitarian Affairs, reported that between March 2015 and Oct. 31 of 2016, "10,000 children under the age of five have perished from preventable diseases as a result of the sharp decline in the availability of immunizations and remedies for diarrhea and pneumonia." According to Anas Shahari of Save the Children Yemen, there are 344,000 confirmed or suspected cholera cases. There have been "more than 1,700 cases of deaths because of cholera; 42 percent of this number is children." Here's a picture that captures the obscenity of the U.S. role in Yemen: juxtapose a photo of an American tanker plane hovering over Yemen gracefully copulating by fuel line with a Saudi fighter-bomber, and a photo of one of the millions of young children on the ground starving because food sources have been destroyed by coalition aircraft. Next Page 1 | 2 (Note: You can view every article as one long page if you sign up as an Advocate Member, or higher). Online Marketing Place for Hospitality Services Market - Global Industry Insights, Trends, Outlook, and Opportunity Analysis, 20172025 https://www.coherentmarketinsights.com/insight/request-sample/657 https://www.coherentmarketinsights.com/ongoing-insight/online-marketing-place-for-hospitality-services-market-657 www.coherentmarketinsights.com/ Online marketing place for hospitality service is a platform that offers web services to the hospitality industry in order to provide services to customers at a global level. The increasing adoption of digitalization in the hospitality industry has provided the facility of hotel visibility along with their services at a global level. The key factors driving growth of the global online marketing place for hospitality service market are the increasing demand for fast and convenient hotel and flight bookings, adoptability of online payment system, and availability of various alternative options for traveling and hotel bookings. In todays worlds, the increasing popularity of various applications and mobile-friendly websites for travel and hotel bookings, particularly among young professionals, has increased the market of online marketing place for hospitality services. The market players in this market are majorly providing their services through mobile apps or websites. Moreover, the increasing footprint of tourists in various countries has increased the demand for online marketing place for hospitality services. According to Coherent Market Insights, around 77.5 million tourists visited the United States in 2015, from around 75 million in 2014.Request Sample of Online Marketing Place for Hospitality Services Market:Online Marketing Place for Hospitality Services Market TaxonomyOn the basis of type of platform, the global online marketing place for hospitality services market is classified into:MobileDesktopThe desktop platform holds a dominant position in the global online marketing place for hospitality services market, whereas, the mobile platform is expected to grow with the largest CAGR over the forecast period, owing to increasing popularity of mobile apps and mobile-based websites. In addition to this, the increasing number of smart phone users is a major factor providing swift growth to the mobile platform of this market. According to Coherent Market Insights, approx. 1.86 billion smart phone users were globally present in 2015, which rose up to 2.1 billion in 2016, and is estimated to hit 2.87 billion in 2020.On the basis of service type, the global online marketing place for hospitality services market is classified into:Food and BeveragesAccommodationTravel and tourismOnline Marketing Place for Hospitality Services Market Outlook North America holds the largest market of the global online marketing place for hospitality services.On the basis of geography, global online marketing place for hospitality services market is classified into North America, Europe, Asia Pacific, Latin America, Middle East, and Africa. North America holds a dominant position in the global online marketing place for hospitality services market in 2016 and is estimated to retain its dominance throughout the forecast period. Due to high dominance of advanced technologies in the North American countries, the market of online marketing place for hospitality services has gained traction. In addition to this, the Asia Pacific online marketing place for hospitality services market is estimated to grow with the largest share during the forecasted period. India and China are the major countries driving the online marketing place for hospitality services market in Asia Pacific. The increasing internet penetration in the Asia Pacific region, plays a major role for growth of the online marketing place for hospitality services market. According to Coherent Market Insights, approx. 706 million internet users were present in China, which rose up to 721 million in 2016. . Similarly in India, the number of internet users rose up from354 in 2015 to 462 million in2016. In addition to this, the rising disposable income and increasing number of middle class families in Asia Pacific countries have accelerated growth of the online marketing place for hospitality services market.Check the Trending Report of Online Marketing Place for Hospitality Services Market:Key Companies of the Global Online Marketing Place for Hospitality Services MarketHotwire, Hotels, Orbitz, Expedia, Travelocity, MoreHotels4Less, Agoda, Priceline, Booking, and OneTravel are some of the key companies of the global online marketing place for hospitality services market.About Coherent Market Insights:Coherent Market Insights is a prominent market research and consulting firm offering action-ready syndicated research reports, custom market analysis, consulting services, and competitive analysis through various recommendations related to emerging market trends, technologies, and potential absolute dollar opportunity.Contact UsMr. ShahCoherent Market Insights1001 4th Ave,#3200Seattle, WA 98154Tel: +1-206-701-6702Email: sales@coherentmarketinsights.comWebsite:Visit Blog : globalresearchtrends.blogspot.in/ Wind Turbine Inspection Services Market - Global Industry Insights, Trends, Outlook, and Opportunity Analysis, 20172025 https://www.coherentmarketinsights.com/insight/request-sample/653 https://www.coherentmarketinsights.com/ongoing-insight/wind-turbine-inspection-services-market-653 www.coherentmarketinsights.com/ Hydroelectric power plants and wind energy are among the most widely used renewable forms of energy sources. Hydroelectric power generation, which is the largest used renewable power source, is limited owing to the inadequacy of the generating resources to meet the global demands. Wind energy is available abundantly and can be used to meet the global energy demands. Requirement to harness these resources consistently, and maintain the high energy efficiency of these through the turbine life cycle is expected to drive the demands for related inspection services through the forecast period.Request Sample of Wind Turbine Inspection Services Market:Increasing deployment for the energy source across the globe will drive the wind turbine inspection services market growthAccording to Global Wind Energy Council (GWEC), the total installed capacities of these farms was over 485 GW is expected to surge significantly over the coming years. According to Coherent Market Insights analysis, the total installed capacities would increase over double the installed capacities in 2016, by 2025. Turbines are highly crucial components for the energy generation and comprise number of smaller components that includes gearbox and generator, which are necessitated to be serviced and inspected on regular intervals to safeguard the optimal efficiency and performance. Thus, to ensure longevity and accurate information regarding the energy generation, farm contractors and operators are expected to drive the service industry requirements.Wind Turbine Inspection Services Market TaxonomyOn the basis of services, the global wind turbine inspection services market is classified into:Quality assurance & quality controlNondestructive examination (NDE)Condition assessment/inspectionProcess safety managementOutage & turnaround supportVendor evaluation & product assuranceWelding & corrosion engineeringInspection drones incorporated with advanced monitoring equipment and artificial intelligence is expected is among the key trend gaining traction in the industry applicationsWind turbine examination drones are small sized unmanned aerial vehicles that are utilized to accumulate information and images for the assessment, monitoring, mapping, and analysis of blades, towers and nacelles. Conventional methods for the examination includes the employment of specific teams suspended through cables and rope supports, using field telescopes and binoculars for the task. In conjunction with the human life risks, the method has several limitations such as difficulty to access some areas, exclusion of blade defects assessment invisible to the naked eye. Elimination of these drawbacks through utilization of these drones is expected to present considerable growth prospects for this market.Integration of artificial intelligence (AI) in these drones to reduce the workflow errors and enhance detailed analysis within few hours is among the key trends gaining traction in industry. However, stringent regulatory standards against the use of these drones in some major economies such as FAA regulations in the U.S., regulations regarding VLOS and BVLOS and other regionally distinct regulations will present considerable growth to the drone adoptions.Noise pollution and threat to wildlife, specifically flying creatures such as bats, birds, etc., are some of the major drawbacks that may hamper the industry growth rateThese energy sources cannot be used to meet the base load demands, without the additional investments for the energy storage. However, this may add up to the initial high investment required which is considerably higher in comparison to establishment of conventional energy plants. These factors are expected to consistently hinder the adoption of these means to generate the energy which will consequentially negatively impact the wind turbine inspection market growth.Asia Pacific is expected to dominate the overall industry growth through the forecast periodChina contributes to over 37% of the global installed units for the power generation accounting for over 168.73 MW in 2016, as per the GWEC. India contributed to the worlds fourth largest installed units. High deployments in these major emerging economies in the region is expected to attract significant investments in these economies. Other major attractive economies for the wind turbine inspection services include the U.S, Germany, Spain, UK, France, Canada, and Brazil.Check the Trending Report of Wind Turbine Inspection Services Market:Chief industry participants include Intertek Group Plc., UpWind Solutions Inc., Technical Wind Services Ltd., INVISO Services Ltd., Cenergy International Services LLC, UL International GmbH, ASC Engineering Service, Advanced Cleaning Technology Ltd., MISTRAS Group Inc., Midwest Underground Technology Inc., and MFG Energy Services.About Coherent Market Insights:Coherent Market Insights is a prominent market research and consulting firm offering action-ready syndicated research reports, custom market analysis, consulting services, and competitive analysis through various recommendations related to emerging market trends, technologies, and potential absolute dollar opportunity.Contact UsMr. ShahCoherent Market Insights1001 4th Ave,#3200Seattle, WA 98154Tel: +1-206-701-6702Email: sales@coherentmarketinsights.comWebsite:Visit Blog : globalresearchtrends.blogspot.in/ Traction Motor Market To Witness Usage In Electric Locomotives, High-speed Rail, Trams And Electric Multiple Units Till 2022 | Million Insights Million Insights - World's Fastest Growing Market Research Database https://www.millioninsights.com/industry-reports/traction-motor-market?utm_source=pressrelease&utm_medium=referral&utm_campaign=openpr_shree_sep27&utm_content=Content https://www.millioninsights.com/industry-reports/traction-motor-market/request-sample https://www.millioninsights.com/industry/machinery-and-machine-parts Global Traction Motor Market is anticipated to rise at a higher CAGR in the predicted period. Traction motor is defined as an electric motor consisting of stationary electrical parts It is typically AC, DC motor surrounded with armature series, and which has coils which is surrounded by these coils and the armature in a sequential from the basically used for the driving machinery.The traction motors are developed that have the proven electrical system which protect against thermal, mechanical and electrical stresses. The electric cars and the public transportation contribute to the green environment by emitting less of carbon dioxide. So, the Traction motors are utilized to provide the necessary torque which supports the sleeve bearings. More than 85% of the electrical power converts into mechanical power under normal conditions of the traction motors.Full Research Report On Traction Motor Market Global Analysis available at:There is an increasing demand and the trend for electrification of the vehicle in the automotive industry, which is in the demand for electrical components also. Automotive industry has major driver factor for the growth of the market in the traction motors markets i.e new developmental technologies such as increase in the regenerative brakes, and increase in R&D for specific requirements which is based on the traction motor application. Also, there is increase in awareness or emission reduction of the vehicle which are steering the growth and the demand of the traction motors market. There are technologies like hybrid vehicle technology that are steering the growth of the traction motor market during the predicted period.Traction Motor Market is segmented, By Product Type Permanent Magnet Motor, AC Induction Motor, and other Types. Traction Motor Market is segmented, By Applications Commercial Vehicles, Transportation, Passenger Cars, and others.There are various applications of the traction motor industry. The Development in vehicles technology such as hybrid vehicle, where the generation of the power and the transmission takes in the electric mode of the traction motors. Th electric mode is taken the lead in the traction motor market. The property of the traction motor is high in efficiency and the unique proposition leading across various applications.Traction Motor Market is segmented, By Geographical Region the North American region consists of the U.S., and Canada. Latin America region consists of Mexico and Brazil. The Western European region consists of Germany, Italy, France, England and Spain. The Eastern European region consists of Poland and Russia. Asia Pacific region consists of China, India, ASEAN, Australia & New Zealand. The Middle East and Africa region consists of GCC, South Africa and North Africa.Request for Free Sample Copy :The market in the regional segment, Asia-Pacific is high which is expected to witness a higher production of the traction motors, which is due to the automobile sector sale. The growth of the market is high during this forecast period, and the countries like China, South Korea, are fueling the growth of the market.There is growth in the North America sector due to the high amount of the industrialization in this sector so that the growth of this market during forecast period is high in 2016. They are promoting the use of the traction motors in the various manufacturing machinery. Also, there are European countries are also developed in the traction motors the countries like England is booming in the European region. The market is expected to grow high during the predicted period.Traction Motor Industry Key Players include Dajun Tech, BYD, Greatland Electrics, Nissan, Continental AG, ZF, Meidensha, Broad-Ocean, Jing-Jin Electric Technologies, Hitachi Automotive Systems, BMW, BOSCH, Fukuta, Remy International, Magna, Deyang Electrics, and more.Related Reports of this Category available at Million Insights:About Million InsightsMillion Insights, is a distributor of market research reports, published by premium publishers only. We have a comprehensive market place that will enable you to compare data points, before you make a purchase. Enabling informed buying is our motto and we strive hard to ensure that our clients get to browse through multiple samples, prior to an investment. Service flexibility & the fastest response time are two pillars, on which our business model is founded. Our market research report store, includes in-depth reports, from across various industry verticals, such as healthcare, technology, chemicals, food & beverages, consumer goods, material science & automotive.Contact Details:Office No. 302, 3rd Floor, Manikchand Galleria,Model Colony, Shivaji Nagar, Pune, MH, 411016 IndiaPhone: 91-20-65300184Email: sales@millioninsights.com Market Assessment: Global Connected Home Security System Market 2017-2021 - ADT, AT&T, Comcast, Tyco Security Products https://www.researchmoz.us/enquiry.php?type=S&repid=1059716 https://www.researchmoz.us/enquiry.php?type=E&repid=1059716 http://bit.ly/1TBmnVG A smart home comprises of an internal network, home automation, and intelligent controls. It is generally defined as a home that is equipped with advanced and automated digital devices, home appliances, and equipment that are interconnected to each other facilitating sophisticated monitoring and control over the building's functions. It performs three different actions, namely remote status check, remote information, and remote control to implement any action by the resident from a remote location. For instance, the lighting, temperature, security, and door operations of a smart home can be controlled from a remote location with the necessary access. Smart homes provide a wide variety of applications such as home automation, home security, home cloud, energy management, and e-health services. The living experience of consumers is enhanced by comfort and convenience provided by smart homes.The global connected home security system market to grow at a CAGR of 27.12% during the period 2017-2021. The report covers the present scenario and the growth prospects of the global connected home security system market for 2017-2021. To calculate the market size, the report considers the revenue generated of various types of alarms (fire alarms and burglar alarms), digital electronic locks, sensors, video cameras, video monitoring systems, and detectors (fire detector, CO detector, and HVAC detector).The market is divided into the following segments based on geography:- Americas- APAC- EMEAClick to get sample PDF with TOC:Technavio's report, Global Connected Home Security System Market 2017-2021, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market landscape and its growth prospects over the coming years. The report also includes a discussion of the key vendors operating in this market.Key vendors- ADT- AT&T- Comcast- Tyco Security ProductsOther prominent vendors- Alarm.com- August Home- Butterfleye- Canary Connect- Cocoon Labs- Control4 Corporation- Deutsche Telekom- Frontpoint Security Solutions- G4S- Google- Honeywell International- ICONTROL NETWORKS (Piper)- Indiegogo- Kuna Systems- Kwikset (Owned by Spectrum Brands)- MivaTek- Nest (Dropcam)- Panasonic- PatrolTag- Protect America....Enquiry:Key questions answered in this report- What will the market size be in 2021 and what will the growth rate be?- What are the key market trends?- What is driving this market?- What are the challenges to market growth?- Who are the key vendors in this market space?- What are the market opportunities and threats faced by the key vendors?- What are the strengths and weaknesses of the key vendors?About UsResearchMoz is the worlds fastest growing collection of market research reports worldwide. Our database is composed of current market studies from over 100 featured publishers worldwide. Our market research databases integrate statistics with analysis from global, regional, country and company perspectives. ResearchMozs service portfolio also includes value-added services such as market research customization, competitive landscaping, and in-depth surveys, delivered by a team of experienced Research Coordinators.Albany NY - 12207United StatesTel: +1-518-621-2074Tel: 866-997-4948 (Us-Canada Toll Free)Email: sales@researchmoz.usFollow us on LinkedIn at: High Internet & Mobile Penetration in Peru is Expected to Increase Growth in The Card and Payments Market https://www.psmarketresearch.com/market-analysis/peru-databook-cards-payments-market https://www.psmarketresearch.com/market-analysis/peru-databook-cards-payments-market/report-sample https://www.psmarketresearch.com/send-enquiry?enquiry-url=peru-databook-cards-payments-market https://www.psmarketresearch.com The research report provides in depth analysis and insights into the Peru Cards and Payments Market and competitive landscape (card issuers in the country) for both debit cards and credit cards. The study includes 3 years historical market size and 6 years market forecast in terms of number of cards, value and volume of transactions processed through these cards, and other key metrics. The report also provides information on the key industry trends, major schemes, banks and detailed segmentation of card and payment industry. The research report is a new offering from the companys Financial Services domain, and leveraged from the companys existing cards and payments database of 50+ countries.Explore Report with Detailed TOC on Peru Cards and Payments Market at:In terms of number of cards in circulation, the Peru payment cards market grew at a CAGR of 7.6% during the period 2012-2014 and it is expected to grow further over the forecast period. In 2012, Perus GDP per capita was USD 6,325, which is likely to increase further over the period 20152020, to reach USD 6,882 in 2020. This increase is expected to increase the cards usage over the forecast period. Also Perus population grew steadily from 30.4 million in 2012 to 31.4 million in 2014, and is expected to reach 34.4 million by 2020. The increase in population is expected to encourage card spending over the forecast period.Download Free Sample of This Research Report:Some of the key players in the debit cards market include Banco de Credito del Peru, BBVA Continental Scotiabank, Midbanco, Banco Financiero and Banco Falabella Peru. Banco de Credito del Peru was the leading bank in terms of the number of debit cards in 2014. Some of the key players in the credit card market of Peru include Banco Falabella Peru, Banco de Credito del Peru, Interbank, BBVA Continental and Scotiabank. In the credit card segment, Banco Falabella Peru was the leading bank in 2014, in terms of number of credit cards in circulation.P&S Market Research is a global market research and consulting company. We provide market research reports, industry reports, business intelligence and research based consulting services across a range of industries.Make Enquiry Before Buying the Report:With the help of our professional corporate relations with various companies, our market research offers the most accurate market forecasting. Our analysts and consultants interact with leading companies of the concerned domain to substantiate every single data presented in our publication. Our research assists our client in identifying new and different windows of opportunity and frame informed and customized strategies for expansion in different regions.Contact:Mr. Kundan KumarManager Client Partner347, 5th Ave. #1402New York City, NY - 10016Toll-free: +18887787886 (USA/Canada)Email: enquiry@psmarketresearch.comWeb:347 5th Ave. #1402- 210 New York City, NY 10016 United States Shrink Plastic Film Market to Expand Substantially Owing to Technological Innovations During 2016 - 2026 https://www.persistencemarketresearch.com/samples/12073 https://www.persistencemarketresearch.com/toc/12073 http://www.persistencemarketresearch.com Shrink plastic film is made up of polymer plastic film. Plastic is covered to the product and heat is applied to covered plastic which shrinks tightly over the product it is covering. The shrink plastic film is majorly used for the wrapping food, boxes, and bottles. The shrink plastic film includes polyolefin, PVC, polyethylene, polypropylene and several other compositions. Polyolefin is a preferable plastic film used for the covering and packing due to its chemical and physical properties such as availability, variety of thickness, clarities, strengths and shrink ratio over the shrink plastic film made by other materials.The global shrink plastic film market is projected to grow at a significant CAGR as a demand of the shrink film is increasing from the rapidly growing food and beverages industry due to its various applicability to the industry. The inherent property of shrink plastic film to mold into various shapes and sizes for the purpose of packaging, storage, and transportation of edible items, which also to boost the demand of the shrink plastic film and growth of the global shrink plastic film market.A sample of this report is available upon request @However, the availability of the alternative materials to the plastic can be the major restraining factor to the growth of the global shrink plastic film market. The cost of the shrink plastic film and the instruments required for the same are expensive as compared to normal plastic film used for the packaging of the products which can hamper the demand for the shrink plastic film and growth of the global shrink plastic film market.Nowadays, plastic is available in the biodegradable form, which has a tremendous demand due to awareness about the environmental issues and has become the trend of the global shrink plastic film market.The global shrink plastic film market is segmented on the basis of the type, by application, on the basis of the form of the shrink plastic film and geographical region.On the basis of type, the global shrink plastic film market has segmented into:PrintedUnprintedOn the basis of application, the global shrink plastic film market has segmented into:Beverages packagingConsumer product packagingFood packagingIndustrial/bulk product packagingMaterial goods packagingPharmaceuticals packagingOn the basis of form of global shrink plastic film market has segmented into:Shrink film rollsShrink film bagsShrink film tubingIn terms of geography, the global shrink plastic film market has been divided into five key regions, including North America, Latin America, Europe, Asia-Pacific (APAC) and Middle East & Africa (MEA). The global shrink plastic film market has expected to register moderate growth over the forecast period. Asia Pacific has contributed the major share to the global shrink plastic film market due to the rapidly growing industrialization and demand for packaging material such as shrink plastic film in Asia Pacific. North America and Europe regions are also growing at a decent growth and expected to register the significance CAGR over the forecast period. Latin America and MEA regions are at a nascent stage and anticipated to register the healthy growth over the forecast period.To view TOC of this report is available upon request @Some of the key players of the global shrink plastic film market are AEP Industries, Bemis Co Inc., Berry Plastics, Sigma Plastics, FUJI Seal International Inc, Anchor Packaging, Berry Plastics, Polymer Group Inc, Dow Chemical Company and Intertape Polymer Group Inc. Various global companies are contributed decent growth to the global pre-stretch film market. The key players from Asia pacific region has contributed the major share to the shrink plastic film market in terms of value and volume.Overall the global shrink plastic film market has expected to register a significant growth over the forecast period.About UsPersistence Market Research (PMR) is a third-platform research firm. Our research model is a unique collaboration of data analytics and market research methodology to help businesses achieve optimal performance.To support companies in overcoming complex business challenges, we follow a multi-disciplinary approach. At PMR, we unite various data streams from multi-dimensional sources. By deploying real-time data collection, big data, and customer experience analytics, we deliver business intelligence for organizations of all sizes.Contact UsPersistence Market Research305 Broadway7th Floor, New York City,NY 10007, United States,USA Canada Toll Free: 800-961-0353Email: sales@persistencemarketresearch.comWeb: Electrostatic Precipitator Market to grow 5% CAGR from 2016 to 2024 https://www.fractovia.org/request-sample/368 https://www.fractovia.org/request-purchase/368 https://www.fractovia.org Rapid industrialization across the globe is significantly pushing electrostatic precipitator market share, on account of the rising demand for reducing air pollution. Industrial emissions are a major source of the increasing air pollution. The government bodies across the globe are imposing strict norms to deploy ESPs in the industrial units, which is one of the major growth driving factors for the electrostatic precipitator industry. According to Global Market Insights, Inc. Global Electrostatic precipitator market size worth USD 5 billion in 2015, is estimated to exceed USD 8 billion by 2024.Request for a sample of this research report @Electrostatic precipitators are being heavily adopted across the Power Plants, Cement, Chemicals and Petrochemicals, Metal, and Manufacturing, on account of these sectors being major sources of industrial emissions. Power plant industry which is expanding exponentially due to the rising electricity demand is a major revenue contributor for the electrostatic precipitator market, having held a revenue of USD 1 billion in 2015. These industrial units have a higher concentration of SO3 (Sulphur trioxide) which is a prominent source of air pollution.In addition to this, the increasing infrastructural and construction development is also fostering electrostatic precipitator industry share. In response to this fact, ESP market size in the cement industry accumulated a revenue of USD 700 million in 2015 and is projected to record a CAGR of 4% over 2016-2024. Chemical & petrochemical industry is another major sector actively participating in the electrostatic precipitator market revenue battle. Heavy demand across chemical production units such as diesel, LPG, asphalt, etc. will drive this application lucratively over the years ahead.On account of the increasing construction spending in Asia Pacific, this region is estimated to be one of the prominent ones to partake in the electrostatic precipitator market. The developments in the APAC economies validate the aforementioned fact. For instance, in November 2016, China announced to raise its power generation capacity by 19% over the span of five years. India will also be a major region contributing in APAC ESP industry growth with an estimated revenue of USD 800 million by 2024.Make an inquiry for buying this report @U.S. electrostatic precipitator industry will also see a lucrative roadmap in the coming years, having accounted for 60% of the overall North America revenue in 2015. A high number of industry participants in this region, technology developments, and significant awareness regarding environmental hazards from industrial emissions are factors boosting the regional demand. UK is forecast to drive Europe market size, with a target CAGR of 6% over 2016-2024.Key participants in the ESP market are GEECO Enercon Pvt. Ltd, Clean Tunnel Air International AS, Siemens AG, Babcock & Wilcox Enterprises, and Ducon Technologies Inc.About Fractovia.orgFractovia.org is one of India's leading in-house and free news portal. It is fully automated, and operates on a constant premise, interfacing with news sites and offering redesigned breaking features to readers across the globe. Our mission is to offer individuals opportunities for connections with news writers and distributors which they can pursue. We operate by mapping articles pertaining to breaking news, constantly and progressively, against a pre-determined word-based theme, offering important connections to readers and clients, as well as distributers.Contact Us:Arun HegdeCorporate Sales, USAFractovia.orgPhone: 1-302-846-7766Toll Free: 1-888-689-0688Email: sales@fractovia.orgWebsite: The South African Government and Cuba have extended the SA-Cuba cooperation agreement in the field of water resource management and water supply to 2023. Deputy of Minister of Water and Sanitation Pamela Tshwete, on behalf of South Africa, signed the agreement with Cubas Institute of National Hydraulic Resources (INHR) during the third RSA-Cuba Joint Steering Committee meeting held recently in Pretoria. The meeting was held to review and evaluate the agreement cooperation in the field of water resource management and water supply agreed upon in 2013, and identify areas of improvement. The two countries also approved to extend the contracts of the 35 Cuban engineers stationed in all nine provinces to June 2018, in order to share more knowledge with their South African counterparts. The agreement makes provision for the Department of Water and Sanitation and the INHR to cooperate in the areas of geo-hydrology and engineering services in rural and other disadvantaged areas, where such services are inadequate. The implementation of this programme has been ongoing for the past 18 months and specialists have been placed in different clusters in all nine provinces where future engineers are being mentored. Deputy Minister Tshwete said the extension of the cooperation agreement between the two countries is a step in the right direction for South Africa, as it will empower future engineers with much needed skills to help address the countrys water challenges. We want to acquire as much skills as possible, and Cubans are the best teachers in the field. We want to capacitate our engineers so that they can help the country address its own water challenges, particularly now that old engineers are leaving the field, Tshwete said. She added that South Africa will forever be grateful to Cubans for their generosity in sharing their knowledge and skills in the health, as well as the water sector. INRH first vice president Bladimir Matos Moya said they are determined to assist South Africa in improving water supplies. He said Cubans have directed South Africa to identify its specific training needs so that those can be attended to as a matter of urgency. The Engineering Council of South Africa (ECSA) has also committed to speedily processing requests from Cuban engineers to be recognised as professional specialists. Currently, ESCA does not recognise the Cubans qualifications and the type of work they are doing in the country because they are not registered with them. Report vandalism of water infrastructure Meanwhile, the department has urged citizens to report to the police any acts that interfere with distribution of water like vandalism and theft of water infrastructure, water pollution and unauthorised use of water. This follows a pipe burst in the Komati Water Augmentation Scheme area on Sunday morning, 24 September, which affected water supply to the Duvha Power Station. The department engineers discovered the cause of the pipe burst at the Komati Water Augmentation Scheme to be due to a case of vandalism. Someone or some people attempted to steal the isolation valve leading to the burst. The engineers were able to relieve the pressure in the pipeline, which allowed them to do a proper inspection of the area. The other reservoirs also supplying the power station have remained mainly stable at 93% and 81% of capacity, ensuring that all other operations at the Duvha Power Station continue, with power generation uninterrupted, the department said. The department reported that a new valve has been installed and work continues with concrete, and a steel plate being put in place to close the access. Security-as-a-Service Market 2026: Future Demand, Growth, Share and Analysis with forecast https://www.persistencemarketresearch.com/samples/12583 https://www.persistencemarketresearch.com/market-research/security-as-a-service-market/toc https://www.persistencemarketresearch.com Adopting the business model of Security-as-a-Service (SaaS) has become a pragmatic choice for companies looking at integrating security with their business infrastructure. Furthermore, emerging technological trends related to the Internet of Things (IoT) and cloud-computing will continue to compel more businesses towards implementation of a Security-as-a-Service business model, which will incidentally benefit them through cost savings. Persistence Market Researchs report on the global Security-as-a-Service market titled Global Market Study on Security-as-a-Service: IT & Telecom and BFSI Industry Segments Major Adopters of Security-as-a-Service Solutions , includes a comprehensive study that has predicted the market to attain US$ 3.3 billion in value by the end of 2016. Over a ten-year forecast period of 2016-2026, the global Security-as-a-Service market is projected to expand at a staggering CAGR of 17.1%.Telecom & IT remains the largest industry for SaaS. Healthcare, Retail & Consumer Goods, and BFSI are the other prominent industries for the global SaaS market. The risks of data loss in the healthcare industry can disrupt dozens of associated businesses such as insurance reimbursement and drug development, and with it, compromise the health of millions of patients. Cloud computing is being merged in the global finance industry, but protection of electronic transactions has necessitated the need for amalgamating a Security-as-a-Service business model. By the end of the forecast period, Healthcare and BFSI industries will account for a market value share of 20.3% and 17.7% respectively, with the global IT & Telecom sector accounting for a revenue share of nearly 30%.Request Sample:Competitive Backdrop & Enterprise-based Market SegmentationProviding security services to large enterprises remains a lucrative revenue-generation business model for leading players. By 2026, large enterprises such as conglomerates or multinational corporations will procure about 50% share of global market value, higher than the collective revenue share of small and medium enterprises. Meanwhile, companies in the global Security-as-a-Service market have transformed from being service providers, software developers, and security platform providers to managed security service providers and integrators of Security-as-a-Service for client enterprises. Some of the leading market players profiled in this report include Intel Security, Oracle Corporation, Cisco Systems, Inc., Gemalto NV, Qualys Inc., Alert Logic Inc., Trend Micro Inc., Proofpoint Inc., Zscaler, Inc., and Okta, Inc.The Need for Subscription-based Security Keeps SurgingInterlinked businesses within a company or within multiple corporations are exposed to the threats of network breach, now that cybercrime is at large. As a countermeasure, business operations need to be integrated with security services that safeguard the companies, not just at the firewall level, but at an out-and-out networking parameter. Fusing a security-based business model in an existing and complicated corporate structure can be really formidable for companies, considering the added expenditure of developing an individual security service.Download TOC:Additionally, companies are not looking to further implicate their operational accountabilities by gaining a total ownership of such developed security services. Ergo, the growth of the global market for Security-as-a-Service will be primarily driven by increasing partnerships of companies with service providers offering subscription-based security. So, cost advantages of integrating a Security-as-a-Service business model will encourage more companies to upgrade security measures of their businesses.View Report Table of Contents, Figures, and TablesNorth America to Account for over 35% of Global Revenues by 2026Cloud-based security services are proliferating the US corporate world; from budding startups to established conglomerates. North Americas robust Telecom and IT infrastructure aids the extension of its Security-as-a-Service market, which is anticipated to garner revenues worth US$ 8 billion by 2026-end. With an estimated global market revenue share of 36.4% in 2016, North Americas Security-as-a-Service market will account for nearly half of the global market by the end of 2026, growing at the fastest CAGR among all the regions. Meanwhile, the Security-as-a-Service market in Western Europe will expand gradually, generating an opportune incremental value of an estimated US$ 3,059.6 million over the forecast period. Other regions analyzed in the report include Asia Pacific excluding Japan (APEJ), Japan, Eastern Europe, Latin America, and Middle East & Africa (MEA).Persistence Market Research (PMR) is a third-platform research firm. Our research model is a unique collaboration of data analytics and market research methodology to help businesses achieve optimal performance.To support companies in overcoming complex business challenges, we follow a multi-disciplinary approach. At PMR, we unite various data streams from multi-dimensional sources. By deploying real-time data collection, big data, and customer experience analytics, we deliver business intelligence for organizations of all sizes.305 Broadway,7th FloorNew York City, NY 10007United States+1-646-568-7751+1 800-961-0353 (USA-Canada Toll free)Email: sales@persistencemarketresearch.comWebsite: Market Study: Global Application Delivery Network (ADN) Market 2017-2021 - Citrix Systems, F5 Networks, Radware, A10 Networks https://www.researchmoz.us/enquiry.php?type=S&repid=1320794 https://www.researchmoz.us/enquiry.php?type=E&repid=1320794 http://bit.ly/1TBmnVG An ADN provides application availability, security, visibility, and acceleration. It is a combination of WAN optimization controller (WOC), application delivery controller (ADC), application security equipment, and application gateway. An ADN monitors the web traffic and distributes traffic among all the servers. An ADN acts as a WOC, which reduces the number of bits over the network using caching and compression techniques. Some WOCs are installed on PCs or mobile clients, while others are installed in the data center.The global application delivery network market to grow at a CAGR of 11.14% during the period 2017-2021. The report covers the present scenario and the growth prospects of the global application delivery network market for 2017-2021. The report presents a detailed picture of the market by way of study, synthesis, and summation of data from multiple sources.The market is divided into the following segments based on geography:- Americas- APAC- EMEAClick to get sample PDF with TOC:Technavio's report, Global Application Delivery Network Market 2017-2021, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market landscape and its growth prospects over the coming years. The report also includes a discussion of the key vendors operating in this market.Key vendors- Citrix Systems- F5 Networks- RadwareOther prominent vendors- A10 Networks- Akamai Technologies- Barracuda Networks- Brocade Communications Systems- Fortinet- HPE- Juniper- Networks- Riverbed TechnologyMarket driver- Increased adoption of cloud applications- For a full, detailed list, view our reportMarket challenge- Loss of data packets in the networks- For a full, detailed list, view our reportEnquiry:Key questions answered in this report- What will the market size be in 2021 and what will the growth rate be?- What are the key market trends?- What is driving this market?- What are the challenges to market growth?- Who are the key vendors in this market space?- What are the market opportunities and threats faced by the key vendors?- What are the strengths and weaknesses of the key vendors?About UsResearchMoz is the worlds fastest growing collection of market research reports worldwide. Our database is composed of current market studies from over 100 featured publishers worldwide. Our market research databases integrate statistics with analysis from global, regional, country and company perspectives. ResearchMozs service portfolio also includes value-added services such as market research customization, competitive landscaping, and in-depth surveys, delivered by a team of experienced Research Coordinators.Albany NY - 12207United StatesTel: +1-518-621-2074Tel: 866-997-4948 (Us-Canada Toll Free)Email: sales@researchmoz.usFollow us on LinkedIn at: Automotive Microcontrollers Market to expand at a CAGR of 13.7% by 2022 https://www.futuremarketinsights.com/reports/automotive-microcontrollers-market/toc https://www.futuremarketinsights.com/reports/sample/rep-gb-5060 https://www.futuremarketinsights.com/checkout/5060 www.futuremarketinsights.com The global market for automotive microcontrollers has been projected to exhibit a staggering 13.7% CAGR during 2017 to 2022, according to a latest research by Future Market Insights (FMI). The global automotive microcontrollers market is estimated to surpass US$ 1,500 Mn in revenues by 2022-end.Utilisation of Microchips to Enhance Flexibility and Improve Connectivity in Vehicles - A Major TrendOne of the major trends witnessed in the global market for automotive microcontrollers is utilisation of microchips for improving connectivity of vehicles with their moving systems, and for enhancing the vehicles flexibility. Automobile manufacturers have utilised microcontrollers for a variety of requirements such as engine control, antilock brakes, power steering, and seating. An automotive microcontroller helps in increasing speed of execution, enables automatic control sensing, and enhances safety features including air bag control and high temperature control. Currently, they are being used in sophisticated safety features, which include blind spot detection, automated braking & lighting, surround view cameras, lane change warning, and advanced driver assistance systems (ADAS).Microcontrollers are also being deployed in infotainment systems, and provide connectivity to vehicle network. Popularity of hybrid electric vehicles has witnessed a surge owing to their energy efficiency. Hybrid electric vehicles need comparatively large number of microcontrollers than conventional vehicles. With modernisation of vehicles, number of microcontrollers required for vehicles has increased. Although cost of microcontrollers has remained lower over the recent past, the tags for microcontrollers are expected to witness a gradual rise over the next few years. This is expected to lead to an increased cost of vehicles. Moreover, integration of microcontroller has always remained a challenging task for automobile manufacturers, on the back of their complex design.View and Download TOC of Automotive Microcontrollers Market Research Report@Key Research Findings from FMIs Report on Global Automotive Microcontrollers MarketIn terms of revenues, although North America is expected to remain largest market for microcontrollers in 2017, Asia-Pacific excluding Japan (APEJ) will be the most lucrative region for automotive microcontrollers market by 2022-end. The convergence of transportation, automotive, and ICT sectors has increased demand for technologically advanced vehicles in APEJ, further resulting into advent of advanced vehicle ecosystem. The already imposed and impending safety regulations are expected to spur installation of the automotive safety technologies in vehicles across APEJ. In addition, introduction of driving assistance technologies has incentivised OEMs for opting efficient microcontrollers.In terms of revenues, heavy commercial vehicles are expected to remain the most attractive in the market, based on vehicle type. In addition, premium passenger cars will also remain a lucrative vehicle type segment in the market over the forecast period. This is primarily attributed to rise in installation of advanced safety features in premium passenger cars, particularly across developed economies. Moreover, safety regulations and mandates have compelled OEMs to produce premium passenger cars featuring advanced technologies, thereby propelling demand for microcontrollers.Request and Download Sample Report@On the basis of application, sales of automotive microcontrollers in ADAS and functional safety technology are expected to register similar CAGRs through 2022. ADAS application of automotive microcontrollers will remain comparatively more lucrative than functional safety technology. Brake control system will continue to be the most lucrative application of automotive microcontrollers.By material type, sales of copper alloy for automotive microcontrollers are expected to exhibit the highest CAGR through 2022. Tinned steel will remain sought-after among materials in the global automotive microcontrollers market, with sales estimated to reach approximately US$ 600 Mn by 2022-end.FMIs report has profiled key players, who are actively contributing to growth of the global automotive microcontrollers market, which include Toshiba Corporation, Infineon Technologies, Maxim Integrated Products, Inc., Fujitsu Limited, Silicon Labs Private Limited, Renesas Electronics Corporation, Microchip Technology Inc., STMicroelectronics NV, NXP Semiconductors NV, and Texas Instruments Incorporated.Buy Full Automotive Microcontrollers Market Report@Future Market Insights (FMI) is a leading market intelligence and consulting firm. We deliver syndicated research reports, custom research reports and consulting services, which are personalized in nature. FMI delivers a complete packaged solution, which combines current market intelligence, statistical anecdotes, technology inputs, valuable growth insights, an aerial view of the competitive framework, and future market trends.Future Market Insights616 Corporate Way, Suite 2-9018,Valley Cottage, NY 10989,United StatesT: +1-347-918-3531F: +1-845-579-5705Email: sales@futuremarketinsights.comWebsite: Dyestuff Market will grow with the CAGR of 8.3%. Dye Stuff Market https://www.marketresearchfuture.com/sample_request/3235 https://www.marketresearchfuture.com/reports/dye-stuff-market-3235 Synopsis of Dye Stuff Market:In Chemical Industry, dyestuff plays an important role which enhance the growth of Chemical Market, the applications and production of dyestuff is one the oldest chemical industry of human activities. In addition, the natural Dyestuff using since period of ancient. Presently, synthetic Dyestuffs has covered larger share of Dye Stuff Market, and available in several types such as azo dyes, cyanine dyes, nitroso dyes, anthraquinone dyes, nitroso dyes, and other. Moreover, textile, carpet, and garment industry is one of the biggest and most prominent sectors as consumption of the dyes are used in textile industry. Presently, by the types markets for dyestuff are primarily dominated by reactive and disperse dyes. In region such as China, South Korea, and Taiwan is considering as strong players in term of disperse dye stuff, whereas India has occupied lead in production of reactive dyestuff. The Global Dye Stuff Market is expected to witness a significant growth of USD ~ 258.79 million by 2023 with CAGR of ~8.3 % between 2016 and 2023.Growth of various industry such as textile, leather, paper, wood, and others are the major drivers of Dye Stuff Market especially in APAC region. Asia-Pacific is expected to be the fastest growing markets for dye stuff where growth is driven by the countries such as India, China, and Japan. In addition, increasing market of textile industry will increase the consumption of Dye Stuff Globally. Furthermore, stringent environmental regulations for synthetic based Dye Stuff can hamper the market growth in future.Request Sample Research Report @Key Players:Key players of the Global Dye Stuff Market are Clariant International Ltd. (Switzerland), Lanxess AG (Germany), BASF SE (Germany), Orion Colorchem Industries (India), Setas Color Center (Turkey), Synthesia, a.s (Europe), Synthetic Corporation (South Korea), Avocet Dye & Chemical Co. Ltd (UK), Arkema SA (Europe), Huntsman Corporation (Texas), and others.Market Overview:Dye stuff is part of chemical industry since ancient history, main source of dye stuff are natural and synthetic dye stuff. Ultimately, the natural dyestuff was losing the market due to easily availability and cheap cost of synthetic dyestuff. Presently, due to strict government regulations of using synthetic dyestuff, the demand of natural dyestuff is again increasing in the market, in the industry of paper, textile, and leather. Dyestuff is used in various applications such as textile dye, leather dye, paper dye, wood dye, and others, by different types such as disperse dye, direct dye, reactive dye, vat dye, acid dye, cationic dye, sulfur dye, and others. In addition, growth of textile and leather industry are the major industries for consumption of dye stuff especially in APAC region by contributing the major countries such as China, India, Thailand, and South Korea. It is expecting that during 2016-2023 the Global Dyestuff Market will grow with the CAGR of 8.3%.Market Segmentation:Global dye stuff market is segmented by source, composition, types, application, and region. On the basis of source the dye stuff market is divided by natural, synthetic dye stuff. Natural dyestuff are dyes derived from plants, invertebrates, or minerals. From the plants, natural dyestuff found from berries, leaves, roots, wood, and bark. Furthermore, tea, coffee, berries, bark, vegetables, and others can also considered as natural dyestuff. Plant based natural dyestuff such as madder, saffron, and indigo, were raised commercially and were important trade goods in the Asia Pacific and Europe region. On the other hand, the production of synthetic chemical dyestuffs has become huge business in chemical industry, but somehow the manufacture and application of synthetic dyestuff is one of the worlds most polluting productions. They are used in preparing wood, straw, leather, fibers especially the acrylics, and paper discharge printing. Synthetic dyes are available in wide range in market according to their applications, such as cationic dyes, direct dyes, acid dyes, sulphur dyes, azoic dyes, and others.Inquire more about this Report @Furthermore, on the basis of composition the dye stuff market is divided by inorganic and organic dyestuff. On the other hand on the basis of types the dye stuff market is divided by disperse dye, azo dye, direct dye, reactive dye, vat dye, acid dye, cationic dye, sulfur dye, and others. Among all reactive dye covers the largest market share especially in India. On the other hand, disperse dyestuff are water-insoluble dyestuff which dye acetate fibers and polyester. Disperse dyestuff molecules are the smallest dyestuff molecules among all the given dyestuff. The main applications disperse dyestuff in the textile fibers market is anticipated to urge the global dyestuff market. The major driving factors for disperse dyestuff market is due to growing consumer demand for color alternatives in various product categories and growth in end user industries. Whereas, direct dyestuff are used on cotton, paper, leather, wool, silk and nylon due having strong features such as soluble in water, has strong affinity to cellulose fiber, comparatively cheap, and easily diffusible into fiber. Next, is reactive dyestuff which chemically reacted with the fibers with the formation of covalent bond between the dye and the fiber Reactive dye most commonly used in dyeing of cellulose like cotton or flax, but also wool is dye-able with reactive dyes. Moreover, on the basis of application dye stuff the market is segmented into textile dye, leather dye, paper dye, wood dye, and others, among all application textile industry occupied the highest market share.Regional Analysis:In geographical terms, Asia Pacific is the largest market of Dye Stuff due to demand in various industry such as textile, leather, and paper, in China region followed by India. Increasing demand for textile industry in the China, India, Taiwan, and South Korea has made Asia Pacific largest consumer of the global dye stuff market followed by increasing in the consumption of Dye Stuff Market in Europe region. In Europe region, dye stuff market is mainly Drive by textile industry. In addition, the third largest market of dye stuff is North America region due to large consumption in textile, paper, and leather industry. Latin America and Middle East also witnessed in growth of dye stuff market due to various application such as textile dye, leather dye, paper dye, wood dye, and others.About Market Research Future:At Market Research Future (MRFR), we enable our customers to unravel the complexity of various industries through our Cooked Research Report (CRR), Half-Cooked Research Reports (HCRR), Raw Research Reports (3R), Continuous-Feed Research (CFR), and Market Research & Consulting Services.MRFR team have supreme objective to provide the optimum quality market research and intelligence services to our clients. Our market research studies by Components, Application, Logistics and market players for global, regional, and country level market segments, enable our clients to see more, know more, and do more, which help to answer all their most important questions.Contact:Market Research FutureOffice No. 524/528, Amanora ChambersMagarpatta Road, HadapsarPune - 411028Maharashtra, India+1 646 845 9312Email: salesteam@marketresearchfuture.com Advanced Ceramic Market will be anticipating an exponential growth during the forecast period Advanced Ceramics Market https://www.marketresearchfuture.com/sample_request/1604 https://www.marketresearchfuture.com/reports/advanced-ceramics-market-1604 Market Synopsis of Advanced Ceramics Market:Over the past decade, the Global Advanced Ceramics Market has experienced a significant growth in terms of demand and supply. As per MRFR analysis, the Global Advanced Ceramic Market will be anticipating an exponential growth during the forecast period. The growing application industries such as electronics, electricals, defense, medicals & biomaterials and others are resulting in increasing demand for advanced ceramics. Electronics is expected to be the leading application due to the huge demand. The Advanced Ceramics are very much environmental friendly and easy to use andOn the other hand, the growing nanotechnology is the major growth driver for this market. Geographically, APAC is one of the major contributor in the global market followed by North America and Europe.Key Players:The leading market players in the Global Advanced Ceramics Market include Ceradyne, Ceram Tec, Morgan Advanced Materials, Murata Manufacturing, Coorstek, Kyocera Corporation, Blasch Ceramics and among others.Request Sample Research Report @Segmentation:As per MRFR analysis, the global advanced ceramics market has been segmented into:By Materials: alumina, aluminum nitride (AlN), zirconia, silicon nitride, othersBy Application: electronics, electricals, defense, medicals & biomaterials and others.Study Objectives of Advanced Ceramics Market: To provide detailed analysis of the market structure along with forecast for the next 5 years of various segments and sub-segments of the Global Advanced Ceramics Market. To provide insights about factors affecting the market growth. To analyze the Global Advanced Ceramics Market based on various factors- price analysis, supply chain analysis, porters five force analysis etc. To provide historical and forecast revenue of the market segments and sub-segments with respect to four main geographies and their countries- North America, Europe, APAC, and Rest of the World (ROW). To provide country level analysis of the market with respect to the current market size and future prospective. To provide country level analysis of the market for segment by materials and application. To provide strategic profiling of the key players in the market, comprehensively analyzing their core competencies, and drawing a competitive landscape for the market. To track and analyze competitive developments such as joint ventures, strategic alliances, mergers and acquisitions, new product developments, and research and developments in the Global Advanced Ceramics Market.Regional Analysis of Advanced Ceramics Market:The Global Advanced Ceramics Market is poised to reach $XX million in 2015 from $XX million in 2021, with a CAGR of XX% during the forecasted period.The report for Global Advanced Ceramics Market of Market Research Future comprises of extensive primary research along with the detailed analysis of qualitative as well as quantitative aspects by various industry experts, key opinion leaders to gain the deeper insight of the market and industry performance. The report gives the clear picture of current market scenario which includes historical and projected market size in terms of value and volume, technological advancement, macro economical and governing factors in the market. The report provides details information and strategies of the top key players in the industry. The report also gives a broad study of the different market segments and regions.Inquire more about this Report @About Market Research Future:At Market Research Future (MRFR), we enable our customers to unravel the complexity of various industries through our Cooked Research Report (CRR), Half-Cooked Research Reports (HCRR), Raw Research Reports (3R), Continuous-Feed Research (CFR), and Market Research & Consulting Services.MRFR team have supreme objective to provide the optimum quality market research and intelligence services to our clients. Our market research studies by Components, Application, Logistics and market players for global, regional, and country level market segments, enable our clients to see more, know more, and do more, which help to answer all their most important questions.Contact:Market Research FutureOffice No. 524/528, Amanora ChambersMagarpatta Road, HadapsarPune - 411028Maharashtra, India+1 646 845 9312Email: salesteam@marketresearchfuture.com Middle East District Cooling Market to reach $12bn by 2024 Global Market Insights https://www.gminsights.com/request-sample/detail/2031 https://www.gminsights.com/inquiry-before-buying/2031 https://www.gminsights.com Increasing investments toward infrastructure development across the GCC countries coupled with growing demand for reliable and cost-efficient cooling systems will drive the district cooling market size. Rapid urbanization along with ongoing construction developments across government projects in prominent cities of Saudi Arabia including Mecca and Riyadh will stimulate the product penetration. In 2015, Emicool underlined its plan to expand its DC plant capacity to 250,000 tons of refrigeration in line with the expansion of the Dubai Investments Park as a part of its growth strategy for Dubai World Expo 2020.Commercial district cooling market size is set to exceed 8 Million RT by 2024. Hotels, malls, shops, offices and hospitals are some of the key applications area. Increasing emphasis on energy conservation along with rising demand for Leadership in Energy and Environmental Design (LEED) certified buildings will positively impact the business growth.Request for a sample of this research report @Flourishing construction sector coupled with ongoing government targets towards energy efficiency will fuel the UAE district cooling market growth. Companies in the UAE including Empower and Logstor as a part of strategy entered into a joint venture to use fibre optic networks in their large DC systems for conservation of water resources in cooling distribution and production.Growing adoption of sustainable energy to meet the escalating energy demand will embellish the district cooling market. Government legislations toward promotion of energy efficient and economical cooling solutions coupled with rising environmental concerns will stimulate the product penetration. The Dubai Integrated Energy Strategy 2030 developed in line with the Green Growth Strategy and the UAE Vision 2021 has set strategic directions toward secure and uninterrupted sustainable energy supply.Torrid weather conditions and high humidity climate zones across Middle East will propel the district cooling market. The GCC countries experiences the longest summers with highest temperatures reaching about 540 C in 2016.Absorption cooling in 2016 accounted for over 6% of district cooling market revenue. This technique is eco-friendly in nature and utilizes waste energy for production purposes. It utilizes heat as a source of energy and helps reduce the use of electrically driven cooling, thereby reducing carbon dioxide emissions.Make an inquiry for purchasing this report @Qatar district cooling market share was valued at over 8% of market revenue in 2016. Significant expansion of DC systems and strategic government plans to reduce energy consumption will stimulate the market growth. The Qatars National Vision 2030 aims at achieving sustainable development of the country by transforming and providing high standard of living for its citizens.Notable players in the district cooling market include Emirates District Cooling (Emicool), Emirates Central Cooling System (Empower) and National Central Cooling Company PJSC (Tabreed). Other industry participants include Qatar Cool, Stellar Energy, Siemens, Marafeq Qatar, ADC Energy, Shinryo Corporation and Logstor.About Global Market InsightsGlobal Market Insights, Inc., headquartered in Delaware, U.S., is a global market research and consulting service provider; offering syndicated and custom research reports along with growth consulting services. Our business intelligence and industry research reports offer clients with penetrative insights and actionable market data specially designed and presented to aid strategic decision making. These exhaustive reports are designed via a proprietary research methodology and are available for key industries such as chemicals, advanced materials, technology, renewable energy and biotechnology.Contact Us:Arun HegdeCorporate Sales, USAGlobal Market Insights, Inc.Phone: 1-302-846-7766Toll Free: 1-888-689-0688Email: sales@gminsights.comWeb: Gas Meters Market Growth Set to Surge Significantly during 2024 https://www.transparencymarketresearch.com/gas-meters-market.html https://www.transparencymarketresearch.com/sample/sample.php?flag=S&rep_id=2090 https://www.transparencymarketresearch.com/report-toc/2090 http://www.transparencymarketresearch.com/checkout.php?rep_id=2090