Three young Irish-based researchers will meet with forty-eight Nobel Laureates this summer, when they travel to Lindau in Bavaria, Germany, to represent Ireland at the annual LindauNobel Laureate meetings.
Eoin McCarney, Dr David McNulty and Jun Gao are three of four hundred young scientists who will attend the prestigious Nobel Laureate meetings in Lindau. These meetings bring highly promising researchers from fifty-six countries together with Nobel Prize-winners in the fields of physiology, medicine, physics, chemistry and economic sciences.
Eoin McCarney – a postgraduate scholar based at Trinity College Dublin, working in the field of supramolecular and nano-chemistry; and David McNulty, a postdoctoral researcher in the Applied Nanoscience Group at University College Cork will both attend the 67thLindau Nobel Laureate Meeting for the Natural Sciences, this year dedicated to the field of chemistry, and which runs from 25th – 30th June.
Later this summer, Jun Gao, a postgraduate student based at University College Cork will attend the 6thLindau Nobel Laureate Meetingdedicated to the field of economic sciences, from the 22nd – 26th August. Her research focuses on investigating the performance of the Chinese fund industry by looking at stock selection ability and market timing.
Following nomination by the Irish Research Council, the researchers went through a highly competitive multi-stage international application process, managed by the Lindau Nobel Meeting Foundation and were selected for the meetings based on the excellence of their respective track records.
This weekend will also mark the renewal of the Irish Research Council’s partnership with the Council and Foundation for the Lindau Nobel Laureate Meetings. The agreement facilitates Irish-based researchers exchanging knowledge and ideas with scientists from diverse generations, cultures and disciplines.
Commenting at a special award ceremony to mark the researchers’ achievements in going forward to the Lindau meetings, Mr Peter Brown, Interim Director of the Irish Research Council, said:
“We are delighted to have three outstanding young researchers attending Lindau this year to meet with forty-eight Nobel Prize-winners.
“These meetings are a fantastic opportunity for young researchers who have excelled in their research to network with some of the brightest minds in their fields. It gives them an invaluable insight into some of the most important work happening in their areas of study and we are very proud to be able to support them on this journey.”
The President of Ireland, His Excellency, Michael D. Higgins, is patron of the Irish Research Council Lindau Nobel Laureate Meeting Awards.
The Internet is a whirlwind of data where the greater part of it is genuine, and quite a bit of it is false. Endeavours, for example, Wikipedia have demonstrated that by and large, Internet users have much learning on a wide range of subjects, learning that can be ordered and curated to frame important data vaults. Over the most recent couple of years, question-and-answer communities (Q&A) locales have given another way for internet users to crowdsource and look for particular definite data, a lot of which includes finding direct answers of particular inquiries from area specialists.
Taking this pattern ahead Quora, an inventive Question & Answer site with a quickly developing user group that contrasts from its rivals by keeping a social network as an informal community into its fundamental structure. Do you know about the few estimates of Quora’s user growth?? Here are some 150% development in one month, and about 900% development in one year.
Quora was launched on 21st June 2010(Quora left beta status in January 2010) and below is an infographic by Fullestop that demonstrates the timeline of Quora. We all know that from experts to company’s professional, Quora was successful in engaging every user type on it. Example – Instagram and Yelp addressed inquiries regarding their organizations on Quora. In spite of its short history, Quora appears to have accomplished where its rivals have fizzled, i.e. effectively drawing the investment of both a quickly developing client populace what’s more, particular area specialists that create significant substance in light of inquiries.
FUZE Technologies Ltd is proud to announce they are bringing their hugely popular learn-to-code platform, FUZE Code Studio to Nintendo’s incredibly sought after new console, Nintendo Switch.
FUZE Code Studio motivates and inspires users of all ages and abilities, leaving them wanting to learn more, even if they have no prior experience of coding. FUZE’s unique method means children as young as six can learn to code using a real text based language – and now it’s coming to Nintendo Switch.
FUZE Code Studio is the perfect stepping stone between visual coding simulators currently used in most primary schools and real-world languages like Python, Java and C++/# etc. FUZE Code Studio comes with everything you need to learn to code in one app. Users can code their own games and share the experience with friends and family – imagine creating your own game then transferring it to a big screen with multiple controllers so others can play your creations. Thanks to Nintendo Switch’s revolutionary design this becomes a reality – and coders will soon be learning how to interact with external devices, sensors and motion controls in ways not previously possible.
FUZE Code Studio on Nintendo Switch makes learning to coding more accessible than ever and what’s more, is children can learn while having fun. The move to Nintendo Switch is one FUZE’s CEO, Jon Silvera is convinced makes perfect sense.
He states “Back in the eighties when home computers reached critical mass and were selling into the tens of millions they all had one thing in common. They all had very accessible coding environments to get users started within minutes. Before you knew it we had more coders than we knew what to do with and a multibillion dollar industry was born!
In stark contrast, today we have a global shortage of coding skills and very few accessible learning platforms. It seems we’re running around ‘Scratching’ our heads, wondering where it all went wrong”.
Jon Silvera continued “We are deeply honoured and very excited to have been accepted as an independent developer for Nintendo Switch. Over the last four years FUZE has taught tens of thousands of children in schools, science events and clubs, how to code using a text based programming language. Nintendo Switch is the perfect platform for FUZE Code Studio to help nurture the next wave of bedroom coders.”
The UK Government recently rewrote the Computing Curriculum to focus almost entirely on coding and computational thinking to ensure we have the much needed coding skills to support the increasingly digital landscape. FUZE Code Studio for Nintendo Switch is perfectly suited to assist in meeting this objective.
FUZE Code Studio for Nintendo Switch will be available Q2 2018 with additional gaming content to be made available via DLC add on packs. Pricing will be confirmed nearer the launch.
This is just a quick unboxing of the Resmed S+ sleep monitoring device, The take a tour of the unit before we set it up and test it out and see if this works..This is actaully the worlds first non contact sleep sensor so you do need to wear anything or have any attachment on your bed so it just sits beside your bed on your locker paired to your smartphone…
Features
Measures your breathing and body movements throughout the night
Analyzes light, noise and temperature levels in your bedroom
Creates daily sleep scores and charts to help you understand your sleep pattern
Delivers personalized feedback based on your sleep pattern, bedroom environment and daily habits
Ultra-secure iStorage diskAshur is the latest gadget to have: Super speed USB 3.1, PIN authenticated, hardware encrypted portable data storage drives with unique EDGE technology.
With Father’s Day just around the corner, are you stuck for ideas on what to get for your ultimate gadget and ‘tech loving’ dad? With a dad who always wants the latest device and with ‘state of the art’ James Bond type features, look no further than iStorage and their new diskAshur range of colourful hard drives and solid state drives – perfect for storing family and work documents without the fear of the data getting lost or stolen!
iStorage, the award winning and trusted global leader of PIN authenticated, hardware encrypted portable data storage devices, launches their new range of USB 3.1 the diskAshur hard drive and diskAshur solid state drives all of which are designed, developed and assembled in the UK.
Featuring Enhanced Dual Generating Encryption (EDGE) technology making them THE most secure data storage drives available on the market – super spy like!
EDGE™ Security Features: One of the unique and underlying security features of the GDPR compliant diskAshur² hard drive and diskAshur² SSD is the dedicated hardware based secure microprocessor (Common Criteria EAL4+ ready), which employs built-in physical protection mechanisms designed to defend against external tamper, bypass laser attacks and fault injections. Essentially the drives feature technology that encrypts both the data and the encryption key, giving you confidence that private information is secure and protected.
So in short, without the PIN, there’s no way in! and you can’t get more ‘James Bond-esque’ than this!
Ideal for users looking for an easy to use secure solution for storing all their data, elegantly designed and available in 4 striking colours (Phantom Black, Ocean Blue, Fiery Red and Racing Green) meaning there’s plenty of technological features to get to grips with. In capacity options from 128GB to 2TB, there will be space for all the family.
The science bit:
With software free set up and operation, the diskAshur HDD and diskAshur² SSD is platform/device independent meaning it works across all operating systems including all versions of MS Windows, macOS, Linux, Android, Chrome, Thin Clients, Zero Clients and embedded systems. In fact, the drives will work on any device with a USB port!
Additionally, with an ultra smooth fascia that doubles up as shock-absorbers, the drives being water and dust resistant (IP 56 certified) and supplied with a stylish and sturdy travel case, the iconic contemporary design also features an integrated cable which can be conveniently stored away when not in use.
In addition to EDGE technology, the following common features are included:
* Brute Force Hack Defence Mechanism – Intelligently programmed to protect against all forms of Brute Force Attacks. Upon the 15th consecutive incorrect PIN entry, the diskAshur drive assumes it is being attacked and will delete the encryption key and lock itself, rendering all data previously stored on the drive as lost forever. At this point the drive can be reset to factory default settings and redeployed.
* Self Destruct Feature: Users can pre-program the diskAshur drives with a unique Self Destruct PIN which, once entered, instantly deletes the encryption key rendering all data previously stored on the drive as lost forever.
* Unattended Auto-Lock Feature: Set the drive to automatically lock after a pre-determined amount of time where the drive has not been used.
* Wear Resistant Epoxy Coated Keypad: Designed with protection in mind, the diskAshur range offer a wear resistant epoxy coated keypad which hides key usage to avoid tipping off a potential hacker to commonly used keys.
For more information on iStorage or to find out how the iStorage EDGE range of diskAshur HDD and, diskAshur SSD can help protect your family’s confidential data, visit www.istorage-uk.com or contact +44 (0) 20 8991 6260.
The world’s appetite for open source software is voracious.
Organisations Increase Reliance on Open Source and Acknowledge Risks, But Efforts to Secure and Manage It Effectively are Lagging
In the last year, businesses around the globe significantly increased their use of open source and although they readily acknowledge growing concerns about open source-related security and operational risks, the effective management of open source is not keeping pace with the increase in use.
Those are among the key takeaways from the 2017 Open Source 360 Degree Survey results released today by Black Duck’s Center for Open Source Research and Innovation (COSRI). The COSRI survey comprised 819 respondents primarily from the U.S. and EMEA, 74% of whom were software developers, IT operations/professionals, systems architects, development managers, and security professionals.
Nearly 60% of respondents said their organisations’ use of open source increased in the last year citing: cost savings, easy access, and no vendor lock-in (84%); ability to customise code and fix defects directly (67%); better features and technical capabilities (55%); and the rate of open source evolution and innovation (55%).
Additionally, in terms of open source’s positive impact on business, survey respondents highlighted accelerated innovation (55%) and quality improvement (44%).
Even as their organisations are embracing open source to accelerate application development and increase development agility, respondents expressed concern about license risk/loss of intellectual property (66%); exposure to internal applications to exploitation from open source vulnerabilities (64%); exposure of external applications to exploitation because of open source vulnerabilities (71%); unknown quality of components (74%); and failure of development teams to adhere to internal policies (61%).
Despite those high levels of concern, nearly half of survey respondents indicated their organisations have no formal policies for selecting and approving open source. And just 15% indicated they have automated processes in place to manage their open source use.
Respondents gave their organisations decidedly middling marks in areas of managing and securing their open source, with slightly more than half reporting: being in compliance with associated licenses (54%); being aware of known security vulnerabilities (55%); knowing where and which open source versions are currently integrated and deployed (54%); and conforming to internal policies (44%).
“The 2017 Open Source 360 Degree survey responses correspond closely with our experience as we engage with businesses of all sizes in all industries around the world. Companies are using a tremendous amount of open source for sound economic and productivity reasons, but today most companies are not effective in securing and managing it,” said Black Duck CEO Lou Shipley. “This is surprising for a number of reasons. Today open source comprises 80% to 90% of the code in a modern application and the application layer is a primary target for hackers. This means that exploitation from known open source vulnerabilities represents the most significant application security risk most organisations face,” Shipley said.
The Open Source 360 Degree survey results show that open source vulnerability tracking and remediation remain primarily manual processes carried out by internal resources (53%). Only 27% of respondents reported automatic identification and remediation tracking of known open source vulnerabilities.
Shipley noted that the survey responses are “also very much in line with results in the open source audits we conduct for our customers.”
Black Duck’s On-Demand business unit conducts hundreds of open source code audits annually, primarily related to merger and acquisition transactions. The recently published Open Source Security and Risk Analysis (OSSRA) report on 1,071 applications audited during 2016 found both high levels of open source usage – 96% of the applications contained open source – and significant risk to open source security vulnerabilities – more than 60% of the applications contained open source security vulnerabilities.
Notably, in that Open Source Security and Risk Analysis (OSSRA) report, audited applications from the financial industry contained 52 open source vulnerabilities per application, and 60% of the applications contained high-risk vulnerabilities. The retail and e-commerce industry had the highest proportion of applications with high-risk open source vulnerabilities, with 83% of audited applications containing high-risk vulnerabilities.
This year’s Open Source 360 Degree Survey conducted by Black Duck’s COSRI is the successor to the former Future of Open Source Survey, co-presented for many years by Black Duck and North Bridge.
A detailed presentation of the complete Open Source 360 Degree Survey results will be available on the Black Duck Website on June 22 following a COSRI webinar discussion of the survey findings.
Other notable findings from the 2017 Open Source 360 Degree survey include:
Methods for tracking use of open source: Information provided by developers 54%; Manual design/code reviews 36%; Scans to inventory open source in use 33%
Methods for reviewing code for open source use: Don’t review code for open source (38%); internal tools to scan for open source 27%; third-party tools to scan for open source 28%
Most important elements to a successful open source policy: A structured process for review and approval of open source use requests 42%; A whitelist/blacklist of approved open source components, specific to use cases 39%; A whitelist/blacklist of approved open source licenses, specific to use cases 39%
Prevalent areas for open source usage: Build applications used within our organisation 77%; Build applications used by our customers 69%; Build and run our IT operations infrastructure 69%
Prevalent technology areas for open source use: Development Tools/Software Development Lifecycle 57%; Containers/DevOps/Virtualisation/Cloud Computing 53%; Systems Management/Operating Systems 52%;
Open Source Contribution: 66% of companies surveyed contribute to open source projects.
Open Source 360 Degree 2017 collaborators included the following (platinum collaborators are in bold): Appnovation, Bareos GmbH & Co. KG, Black Duck Software, Capital One, Couchbase, Credativ, EnterpriseDB, Grid Protection Alliance, InfoSys, Open Hub, Open Invention Network (OIN), Open-Xchange, Opmantek, (Open Source Academy of Arts, Science and Technology) of Pakistan, Pentaho, Red Hat, Rift-io, Rocket.Chat, Symphony Foundation, univention, WIPRO, WP Engine
Superior identity security with multi-factor authentication and adaptive access control protects most widely used cloud service from increasing attacks
SecureAuth Corp., the leader in adaptive access control, today unveiled enhanced protection for Microsoft’s Office 365, the world’s most widely used enterprise cloud service. By providing adaptive authentication for all Office 365 mail clients – including Microsoft Outlook and third-party applications, such as Apple Mail, SecureAuth is protecting one of the world’s most popular SaaS applications from increasing cyber attacks.
SecureAuth’s enhanced security for Office 365 provides identity protection and detection using the industry’s most advanced adaptive authentication and risk analysis capabilities, and features SecureAuth’s portfolio of multi-factor authentication methods. This multi-layered security approach combines techniques such as geographic location analysis, device recognition, IP address based threat services, and phone fraud prevention – to name a few.
With 85 million users working on a combination of desktop and laptop computers, mobile devices, and web applications, Office 365 is the world’s most popular cloud service. But wide use of Office 365 also makes it a primary target for cyber attacks especially during complex tasks like Office 365 GCC High and SharePoint Data Migration etc. Breaches tied to phishing e-mail scams and lack of strong identity security are accelerating. Organizations using Office 365 have been forced to rely on traditional and inadequate username-password authentication to try to protect themselves from sophisticated attackers.
Current versions of Office 365 mail clients support basic two-factor authentication while older Microsoft clients and third-party email applications do not. Enhanced identity security from SecureAuth, adaptive authentication, is the most secure approach for access from any client app that connects to Office 365, including older versions of Outlook and third-party email clients.
“Office 365 adoption is second-to-none, which is great for convenience and productivity, but unfortunately makes businesses more vulnerable to attack,” said SecureAuth Chief Technology Officer Keith Graham. “Attackers know that Office 365 is ripe to be exploited, and we see organizations under daily attack. With credentials, preventing the misuse of stolen credentials while maintaining ease of use for end users is paramount. That’s why SecureAuth’s new enhanced protection and detection capabilities for Office 365 offers the highest level of identity security – not only for newer mail clients, but also for older versions which remain widely deployed.”
As with all of SecureAuth’s security solutions, the enhanced Office 365 protection offers a frictionless user experience. The system triggers multi-factor authentication only when it determines a logon to be a potential risk. If there is no risk present, multi-factor authentication is not required, ensuring that access remains easy, convenient, and secure.
With the solution deployed across all devices and both old and new mail clients, organizations are protected no matter how their users access Office 365.
The way that we produce, distribute and consume media is changing. Indeed, it has already changed a great deal over the last few years. Digital technology has turned the world of traditional media (press, television, and radio) on its head. Whether it survives this transformative period, and in what form, depends on the ability of businesses to adapt to technological developments and changing consumer habits.
One of the biggest changes emerging is the sheer volume of media being consumed digitally. A recent trendsreport looking at the rise of digital media found that internet users now spend approximately 6 ½ hours online every day. What’s more, the way that way that these individuals access the internet is changing fast. The share of internet time captured by smartphones has risen from 23% to 39% since 2012, with PCs and laptops experiencing a slight decline over the same period. Online users, therefore, represent a huge audience that traditional media outlets cannot afford to ignore.
Social media, too, has been a game changer. Social networks now represent 32 per cent of online media time and this figure only looks set to grow. Increasingly, individuals are accessing news via social networks, alongside entertainment, consuming content based on what their friends are sharing online. Social media is very much the opinion-maker of modern times, particularly amongst the younger generation, in much the same way that newspapers and radio broadcasts could once claim to be.
However, commentators should not be too hasty when signalling the death of traditional media. Consumers are still spending more than twice as long watching broadcast television when compared to online TV and traditional media still holds a greater sway with rural populations and older individuals. Similarly, broadcast radio and the print press retain a sizeable portion of the market even in the digital age. Evidently, if traditional media outlets are to survive, it is more about evolution than revolution – adapting to new developments without completely abandoning their current methods.
It is also worth noting that some things will remain the same even as many others change and as our reliance on digital media increases, some aspects of the traditional media landscape will continue to be valued highly. Although the digital age has pushed some media outlets toward clickbait headlines and lightweight listicles, there remains room for quality journalism. Not only are audiences showing that they have an appetite for long-form articles, marketers are discovering that it can be a more effective way of monetising their content. As the world of media changes, therefore, content creators must be careful that they do not lose sight of long-established media values.
The change that we are experiencing now is also merely the tip of the iceberg. Media outlets cannot afford to rest on their laurels by assuming that as long as they have a good website and an effective social media strategy they are all set. The industry remains in a constant state of flux and it is difficult to predict future developments that are surely on their way.
New devices are being created, or are already with us, that threaten further disruption. Internet connected devices like the Amazon Echo provide another opportunity for individuals to consume media, but also a new challenge to the existing distribution network. With bold predictions being made regarding the Internet of Things, who’s to say that consumers won’t be accessing their media on their smartwatch, internet-enabled glasses, or their home appliances in the not-too-distant future?
The digital age does not represent a clean break from the traditional media distribution and consumption methods of the past. The transition could very well be a messy one as decades-old institutions struggle to adapt to changing technology and consumer behaviour. However, if businesses listen to their audience and remember that there will always be a place for quality content, then they have reason to look towards the future with hope rather than fear.
If you want to learn more about the changes occurring in the world of media, visit GlobalWebIndex for more data and analysis.
Update. 15/6/17, These are fake copy models and you should avoid at all costs and people have unintentionally bought them in anticipation. They’ve also been taken down from site after I spoke to them on the phone. There is lots of fakes going around so be careful. If in doubt get in touch with us.
What to watch out for.
The packaging. It’s not a couple of the phones pictured and plain back. Real one hash splash artwork colour with one phone seen above.
Speaker on inside cover should be rectangular not square.
Orange/Yellow colour around the lens, it should be inside to be real.
Motherboard (Green in colour) is visible, not covered.
Back lit keys are white not blue.
Some housing variants are different pay attention to the keys and front fascia on top and finally the USB port placement.. It’s on the top, not the bottom.
Just a quick note if you are waiting on the all new Nokia 3310. It’s now available in the dual sim format costing €99.99 but I would be careful. It would be expected to be a bit more expensive considered its dual Sim but for this price I feel many will hold off until retailers stock it or wait for Argos to get stock in which is due the 20th June as they told us recently for €69.99 and also Dual Sim
The real Nokia 3310
Dual sim European version, The new Nokia 3310 takes the iconic silhouette of the original and reimagines it for 2017. The custom designed user interface brings a fresh look to a classic, whilst the 2.4” polarized and curved screen window makes for better readability in sunlight