Not all quantum properties are lost through interaction with the environment

first_img Explore further ( — One of the most well-known “rules” of quantum physics is that all quantum properties are lost due to environmental interaction. This rule, though, may not hold true in all situations. “We have discovered the first counter to this common rule,” Sabrina Maniscalco tells Maniscalco is a researcher at the Turku Centre for Quantum Physics, University of Turku in Finland. Along with fellow researcher (and husband) Jyrki Piilo, and Ph.D. student Laura Mazzola, Maniscalco has identified evidence that some quantum correlations can remain intact. Copyright 2010 All rights reserved. This material may not be published, broadcast, rewritten or redistributed in whole or part without the express written permission of The results of their work are published in Physical Review Letters: “Sudden Transition between Classical and Quantum Decoherence.”“Laura really did most of the work,” Maniscalco says. “She was studying different interactions between quantum properties and the environment, and looking for different correlations in noisy quantum systems. No one expected her to find strange behavior. When she first called Jyrki and me with the result, we thought it must be a mistake.”Maniscalco and Piilo went over the data and realized that it wasn’t a mistake. “We checked the calculations again, and found that the time evolution of quantum correlations in this case remains constant for a long time. It represented a transition between classical and quantum decoherence, and the quantum property was not lost.”This particular correlation can be found, for example, in quantum systems comprising of two qubits. “These qubits, each with different properties, such as different polarizations, have to interact with a type of noise that doesn’t change the energy of the qubits,” Maniscalco explains. “Instead of changing the energy, the noise just changes the phase, such as flipping polarizations. The type of noise that we have considered is one that contains all frequencies in a way that is very similar to white noise.”While this discovery is theoretical, Maniscalco says that it has an experimental basis as well. “A very recent experiment has confirmed a type of quantum correlation that is not affected by the environment. And this is not a weird type of environment; it’s a natural environment that we could work in right now.” (For more on this experiment, see Jin-Shi Xu, et. al., “Experimental investigation of classical and quantum correlations under decoherence,” Nature Communications (April 2010). Doi:10.1038/ncomms1005.)In the last 20 years, Maniscalco points out, technology has advanced to the point where it is possible to use single atoms or photons to build quantum logic gates for future quantum computers, or perform communication, measurement and cryptography tasks. “We’ve learned that it is possible to exploit the quantumness of the microscopic state, but in order for us to succeed, the quantum properties have to remain intact for a long time. That is a challenge, since once the properties are lost through interaction with the environment, a device can’t exploit quantumness.”This discovery that certain quantum correlations are not lost in presence of the environment could lead an increased ability to exploit the quantum world for use in technological devices. Maniscalco points out that the idea that all quantum properties need not be lost through interaction with the environment presents more than interesting fundamental implications. “While this work has a surprising fundamental aspect,” she says, “it opens up a whole range of possibilities with applications in quantum technology, including computing, communications, metrology and cryptography.”Next, Maniscalco says that her group, and Piilo’s group, at the University of Turku will need to study this effect. “We need to learn the most general conditions for this behavior, and see if it holds for other environments. We are also working toward deigning a quantum protocol that uses this state, so that we can demonstrate an application of this effect in practice.”For more information, you can visit the Open Quantum Systems and Entanglement group and the Non-Markovian Processes and Complex Systems group web pages. Citation: Not all quantum properties are lost through interaction with the environment (2010, June 1) retrieved 18 August 2019 from This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. More information: Laura Mazzola, Jyrki Piilo, and Sabrina Maniscalco, “Sudden Transition between Classical and Quantum Decoherence, Physical Review Letters (May 2010). Available online: Quantum cryptography: No Signaling and quantum key distributionlast_img read more

Carbon nanotube film restores light sensitivity to blind retinas

first_img Journal information: Nano Letters The development of artificial retinas still faces many challenges: the implants should provide long-term light sensitivity, should have high spatial resolution, should not contain wires, and should be made of materials that are biocompatible and mechanically flexible. Candidate materials include conducting polymers and quantum dot films, with each having its own advantages and disadvantages in these areas.Another approach to restoring light sensitivity involves optogenetics, in which light-sensitive proteins (bacterial opsins) are introduced into neurons in the retina. However, this method still requires an electrode to assist in light-induced stimulation of these neurons. In a new paper published in Nano Letters, researchers at Tel Aviv University, The Hebrew University of Jerusalem, and Newcastle University have found that a film containing carbon nanotubes and nanorods is particularly effective for wire-free retinal photostimulation. “The greatest significance of our work is in demonstrating how new materials (quantum rods combined with carbon nanotubes) can yield a new system suitable for efficient stimulation of a neuronal system,” coauthor Yael Hanein, Professor at Tel Aviv University, told researchers showed that, when the film is attached to a chick retina at 14 days of development (at a time when the retinas are not yet light-sensitive, and so completely blind), the retinas produce a photogenerated current—a neuronal signal that can then be interpreted by the brain. In the new film structure, the nanorods are interspersed throughout a 3D porous carbon nanotube matrix, and the resulting film is then patterned onto a flexible substrate for implantation. The researchers explain that the 3D structure of the new film provides several advantages, which include high light absorbance, strong binding to neurons, and efficient charge transfer. While other candidate materials for artificial retinas, such as silicon, are rigid, nontransparent, and require an external power source, the new material does not have these problems.With these advantages, the new films look very promising for use in future artificial retina applications. The researchers also expect that the films could be improved even more with further research.”At the present, we study the new implants in vivo, attempting to demonstrate their performances over long-term implantation,” Hanein said. “We teamed up with a retina surgeon to develop an implantation and testing procedures compatible with conventional surgical practices towards attempting human trials in the future.” Carbon nanotubes combined with nanorods are used to create a light-sensitive film, potentially replacing damaged photoreceptors in the retina. Charge separation at the nanorod-nanotube interface elicits a neuronal response, which could then be interpretted by the brain. Credit: Bareket, et al. ©2014 American Chemical Society Photoelectric dye-coupled thin film as a novel type of retinal prosthesis This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. © 2014 Phys.orgcenter_img ( —Light striking the retina in the back of the eye is the first major step in the vision process. But when the photoreceptors in the retina degenerate, as occurs in macular degeneration, the retina no longer responds to light, and the person loses some or all of their sight. However, if the retina can be made sensitive to light with the help of some type of optoelectronic implant, then vision may be restored. Citation: Carbon nanotube film restores light sensitivity to blind retinas (2014, November 11) retrieved 18 August 2019 from More information: Lilach Bareket, et al. “Semiconductor Nanorod-Carbon Nanotube Biomimetic Films for Wire-Free Photostimulation of Blind Retinas.” Nano Letters. DOI: 10.1021/nl5034304 Explore furtherlast_img read more

Women bag top 3 places in Smart India Hackathon at IITKGP

first_imgKolkata: Three all-woman teams have emerged as the winner and two runners-up at the Grand Finale of Smart India Hackathon 2018Hardware Edition at the IIT Kharagpur, a statement from the institute said today. The teams devised innovative prototypes in Agriculture/Agro-electronics sector which was the theme of the Hackathon at the IIT-KGP. The institute was one of the 10 nodal centres across the country for the Hackathon, each having different themes for the contending teams and would have their own winners. Also Read – Heavy rain hits traffic, flights While ‘Whistling Cookers’ team of the Avinashilingam Deemed University for Women, Coimbatore, was declared the winner at the IIT-KGP, first runner-up, Team Buddies, was from the same institution, an IIT KGP statement said today. The second runner-up was ‘Team Askurvara’ from the Silicon Institute of Technology, Bhubaneswar. The winning team designed a prototype for ‘non-destructive estimation of sugar content of fruits using visible-light imaging’, the statement said. Also Read – Speeding Jaguar crashes into Merc, 2 B’deshi bystanders killed The top three winning teams won cash prizes of Rs 100,000, Rs 75,000 and Rs 50,000 respectively, it said. At the IIT-KGP, nine teams from all over the country brainstormed over the theme ‘Agriculture/Agro-Electronics’ to build their hardware solutions as a working prototype. The event at IIT-KGP saw innovations in smart drip irrigation, technology-powered mechanical harvesters and soil testing and cost-effective detection of the status of fruits and vegetables. They were among the total 150 short-listed teams in final round as the rest 141 competed at other nodal centres. The Smart India Hackathon 2018 Hardware edition was initiated by the Ministry of HRD to provide a national platform to young technical minds to showcase their innovations in devising products which can bring about significant changes in sectors like agriculture, health, clean water, waste management, automotive, smart communication and education. The event was inaugurated on June 18 by Union HRD minister, Prakash Javadekar through video-conferencing.last_img read more

22member team to scale Mt Kang Yatse in Alpinestyle expedition

first_imgDarjeeling: A team from Himalayan Mountaineering Institute (HMI), Darjeeling is all set to embark on its first ever Alpine-style expedition from August 1.A 22-member team will be climbing the Mount Kang Yatse-1 (6400 m) in Ladakh. The expedition will be formally flagged off from Darjeeling on Saturday.An Alpine-style expedition is one where no porter is used beyond the Base Camp. The expedition members carry out all activities such as load ferry, route opening and cooking among other necessary things. Also Read – Rain batters Kolkata, cripples normal life”Such expeditions are faster and are less expensive than traditional expeditions. Though it is tougher than regular expeditions, Alpine-style climbs help boost confidence,” stated Devidutta Panda, vice-principal, HMI, who is also the leader of the expedition.The expedition will be flagged off by SA Baba, Principal Secretary, Youth Service Department, Government of Bengal on Saturday.Kang Yatse — (elevation 6,400 metre) is a mountain located at the end of the Markha Valley in Ladakh. Also Read – Speeding Jaguar crashes into Mercedes car in Kolkata, 2 pedestrians killedTwo teams will depart from Darjeeling on July 25 and August 1. The expedition will take a month from August 1. Apart from members, the 22-member team also includes instructors, 2 cooks, the Curator of HMI museum and a representative of D(HMI), MoD.”For this expedition, we are not taking help from any agency. During advance course at the HMI, we teach the students expedition planning and execution. In this expedition, the instructors will get a first hand experience of planning and executing an expedition on ground zero. There will definitely be some shortcomings from which we can learn. Many instructors have not done Alpine-style expeditions in the past,” stated the vice-principal, who is a two time Everester himself. The expedition members will be going to Delhi, Manali, Leh and then onwards to the base camp of the mountain.The successful ascent of Mount Everest on May 29, 1953, by Tenzing Norgay and Sir Edmund Hillary was a major boost to mountaineering in India.One year after this historical event, the Himalayan Mountaineering Institute was established on November 4, 1954 — a result of personal initiative of Pundit Jawaharlal Nehru, the first Prime Minister of India and Dr BC Roy, the then Chief Minister of West Bengal to promote mountaineering in India.The HMI in its sixty fourth years of existence has trained approximately 40,000 personnel including 2,000 overseas trainees. Since 1954 the Institute has organised 13 mountaineering expeditions in the Himalayan regions and overseas including the Alps under the leadership of the Institute heads.last_img read more

Flu vaccinations protect the elderly too

first_imgContrary to claims that the youth benefit more from flu vaccines, a t10-year study has found that annual influenza vaccinations can also reduce the hospitalisation rate and delay mortality among the elderly.“This study evidences protection for an elderly population for whom vaccine efficacy has been questioned,” said study co-author Stefan Gravenstein, adjunct professor of medicine and health services, policy and practice at Brown University in Rhode Island, US.  Also Read – ‘Playing Jojo was emotionally exhausting’“Annual vaccination is the only way to maximise the benefit of vaccine, no matter what the age,” Gravenstein noted. The researchers found that between 2000 and 2009, the better matched the vaccine was for the influenza strain going around, the fewer residents in US nursing home died or were hospitalised.For the study, the researchers analysed records of millions of nursing home residents. Year-to-year the ability of the vaccine to fight the flu can vary widely. Sometimes vaccine makers produce a great match that is highly protective. In other years the prevailing flu strain does not match the vaccine well. The researchers took advantage of this natural variation over the decade 2000-09 to see whether nursing home residents were better off when the match was good compared to when the match was bad.  If vaccines do not help the elderly, as some critics suggest, then nursing home residents should not fare any better when the vaccine is a good match than when it is a bad match. The results showed that vaccinations help keep some  nursing home residents alive and out of the hospital. The study was published in the Journal of the American Geriatrics Society.last_img read more

Murder accused arrested after snatching incident

first_imgKolkata: One Utpal Sarkar was arrested from Konnagar, Hooghly, on Friday night and a firearm along with one round of ammunition and 25 kg ganja was recovered from him. He has been remanded to judicial custody till Monday following his production before the local court on Saturday.According to locals, on Friday night at around 10 pm, Sarkar and his associate suddenly started snatching valuables at Kotrung area. When a good number of locals gathered and retaliated, both the accused forced a scooty rider, identified as Rahim, to take them to a safe place by showing him a one-shot gun. While fleeing the spot, Sarkar fired one round of bullet in the air to create panic.While trying to flee, the scooty ran out of petrol near the Olympic maath in Konnagar. Eventually, Rahim managed to escape as they were trying to intercept another motorcycle rider. A patrolling van, after being informed, from the Uttarpara police station arrived within a few minutes. Sarkar’s associate managed to escape on a bicycle and he tried to hide behind a nearby bush but was later forced to surrender. Following his arrest, it was found that he was carrying a one-shot gun loaded with one round of bullet and 25 kg ganja. Police sources informed that he was in the prison for the past four years as is an accused in a murder case.last_img read more

Tanning can contribute to skin ageing

first_imgWhile some people believe tanning makes them more beautiful, this habit can actually damage their skin in the long run, leading to wrinkles and sagging skin, says a study.”Ultraviolet radiation from the sun and indoor tanning beds not only can increase your risk of skin cancer but also can contribute to skin ageing,” said Arianne Shadi Kourosh from the Massachusetts General Hospital, Boston, US.”Moreover, other forms of radiation, such as heat and visible light, can negatively impact the skin, as can pollution, so protecting your skin from the environment can benefit both your health and appearance,” Kourosh said. Also Read – Add new books to your shelf”Since both types of UV rays – long wave ultraviolet A (UVA) and short wave ultraviolet B (UVB) can damage the skin, it is important to use a broad-spectrum sunscreen that provides both UVA and UVB protection, with an SPF (Sun Protection Factor) of 30 or higher.””Environmental factors can damage the skin in multiple ways, from UVB rays causing sunburns and uneven pigmentation to UVA and infrared radiation penetrating more deeply into the skin to damage existing collagen and reduce collagen production, resulting in wrinkles and sagging skin, added Kourosh.Habitual UV exposure can cause blood vessels to become more prominent, causing skin redness, while visible light and pollution can cause uneven skin tone, especially in darker skin types, researchers said.last_img read more

A colourful story for your home

first_imgSimple, yet creative use of colours can add a fresh vibe to your home, say experts. Here are some tips to consider:Colourful abode: Our home decor can imbibe the cool characters of colours to bring respite from the heat outside. Simple, yet creative use of colours can make your home ready for the summer. Select hues such as pastel green, bright yellow of the Sun or the soft yellows of the freshly blossoming flowers and ripe fruits bringing the brightness of summer – all the natural hues will transform your home into a peaceful sanctuary. The season will be ruled by colours which help lend a natural and refreshing feeling to the home. Adorn your walls or your tapestry with it. Also Read – Add new books to your shelfLet nature do its work: With a wholesome respect for nature, you can bring the outdoors into your home. As nature changes its colours, so can your home. A soft pastel green tone works well. The appealing shades of lavish forests and profound seas offer a rich palette that you can undoubtedly adjust in your home. It is perfect for any nature-lover as it radiates a soothing and peaceful vibe. You can add gold accents in your bedding and pillows to provide a luxurious touch. Also Read – Over 2 hours screen time daily will make your kids impulsiveHues can help you relax: Create the right balance amongst the colours used on the walls. You can use multi-coloured furniture to create that striking contrast with the neutral or pastel shades. For instance, white and beige always rule when it comes to summers given the very cool and calming effect these colours have on the surroundings. Upscale organic: Muted neutrals, from vanilla to browns, a forest green pop, and metallics as an accent, is a combination that translates equally well to a bedroom as it does to the living room. Look out for: Yellow, purple heather, clearly aqua, pink lady and pastel blues are what you might want to look out for. The biggest advantage with delectable ice-cream colours is that it balances out the interiors without making it feel too heavy. Many people are opting for white walls and introducing pastel colours in their room through accent furniture, or artwork.last_img read more

School students visit Traffic Control Room learn nuances

first_imgKolkata: A group of students from Saint Xavier’s Collegiate School, along with few of their teachers, were shown the Traffic Control Room (TCR) at Lalbazar on Saturday and were sensitised about the traffic norms on Saturday.According to sources, on Saturday afternoon, 40 students and few teachers of Saint Xavier’s Collegiate School were taken to the TCR as part of their educational tour. During their visit, they were told about the functions of the Traffic Control Room. A police official was in-charge of briefing the students and teachers. Also Read – Rs 13,000 crore investment to provide 2 lakh jobs: MamataFollowing this, the students learnt about the use of modern technology involved in the management of traffic. They were briefed about how the equipment, such as speed laser gun, speed camera, breath analyzer and others, functioned. Also, they were shown how the traffic signals turned red to green and vice versa. They also interacted with Deputy Commissioner, Traffic, Pandey Santosh. During the interaction, several questions were put across to Santosh. A few of them were about driving licenses and traffic congestion in the city. “Few of the students asked how congestion occurs and how we manage to tackle the situation. They also asked about how a driving license can be obtained and other related questions. They were also shown how our Red Light Violation Detector (RLVD), speed camera and other equipment work. We also had a brief discussion with the teachers about traffic congestion during the rush hours,” said Santosh.last_img read more

Theda Bara – Creator of The Vamp Look and Persona and Early

first_imgTheda Bara can rightfully be called the Godmother of Goth. Starting in the nineteenth century, vampires assailed our imaginations through popular fiction and over the years they became part of our pop culture. Out of the many novels written on the subject, Bram Stoker’s Dracula, published in 1897, is undoubtedly the one that provided the basis for the modern vampire as we all recognize today in films, TV series, and novels. Over the years, Count Dracula has become one of the few fictional characters to appear in over 100 movies. While we all gladly remember legendary actors such as Max Schreck, Bela Lugosi, and of course, Christopher Lee, who masterfully portrayed the famous Count Dracula, the silver-screen “vamp” was created much earlier. To the surprise of many, the epitomé of the “vamp” persona in Hollywood movies was not a caped actor but actually an actress who went by the name of Theda Bara.Cover of “Dracula’s Guest and Other Weird Stories,” a collection of short stories authored by Bram StokerAlthough nowadays Theda Bara is far from a household name, she was actually one of Hollywood’s most popular actresses in the early years of cinema. Her acting career was brief but notable, as she appeared in more than 40 silent movies in a period of just 12 years. Sadly, most of her films were lost, but the 1915 silent film A Fool There Was, in which Theda Bara portrays the Vampire, still exists, and two years ago it was selected for preservation by the United States Library of Congress.Actress Theda Bara in a promotional photoBorn Theodosia Goodman on July 29, 1890, into a family of Jewish immigrants in Cincinnati, Theda Bara dreamed of becoming an actress, and at the age of 18, she went to New York City, hoping to make her dream a reality.Theda Bara, in a scene from “Salomé.”She struggled at the beginning with little success, but her luck changed in 1915, when director Frank Powell cast her for the role of the seductive Vampire in A Fool There Was. The film would turn her world upside-down, making her an overnight sensation and the first Hollywood “vamp,” as it was this nickname for Bara’s character that coined the term.Movie PosterFans loved the new exotic–and erotic–actress; in fact, they loved her so much that she allegedly received over 1,000 marriage proposals. Countless songs have been written about her and many children were named Theda in her honor. As written by the Guardian‘s Kira Cochrane, there was also “a perfume and even a sandwich (minced ham, mayonnaise, sliced pimento and sweet pickles on toast served warm) created in her honor.” Theda Bara in “A Fool There Was”Part of her success story is the incredible marketing strategy created by the Fox studio, which includes her fabricated screen name, Theda Bara, rather mysterious origins, and vampirish personality. According to the studio, she wasn’t born in Cincinnati, Ohio, nor into a family of Jewish immigrants, but to a French actress and an Italian sculptor. The public apparently bought the story and success was inevitable for the then 29-year-old actress.“Cleopatra” (1917)During the next few years, she went on to star in more than 40 movies, adding details to her vamp image. She became far more than just Hollywood’s first “vamp” and is now considered by many to be the first true sex symbol in the history of Hollywood.“The Soul of Buddha” (1918)However, her reign as queen of the vamps was sadly short-lived as her contract was dropped by Fox in 1919, meaning that her acting career was virtually over. Vamps were no longer in vogue, and Hollywood was now hunting innocent faces such as Mary Pickford and Marguerite Clark, which meant that Theda Bara was out of the game.“A Woman There Was” (1919)She made several attempts to resurrect her Hollywood career but ended up parodying the vamp image she worked so hard to create. In 1921, Bara married director-writer Charles Brabin, with whom she spent the rest of her life.Read another story from us: The first Hollywood male sex symbol was Japanese actor Sessue HayakawaAfter 1926, she no longer made attempts to regain her star status, and she never appeared in a sound film. The queen of the vamps left this world on April 7, 1955, dying in Los Angeles at the age of 69.last_img read more

The Majestic Documents and their Alleged Proof of a Vast UFO CoverUp

first_imgAliens and belief in their existence have been part of human imagination for centuries. In contrast to the almost regular news articles in the time of the Space Race during the Cold War that were widely held as hardly believable, except among people referred to as conspiracy theorists, nowadays it seems there is an increase in legitimate research that proves that something must exist out there.U.S. Pentagon building in Arlington, Virginia, aerial view.When in December 2017 the New York Times published an article revealing the details of a five-year-long Pentagon investigation into “unexplained aerial phenomena,” readers seemed to take a much more believing approach to the news. Former senator Harry Reid voiced his opinion in a tweet that read “The truth is out there.”One controversial thing that took place the same year was the release of alleged leaked government documents relating to an investigation by the group Majestic 12 on crashed extraterrestrial spacecraft and the alien travelers that were on board.Roscoe H. HillenkoetterThe first series of such documents appeared in 1984. Despite being determined as “completely bogus” by an FBI investigation, the idea of a secretive government cover-up is still upheld by some UFO conspiracy theorists.Majestic 12, the alleged leaked documents stated, was formed in 1947 under President Harry Truman and was a top-secret group comprising military personnel and scientists.The documents named top officials including Rear Admiral Roscoe Hillenkoetter, the first director of the CIA; Dr. Vannevar Bush, a former wartime chair of the Office of Scientific Research; and Dr. Donald Menzel, a prominent scientist and astronomer working at Harvard University.Roswell Daily Record, July 8, 1947, announcing the “capture” of a “flying saucer.”The latest document, which appeared in 2017, allegedly contained proof that the 1947 UFO crash in Roswell indeed happened. It was a four-page section of a supposed Majestic 12 preliminary briefing from 1989, that claimed the group was in possession of seven crashed spaceships and the preserved bodies of 27 deceased aliens.Could the so-called Majestic Documents possibly be real?UFO and paranormal researcher Nick Redfern was among the first people to dispute the credibility of the 2017 “leaked” pages.An alleged flying saucer seen over Passaic, New Jersey in 1952.Aside from numerous grammatical errors in the cryptic text, Redfern highlights that the style is not consistent with government documentation. Also, and perhaps most importantly, the document confused the chronology of the different events that it was trying to prove.One of the most widely derided parts of the document was an interview with a captive alien that did not even mention the language in which the interview was held.Nick Pope, UFO journalist. Photo by David Howard CC BY 2.0Describing the transcript of the alleged interview for OpenMinds.Tv, Nick Pope, a UFO journalist and former employee of the British Government’s Ministry of Defence, compared it to “a high school student attempting (badly) to write a science fiction short story.”However, there are defenders of the documents, most prominently Dr. Robert Wood and his son Ryan Wood, who argue that rigorous analysis has proven them to be genuine.The father and son provide counter-arguments for every inconsistency, insisting that the documents could very well be the proof of life existing outside of the Earth.Read another story from us: UFO? Experts are studying a mysterious aluminum object that could date back to 250,000 yearsUFO scientist and nuclear physicist Stanton Friedman has extensively analyzed the Majestic Documents and has evidence for some of them being forged. Dr. Wood and co., however, maintain that Friedman still cannot exclude with certainty the possibility that part of them could be the real deal.last_img read more

Colins 4 reasons why the Warriors wont win the NBA title this

first_imgThe NBA season tips off tonight, and the talk of the NBA is the Warriors’ new superteam. Kevin Durant joins a juggernaut that set the NBA record for regular season wins and lost in 7 to LeBron and the Cavs in the Finals just a year ago.Many experts predict that Golden State, with the addition of KD, will end up hoisting the Larry O’Brien Trophy at the end of the year. Colin isn’t among them.While he thinks Golden State will be a force, and should make it out of the Western Conference to face the Cavs and LeBron in the third edition of their NBA Finals grudge match, he doesn’t think they’ll win a championship in their first year together.Here are the four reasons why Colin thinks the Warriors won’t win the NBA title this year.Chemistry – The Warriors have the three best pure shooters in the NBA. There’s still only one ball, per NBA rules. In the history of the NBA, no one team has had the three best shooters in the league on the same roster. Someone is going to have to step back and give up shots. It’s just math. It’s easy to say it won’t be a problem in the preseason, but how will it play out as the year develops?  Also, who’s taking the final shot for the new Warriors? Pippen always deferred to MJ, McHale and Parrish to Bird. With the Warriors, it’s not yet clear. Colin also thinks an unhappy Draymond Green could only compound the chemistry issues of a team that needs to gel as a unit.2. Where’s the beef? – The Warriors signed Durant, but lost Andrew Bogut, Festus Ezili and Mo Speights in the frontcourt. They don’t have a legitimate rim protector. When Bogut was out in the Finals, the Warriors were dominated by LeBron and a more physical Cavs team. Draymond is going to be seeing heavy minutes at the 5. This may be fine during the regular season, but Playoff basketball is more physical, and in the chess match against the Cavs, who will be waiting at the rim to stop the King?3. LeBron is a nightmare matchup – LeBron took the Warriors to 6 games in 2015 with Kyrie Irving and Kevin Love sidelined with injuries, and super-scrub Matthew Dellavedova playing big minutes. Last year, James dominated the Warriors in the Cavs’ historic comeback to win the title. The shot making ability of Kyrie Irving, who also torched the Warriors in the Finals, forces the Warriors to stay honest if they’re inclined to collapse on LeBron. What’s the solution? It’s definitely not Durant.4. All the pressure is on the Warriors – The first title is always the hardest. LeBron and Wade struggled to win their first title when they joined forces in Miami. The Warriors have a title, but not as currently constituted. The entire basketball world will be micro-analyzing every misstep, and ready to pounce if there is any hint of a problem in the East Bay basketball utopia. How will they handle the pressure? Maybe they can, but It remains to be seen, especially come playoff time.4 reasons the Warriors won’t win the title.— Herd w/Colin Cowherd (@TheHerd) October 25, 2016last_img read more

VIDEO Jet boarder singlehandedly rescues capsized catamaran

first_imgIn a rescue straight out of a sci-fi movie, a man on a water powered jet board executed an incredible one man rescue of a capsized catamaran while he was out doing some tricks.The boarder was flying around when he saw the boat flip and flew into action. He grabbed the mast and flew skyward, righting the ship and saving the day.Hard to argue this technology is completely useless after this effort.last_img

VIDEO Uncle Drew beat Reggie Miller in a game of old man

first_imgNew Celtics’ point guard Kyrie Irving is in Atlanta filming the Uncle Drew movie, and took a break from filming to play some pop-a-shot, in character, against genuinely aged legendary 3-point assassin Reggie Miller.Comedian Lil Rel posted videos of both of marksman getting up shots, and Uncle Drew squeaked out a slim 71-68 win. This time, the fake old guy gets the W over the real old guy.last_img

Prime Day Preview 199 Off 2019 MacBook Pros

first_img Best & Worst Laptop Brands 2019Which laptop brand is best? We’ve ranked every major player from Apple to Huawei based on review scores, tech support, innovation and more.Volume 0%Press shift question mark to access a list of keyboard shortcutsKeyboard Shortcutsplay/pauseincrease volumedecrease volumeseek forwardsseek backwardstoggle captionstoggle fullscreenmute/unmuteseek to %SPACE↑↓→←cfm0-9接下来播放MacBook Air vs MacBook Pro: Which 13-inch MacBook Is Right For You?03:46关闭选项Automated Captions – en-USAutomated Captions – en-US facebook twitter 发邮件 reddit 链接已复制直播00:0001:3001:30Your Recommended Playlist03:46MacBook Air vs MacBook Pro: Which 13-inch MacBook Is Right For You?02:01Apple’s Mac & iPad Pro Event: 5 Things You Need To Know01:30How to Use VLOOKUP in Excel01:07How to Find Your MAC Address in Windows 1001:34How to Reset a Windows 10 PC01:32How to Turn Your Windows 10 PC into a Wireless Display关闭  Best Apple Laptops 2019Best Laptop Deals of Today The 2019 MacBook Pros may look like their predecessors, but internally they sport all kinds of new components. Although we predict they’ll be on sale again during Amazon Prime Day, if you can’t wait that long, today’s price cuts are pretty solid.Amazon currently has the 13-inch Apple MacBook Pro (2019) on sale for $1,649.99. That’s $149 off and the best price we’ve seen for Apple’s new Mac. Alternatively, you can get the 15-inch Apple MacBook Pro (2019) on sale for $2,199.99. That’s $199 off and an all-time price low for this Mac.Buy the 13-inch Apple MacBook Pro (2019) for $1,649.99 ($149 off) at AmazonBuy the 15-inch Apple MacBook Pro (2019) for $2,199.99 ($199 off) at AmazonThe 13-inch MacBook Pro sports a 2560 x 1600 resolution display, 2.4GHz Core i5 8th-gen CPU, 8GB of RAM, and a 256GB SSD. If you need more horsepower — or a bigger screen — you can opt for the 15-inch model, which bumps you up to a 2.6GHz six-core 9th-gen Core i7 CPU and 16GB of RAM. In our 13-inch MacBook Pro 2019 review, we were impressed by its ridiculously fast performance, stylish design, and sharp display. Both models also sport Apple’s new butterfly keyboard, which didn’t rear any problems during our tests.  (Although we’ll need to use the keyboard a bit longer before we can give it our final approval). That said, it still has the same shallow travel as previous editions. It offers just 0.6mm of travel, instead of the 1mm that we prefer.In terms of power, the 13-inch model scored a high 18,221 in our Geekbench 4.1 test, which wiped the floor with competing laptops like the Dell XPS 13 with Core i7-8565U/16GB of RAM (14,936) and the HP Spectre x360 with Core i7-8565U, 8GB of RAM (14,935).If you still have some cash left in your budget, Amazon also has the Apple Magic Mouse 2 on sale for $67.31 ($11 off). Advertisement Apple MacBook Pro Credit: Laptop Magcenter_img by Taboolaby TaboolaSponsored LinksSponsored LinksPromoted LinksPromoted LinksYou May LikeKelley Blue Book5 Mid-engine Corvettes That Weren’tKelley Blue BookUndoGrepolis – Free Online GameGamers Around the World Have Been Waiting for this GameGrepolis – Free Online GameUndoAncestryStart your journey with AncestryDNA®- now $59. Ends 8/26.AncestryUndoVerizon WirelessThis new phone will blow your mind.Verizon WirelessUndoTODAYPolice Identify Girl Licking Ice Cream Tub In Viral VideoTODAYUndoForbes.com100 Women to Look up to Right Now, and WhyForbes.comUndoAdvertisementlast_img read more

Scan a Windows PC for Long Path issues

first_imgScan a Windows PC for Long Path issues by Martin Brinkmann on August 04, 2017 in Software – Last Update: July 17, 2017 – 9 commentsWindows users may run into so-called long path issues when a path exceeds the maximum length of 260 characters.It is quite easy to run into the issue. Maybe by connecting a Flash drive that you use on Linux for the most part — which does not have this limit — or by trying to extract an archive that is so deep in terms of directory structure, that you will end up hitting the limit.While there are ways around this, for instance by renaming directories or by using the Long Path Fixer Tool for Windows, it may be useful sometimes to scan a system for long path issues to fix them asap.Too Long Paths DetectorToo Long Paths Detector is a free open source program for Microsoft Windows that you may run to scan for issues related to too long paths on Windows.The program is provided as a 32-bit and 64-bit portable version that you can run from any location. The program does not require elevated privileges, and is pretty bare bones.The application displays a prompt on start that gives you two choices: run the scan by selecting a root folder, or scan all drives connected to the PC at the time.Once you have made the decision, you are asked to select a character limit. The default is 200, and the author recommends to pick a limit that is below the maximum.Too Long Paths Detector scans the selected folder structure or all drives on the system afterwards. It places an icon in the system tray area that you may interact with to suspend the operation or exit the program.It saves the information to a log file which it opens automatically once the scan finishes. The log file lists all folder and file paths that exceed the selected character limit. The limit is displayed in front of each folder, but the data is not sorted.Tip: increase the character limit if you get too many results to narrow them down.Too Long Paths Detector finds paths that are too long, but it is not designed to do anything about them. You need other tools, like the aforementioned Long Path Fixer for that.VerdictToo Long Paths Detector is a handy administrative tool to quickly check locations or entire systems for long path violations. The program is as easy to use as it gets, but could use some nice to have features such as a sorted log file in the end or maybe an option to export the data to a csv file for further processing.Now You: What do you do when you run into long path issues?Summary12345 Author Rating4 based on 4 votes Software Name Too Long Paths DetectorOperating System WindowsSoftware Category AdministrationLanding Page Advertisementlast_img read more

A detailed look at aboutprofiles in Firefox

first_imgA detailed look at about:profiles in Firefox by Martin Brinkmann on August 06, 2018 in Firefox – 12 commentsThe Firefox web browser supported profiles for a very long time. Profiles are separate browsing profiles that run independent of each other. User generated content, bookmarks, installed add-ons, or the browsing history is kept separate from other profiles, and so are settings, custom about:config modifications, or any other change made to the browser.Firefox users and admins used the Profile Manager to create new user profiles and manage existing ones in the past (and still do as it still works fine).You can check out our Firefox command line options overview for details on running the Profile Manager; essentially, you have to add -p when you start Firefox to have it launch the profile manager, and need to add -no-remote to the command if you want to run multiple profiles at the same time.I run multiple Firefox profiles for work and for specific tasks as profiles offer a better way of separating data and customizing the browser to different requirements.Mozilla planned to replace the original Profile Manager with a new tool back in 2011 but nothing came out of that even though it is still possible to download the new tool the organization created back then and run it.The organization did introduce the about:profiles internal page in Firefox in 2015 to move profile management into the browser.about:profiles in FirefoxThe about:profiles page is available in all supported versions of the Firefox browser. You can load the address in Firefox Stable or Firefox Nightly.The description at the top explains what About Profiles is all about:This page helps you to manage your profiles. Each profile is a separate world which contains separate history, bookmarks, settings and add-ons.Three core options are displayed at the top:Create a new user profile.Restart the Firefox browser with add-ons disabled.Restart Firefox normally.Restart options are self-explanatory; Firefox launches a profile creation wizard when you select the create new user profile option on the page.The wizard walks you through the steps of creating a new profile in Firefox. You may select a custom name for the profile and even change the default folder if you want to.The profile is ready for use right after you hit the finish button to create it.Manage profilesYou find the list of existing profiles below the three general options. Each profile is listed with its root directory and local directory, and whether it is the default profile of the browser. The default profile gets loaded automatically when you don’t supply other instructions on start.Up to five options may be displayed that you can activate for profiles:Rename — always available. Renames the profile name.Open Folder — always available. Opens the folder of the profile in the default file browser of the operating system.Remove — only available for non-default and not in use profiles. Deletes the entire profile. There is no backup but Firefox displays a prompt that requires confirmation and explains that the data cannot be restored once the user gives the okay.Set as default profile — only available to profiles that are not the default. Changes the default Firefox profile to the selected one.Launch profile in new browser (Firefox 63) — Opens a Firefox instance using the selected profile.Some of the options are really useful. Rename may come in handy if you did not pick a custom name for a profile, and remove helps you clean up profiles. The option to launch a profile in a new browser is new and useful if you need to run a profile in a new browser instance next to the existing one. Note that the profile will open in the same Firefox version which may not always be what you want.Tip: I have created desktop shortcuts to load profiles and different versions of Firefox with just a click.Now You: Do you use multiple profiles in Firefox or other browsers (if supported)?SummaryArticle NameA detailed look at about:profiles in FirefoxDescriptionThe guide takes a detailed look at the about:profiles page of the Firefox browser which provides tools to manage browser profiles.Author Martin BrinkmannPublisher Ghacks Technology NewsLogo Advertisementlast_img read more

More Than 150000 US SmallBusiness Websites Could Be Infected With Malware at

first_imgJune 12, 2019 It was March 2, 2016, and Melissa Marchand’s day on Cape Cod started out like any other. She drove to her job at Hyannis Whale Watcher Cruises in her mid-size sedan, picked up a latte with 1 percent milk at her local coffee shop and sat down at her desk to check her email. Then, Marchand got the call no website manager ever wants to receive: The site was down, and no one knew how to fix it.After she dialed up the web hosting provider, the news went from bad to worse: had been hacked and, to her horror, all visitors were being redirected to porn sites. Google had even flagged the company’s search results, warning potential customers that the site may be hacked.“It was a total nightmare — I had no idea that something like this could happen,” Marchand said in an interview with Entrepreneur. “I’d say 75 to 80 percent of our bookings are done online, so when our site is down, we’re just dead in the water.”At the provider’s suggestion, Marchand called SiteLock, a website security company, and granted its representatives site access. SiteLock discovered the hackers had exploited a security hole in a WordPress plugin, which gave them the access they needed to redirect visitors to racy websites.By the end of the work day, Marchand sat in her car in her gym’s parking lot, speaking on the phone with a SiteLock representative to review the plan of action. She finally felt like things were going to be OK.Within three days, was back up and running, though it took another three weeks for Google to remove the blacklist warning from the company’s search results.The hack hit about a month before the whale-watching season began in mid-April, and though it wasn’t peak season, the company still missed out on pre-booking tour groups from schools and camps. Marchand estimated the attack lost the company about 10 percent of its March and April business.A risk for small businesses everywhereSmall-business owners were victims in 43 percent of data breaches tracked between Nov. 1, 2017, and Oct. 31, 2018, according to a 2019 Verizon report. The report tracked security incidents across all industries, but the most vulnerable sectors this year were retail, accommodation and healthcare.What does the issue look like on a national scale? If we take the sample size of infected sites SiteLock said they found in 2018 — approximately 47,244 out of 6,056,969 checked — and apply that percentage to the country’s estimated 30.2 million small-businesses websites, minus the estimated 36 percent that don’t have one, then we can loosely estimate the amount of infected small-business websites to be around 150,757.As a small-business owner, you may not believe anyone would target your website, but that’s just it — bad actors are likely not seeking out your site specifically, said Mark Risher, head of account security at Google.“Sometimes, we talk about the distinction between targets of choice and targets of chance,” Risher said. “Targets of chance is when the attacker is just trying anything — they’re walking through the parking lot seeing if any of the car doors unlocked. Target of choice is when they’ve zeroed in on that one shiny, flashy car, and that’s the one they want to break into — and they’ll try the windows, the doors … the moon roof. I think for small businesses, there’s this temptation to assume, ‘No one would ever choose me; therefore I’ll just kind of skate by anonymously.’ But the problem is they’re not factoring in the degree of automation that attackers are using.”Even the least-trafficked websites still average 62 attacks per day, according to SiteLock research. “These cybercriminals are really running businesses now,” said Neill Feather, president of the company. “With the increasing ease of automation of attacks, it’s just as lucrative to compromise a 1,000 small websites as it is to invest your time and try to compromise one large one.”John Loveland, a cybersecurity head at Verizon and one of the data breach report’s authors, said that since the report was first published 12 years ago, he’s seen a definite uptick in attacks at small and medium-sized businesses. As malware, phishing and other attacks have become “more commoditized and more readily accessible to lesser-skilled hackers,” he said, “you see the aperture open … for types of targets that could be valuable.”So what are the hackers getting out of the deal? It’s not just about potentially lucrative customer information and transaction histories. There’s also the opportunity to weaponize your website’s reputation. By hosting malware on a formerly trustworthy website, a hacker can increase an attack’s spread — and amplify the consequences — by boosting the malware’s search engine optimization (SEO). They can infect site visitors who search for the site organically or who access it via links from newsletters, articles or other businesses, Risher said.Even if you outsource aspects of your business — say, time and expense reporting, human resources, customer data storage or financial transactions — there’s still no guarantee that that information is safe when your own website is compromised. Loveland said he saw an uptick in email phishing specifically designed to capture user credentials for web-based email accounts, online CRM tools and other platforms — and reports of credential compromise have increased 280 percent since 2016, according to an annual survey from software company Proofpoint.How to protect yourself and your customersHow can small-business owners protect themselves — and their customers? Since a great deal of cyberattacks can be attributed to automation, putting basic protections in place against phishing, malware and more can help your site stay off the path of least resistance.Here are five ways to boost your small-business’s cybersecurity.1. Use a password manager.There’s an exhaustive amount of password advice floating around in the ether, but the most important is this, Risher said: Don’t reuse the same password on multiple sites. It’s a difficult rule to stick to for convenience’s sake — especially since 86 percent of internet users report keeping track of their passwords via memorization — but cybersecurity experts recommend password managers as efficient and secure workarounds. Free password manager options include LastPass, Myki and LogMeOnce.2. Set up email account recovery methods to protect against phishing attacks.Phishing attacks are an enduring cybersecurity problem for large and small businesses alike: 83 percent of respondents to Proofpoint’s annual phishing survey reported experiencing phishing attacks in 2018, an increase from 76 percent the year before. Embracing a more cyber-aware culture — including staying vigilant about identifying potential phishing attacks, suspicious links and bogus senders — is key to email safety.If you’re a Gmail user, recent company research suggests that adding a recovery phone number to your account could block up to 100 percent of cyberattacks from automated bots, 99 percent of bulk phishing attacks and 66 percent of targeted attacks. It’s helpful because in the event of an unknown or suspicious sign-in, your phone will receive either an SMS code or an on-device prompt for verification. Without a recovery phone number, Google will rely on weaker challenges such as recalling last sign-in location — and while that still stops most automated attacks, effectiveness against phishing drops to 10 percent.3. Back up your data to protect against ransomware.Ransomware — a cyberattack in which a hacker holds your computer access and/or data for ransom — has kicked off a “frenzy of cybercrime-related activities focused on small and medium businesses,” Loveland said. In fact, it’s the second leading malware action variety in 2019, according to the Verizon report, and accounted for 24 percent of security incidents. Hackers generally view it as a potentially low-risk, high-reward option, so it’s important to have protections in place for such an attack — namely, have your data backed up in its entirety so that you aren’t at the hacker’s mercy. Tools such as Google Drive and Dropbox can help, as well as automatic backup programs such as Code42 (all charge a monthly fee). You can also purchase a high-storage external hard drive to back everything up yourself.4. Enlist a dedicated DNS security tool to block suspicious sites.Since computers can only communicate using numbers, the Domain Name System (DNS) is part of the internet’s foundation in that it acts as a “translator” between a domain name you enter and a resulting IP address. DNS wasn’t originally designed with top-level security in mind, so using a DNSSEC (DNS Security Extension) can help protect against suspicious websites and redirects resulting from malware, phishing attacks and more. The tools verify the validity of a site multiple times during your domain lookup process. And though internet service providers generally provide some level of DNS security, experts say using a dedicated DNSSEC tool is more effective — and free options include OpenDNS and Quad9 DNS. “[It’s] a low-cost, no-brainer move that can prevent folks from going to bad IP addresses,” Loveland said.5. Consider signing up with a website security company.Paying a monthly subscription to a website security company may not be ideal, but it could end up paying for itself in terms of lost business due to a site hack. Decreasing attack vulnerability means installing security patches and updates for all of your online tools as promptly as possible, which can be tough for a small-business owner’s schedule.“It’s tempting for a small-business owner to say, ‘I’m pretty handy — I can do this myself,’” Risher said. “But the reality is that even if you’re very technical, you might not be working around the clock, and … you’re taking on 24/7 maintenance and monitoring. It’s certainly money well spent to have a large organization doing this for you.” 9 min read Free Webinar | Sept 5: Tips and Tools for Making Progress Toward Important Goalscenter_img Attend this free webinar and learn how you can maximize efficiency while getting the most critical things done right. Register Now »last_img read more

Hurricane Isaac forecast to enter Caribbean Sea this week

first_imgCancun, Riviera Maya, Q.R. — The arrival of tropical waves along the western portion of the Yucatan Peninsula will result in rains for most of the coast.According to the National Oceanic and Atmospheric Administration, a tropical wave along the western side of the Yucatan Peninsula of Mexico is generating isolated moderate-to-locally strong rain showers.Disorganized showers and thunderstorms over the northwestern Caribbean Sea are associated with a tropical wave and an upper-level trough. The disturbance is forecast to move slowly west-northwestward across the northwestern Caribbean Sea and the Yucatan Peninsula during the next couple of days.Upper-level winds are forecast to become a little more conducive for development when the system moves across the western Gulf of Mexico Wednesday through Friday.Hurricane Isaac forecast to enter Caribbean Sea this weekHurricane Isaac to enter Caribbean Sea. Photo: NOAAThe National Oceanic and Atmospheric Administration also says that tropical storm Isaac is now a small Category 1 hurricane, having developed overnight. Hurricane Isaac is currently moving toward the west at 20 km/h, but they say the hurricane will likely pick up an increase in speed toward the end of the week.On the forecast track, Hurricane Isaac is said to be moving across the Lesser Antilles and into the eastern Caribbean Sea. They report that Hurricane Isaac is expected to enter the Caribbean Sea region by Thursday.The NOAA has not yet released a forecast if they anticipate Isaac will hit any Mexican land or if he will simply bypass the region. They  report that “Isaac is a small hurricane and uncertainty in the forecast is higher than normal,” adding that they will continue to monitor the storm during the next few days.Click to share on Facebook (Opens in new window)Click to share on Twitter (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on WhatsApp (Opens in new window)last_img read more