Month: July 2019

first_imgAfghanistan Share on Facebook Immigration and asylum Tue 13 Feb 2018 12.41 EST To be sure, other interpreters have been able to reach the UK, but only by claiming asylum, in the face of fierce opposition by the government; it was the courts who have determined that they met the asylum requirement. Meanwhile, in Afghanistan, the Taliban and Islamic State, a new threat, have, according to the UN, been deliberately targeting current and former government officials; some 200 were attacked in the first half of 2017 and the security situation continues to deteriorate. In the case of a current UK asylum-seeker, the man’s father, who lived only seven miles from Kabul, was attacked and badly wounded when the Taliban were looking for his son.Despite public and parliamentary denunciation of the present approach, the government’s shameful attitude persists. Whatever one thinks of the UK’s intervention in Afghanistan, we have a debt of honour and gratitude to our former interpreters and it is a scandal that we are not meeting it.Simon DigginsCol (Ret’d), DA Kabul 2008-10, Rickmansworth, Hertfordshire• Join the debate – email guardian.letters@theguardian.com• Read more Guardian letters – click here to visit gu.com/letters Shares3131 Guardian Today: the headlines, the analysis, the debate – sent direct to you Share on Twitter Share on LinkedIn Last modified on Tue 13 Feb 2018 17.00 EST Topics Despite public and parliamentary denunciation of the present approach, the government’s shameful attitude persists, writes retired colonelSimon Diggins Share on Twitter Immigration and asylum Your video about former Afghan interpreters for US troops (12 February, theguardian.com) is deeply poignant and highlights a shameful abandonment of those who served in their fight against the Taliban. Sadly, the UK’s attitude has, if anything, been worse.The UK has chosen to make an almost entirely arbitrary distinction between the minority of interpreters who had served for 12 months, in Helmand, between 19 December 2011 and 19 December 2012, and the overwhelming majority, some 2,000, who hadn’t. For the former, there is the possibility of a visa for themselves and their families and some 390 former interpreters have been granted visas; for the rest, the majority, there has been only one successful application and he was a triple amputee. Since you’re here… A US marine and his interpreter are seen during a lull in the fighting at Seray Combat Outpost in Chowkay district, Kunar province.Photograph: John D Mchugh Share via Emailcenter_img Share on WhatsApp Support The Guardian British army Refugees South and Central Asia Share on Messenger Reuse this content Share on Pinterest Military Share on Facebook Share via Email letters Letters UK record just as poor as that of US on Afghan interpreters … we have a small favour to ask. The Guardian will engage with the most critical issues of our time – from the escalating climate catastrophe to widespread inequality to the influence of big tech on our lives. At a time when factual information is a necessity, we believe that each of us, around the world, deserves access to accurate reporting with integrity at its heart.More people are reading and supporting The Guardian’s independent, investigative journalism than ever before. And unlike many news organisations, we have chosen an approach that allows us to keep our journalism accessible to all, regardless of where they live or what they can afford. But we need your ongoing support to keep working as we do.Our editorial independence means we set our own agenda and voice our own opinions. Guardian journalism is free from commercial and political bias and not influenced by billionaire owners or shareholders. This means we can give a voice to those less heard, explore where others turn away, and rigorously challenge those in power.We need your support to keep delivering quality journalism, to maintain our openness and to protect our precious independence. Every reader contribution, big or small, is so valuable. Support The Guardian from as little as $1 – and it only takes a minute. Thank you. Read morelast_img read more

first_imgMon 26 Mar 2018 16.57 EDT Share on Facebook White House attacks Stormy Daniels’ credibility after TV interview This article is more than 1 year old Facebook Topics Stormy Daniels Stormy Daniels interview – the key moments Hide Jessica LeedsIvana TrumpJill HarthKristen AndersonLisa BoyneCathy HellerTemple TaggartMariah BilladoKarena VirginiaBridget SullivanTasha DixonMelinda McGillivrayJennifer MurphyRachel CrooksNatasha StoynoffNinni LaaksonenJessica DrakeSamantha HolveySummer ZervosCassandra SearlesRead the full details of the 20 accusations here This article is more than 1 year old Share on WhatsApp Share via Email Share via Email In the CBS 60 Minutes interview broadcast on Sunday, Daniels said she was threatened with physical violence after she first attempted to go public with the story. She was on her way to a fitness class with her infant daughter in Las Vegas in 2011, she said, when she was accosted in a parking lot.“A guy walked up on me,” she said, “and said to me, ‘Leave Trump alone. Forget the story.’ And then he leaned around and looked at my daughter and said, ‘That’s a beautiful little girl. It’d be a shame if something happened to her mom.’ And then he was gone.”Daniels said she did not know who the man was and did not link him to Cohen. Later, however, when explaining why she signed a document in 2016 that denied any affair with Trump, she said she was told that if she did not, “they can make your life hell in many different ways”.Asked who “they” were, Daniels said: “I’m not exactly sure who they were. I believe it to be Michael Cohen.”The interview attracted 22 million viewers, 60 Minutes’ highest ratings in a decade. Shah declined to say if Trump watched. “I’m not going to get into what the president may or may not have seen,” he told reporters.Early on Monday morning, Stephanie Grisham, a spokeswoman for Melania Trump, the president’s wife, slammed the media for enjoying “speculation & salacious gossip” and added: “I’d like to remind people there’s a minor child who’s [sic] name should be kept out of news stories when at all possible.”Melania was not with Trump when the show aired. The White House announced that she would spend the week in Florida with their son, “as is their tradition for spring break”. Trump stayed silent, other than a tweet about “so much Fake News”.“Never been more voluminous or more inaccurate,” the president wrote. “But through it all, our country is doing great!”Representatives for the president have denied any sexual relationship with Daniels, despite Cohen’s admission that he paid $130,000 to buy her silence. Cohen claims to have paid that sum out of his own pocket.Daniels’ lawyer, Michael Avenatti, called that “ludicrous” during the CBS broadcast. On Monday, Avenatti said he would not yet reveal what he implied was additional evidence to back up Daniels’ claims.“We’re not going to get into the details of everything we have at this time, and there’s a reason for that,” he said on NBC’s Today show. “We understand the American people want all the information right now, immediately. It would make no sense for us to play our hand as to this issue and we’re not going to do it right now.”He also said the unidentified man Daniels said threatened her in 2011 must have been linked to Trump. The allegation that someone threatened Daniels takes the dispute between the president and the porn star to a new level. Until now the issue has been her claim of a sexual relationship – although Daniels told CBS they had sex only once, in 2006 – and Trump’s denials, as well as a legalistic argument over whether the non-disclosure agreement signed by Daniels 11 days before the 2016 election is binding. news Since you’re here… Read more Speaking from the podium of the White House press briefing room on Monday afternoon, administration spokesman Raj Shah said: “With respect to that interview, I will say the president strongly, clearly has consistently denied these underlying claims. The only person who’s been inconsistent is the one making the claims.”Shah did not mention Daniels by name. Trump “denied the claims she made last night” he said. “He has been consistent in doing so, she has not”.Shah spoke hours after Cohen’s own lawyer, Brent Blakely, wrote to Daniels’ attorney to say she had made false and defamatory comments, “namely that [Cohen] was responsible for an alleged thug who supposedly visited” and threatened her.“In truth, Mr Cohen had absolutely nothing whatsoever to do with any such person or incident, and does not even believe that any such person exists, or that such incident ever occurred,” Blakely said in the letter, according to Reuters.In response, Daniels – whose real name is Stephanie Clifford – added Cohen to a lawsuit previously filed against Trump, saying he had defamed her by claiming she lied about her relationship with the president. In a court document, Daniels said “it was reasonably understood Mr Cohen meant to convey that Ms Clifford is a liar, someone who should not be trusted, and that her claims about her relationship with Mr Trump is ‘something [that] isn’t true’.” Daniels added Trump’s attorney, Michael Cohen, to a lawsuit filed against Trump, saying he had defamed her by claiming she lied about her relationship with the president Show The White House has attacked the credibility of Stormy Daniels, the adult film star who spoke out on US TV on Sunday night about her alleged affair with the president and threats she said she received. Concurrently, the legal battle between Daniels and Trump’s personal attorney, Michael Cohen, grew fiercer. Melania Trump First published on Mon 26 Mar 2018 09.01 EDT Donald Trumpcenter_img Twitter Q&A Who are the 20 women accusing Donald Trump of assault and harassment? Paul Owen and Ed Pilkington in New York, and Ben Jacobs in Washington This video has been removed. This could be because it launched early, our rights have expired, there was a legal issue, or for another reason. Thank you for your feedback. Reuse this content Pinterest … we have a small favour to ask. The Guardian will engage with the most critical issues of our time – from the escalating climate catastrophe to widespread inequality to the influence of big tech on our lives. At a time when factual information is a necessity, we believe that each of us, around the world, deserves access to accurate reporting with integrity at its heart.More people are reading and supporting The Guardian’s independent, investigative journalism than ever before. And unlike many news organisations, we have chosen an approach that allows us to keep our journalism accessible to all, regardless of where they live or what they can afford. But we need your ongoing support to keep working as we do.Our editorial independence means we set our own agenda and voice our own opinions. Guardian journalism is free from commercial and political bias and not influenced by billionaire owners or shareholders. This means we can give a voice to those less heard, explore where others turn away, and rigorously challenge those in power.We need your support to keep delivering quality journalism, to maintain our openness and to protect our precious independence. Every reader contribution, big or small, is so valuable. Support The Guardian from as little as $1 – and it only takes a minute. Thank you. Share on Messenger Daniels’ claim of an affair in 2006 bears striking similarities to an account given last week by a former Playboy model. Karen McDougal told CNN she had an intense relationship with Trump in 2006 and 2007, and that he once took her to his Manhattan home. Both McDougal and Daniels allege that their encounters occurred within months of the birth of Barron, Trump’s son with Melania.A large number of women have accused Trump of sexual assault. He denies the claims. Share on Twitter Stormy Daniels: “A guy walked up on me and said, ‘Leave Trump alone.'” – video Michael Cohen Share on LinkedIn Was this helpful? Support The Guardian Stormy Daniels Shares163163 Michael Cohen says he does not believe the alleged threat against Stormy Daniels ever occurred. Photograph: Richard Drew/AP Share on Twitter Share on Facebook Share on Pinterestlast_img read more

first_imgUS politics Share on Facebook Topics Share on Twitter Tue 29 Jan 2019 11.45 EST Last modified on Tue 29 Jan 2019 12.10 EST US elections 2020 US politics Shares2828 Source: Mpho Dagada A day after the former Starbucks chief Howard Schultz said he might run independently for US president, a heckler at a book launch in Manhattan shouted at him: ‘Don’t help elect Trump.’ Schultz has faced fierce criticism from Democrats who say his candidacy may help Donald Trump win re-election in 2020. ‘Go back to Davos with the rest of the billionaire elite who think they know how to run the world,’ the heckler added before being pulled aside by security Share via Email Howard Schultz called ‘billionaire elite’ by heckler in New York – video,Play Videolast_img read more

first_img Share Washington_Irving | Pick richmanchester Share on Twitter Report Last modified on Tue 12 Mar 2019 16.04 EDT Twitter Share on Twitter Share via Email Report Reply Twitterfarts, I imagine. Share This comment was removed by a moderator because it didn’t abide by our community standards. Replies may also be deleted. For more detail see our FAQs. | Pick | Pick Thom86 Report Report 13 Mar 2019 0:47 Twitter Topics You don’t know what misogyny means, do you? “The list went on and on because (I’m not sure if you’ve noticed) men love dating much younger women.” If you don’t detect a pretty clear undercurrent of judgment here, or at the very least snark, I don’t know what to tell you. Note the parenthetical aside. Note the adverb “much.” Society absolutely does look down its nose a bit at older men dating much younger women. The author does it in this piece. I’ve been upfront that I do it (though it’s got to do with age difference, not gender per se). I would hazard a guess that the vast majority of us find it a bit inappropriate when the gap is very large and/or when the younger party is very young. 116 117 Women Television Facebook Whoever has would do better to address their own problems. recommendations comment Facebook Share on Twitter Share via Email Share on Facebook Report Share on WhatsApp richmanchester BrianBraddock | Pick 40 41 I think it’s three people on Twitter. the world isn’t shocked.she’s beautiful – my guess is that most 25 year old men would date her Share *furrows brow* Is the world, in fact, shocked? Does the world, in fact, care? I’m all for calling out shit attitudes, but I don’t think there’s any issue here. Facebook 13 Mar 2019 0:29 Tue 12 Mar 2019 12.00 EDT Report Threads collapsed Twitter expanded unthreaded Misogyny is behind the criticism of the Saturday Night Live comedian’s relationship with Kate Beckinsale 2 Share on Facebook Facebook … Report Share on Facebook Share on Facebook You must be a big hit at parties. | Pick Show 1 more reply Reply Share on Facebook Share on Facebook 13 Mar 2019 0:29 Share on Twitter 28 29 Share brumell | Pick 13 Mar 2019 0:27 205 206 29 30 No, because his name is Peter Davison. 13 Mar 2019 0:53 Twitter Share on Facebook Reply Report Pete Davidson is dating an older woman – why is the world shocked? Share on Facebook | Pick Reply Share Twitter 13 Mar 2019 0:58 Comedy (Culture) Relationships Share Share on Facebook Since you’re here… Reply Share on Twitter 81 82 Share on Twitter Twitter I just thought 20yr difference and yet he’s still punching well above his weight. Share on Twitter 80 81 40 41 Share 13 Mar 2019 0:28 Twitter jamesbeckman Share on Pinterest richmanchester 13 Mar 2019 0:29 Share 13 Mar 2019 0:33 They’re consenting adults – nothing scandalous here. Facebook Facebook | Pick Report Twitter 6 7 Facebook Facebook Share on Facebook Completely unfair that this couple should be criticised when, for example, the gap between Catherine Zeta Jones and Kirk Douglas – which is over 50 years! – never gets mentioned. | Pick Facebook 13 Mar 2019 0:18 Share Opinion Share on Facebook Share | Pick 13 Mar 2019 0:34 50 Share UKinNL Comedy (Stage) Facebook Share on Facebook Steve Townsend 13 Mar 2019 0:29 104 105 Twitter Share Share on Facebook Reply Assistantref Share on Twitter Share on Twitter She never said older men with younger women was a bad thing. You are putting words in her mouth to suit your own agenda. She simply said that there should be no double standards. The old saying “What’s good for the goose is good for the gander” perfectly encapsulates it. Report The_Elite Share on Twitter | Pick Jonathan Hendry jamesbeckman | Pick Twitter | Pick Who has commented adversely on the relationship? Reply Report Twitter 13 Mar 2019 0:24 | Pick feewaybillsnose | Pick 13 Mar 2019 0:20 Share creekwhore I would hazard a guess that the vast majority of us find it a bit inappropriate when the gap is very large | Pick Show 1 more reply 13 Mar 2019 0:29 Report ApeDrape Shane Fieldsend Report Reply Support The Guardian Please select Personal abuse Off topic Legal issue Trolling Hate speech Offensive/Threatening language Copyright Spam Other Reply Share Facebook Reply Share on Twitter comments (324)Sign in or create your Guardian account to join the discussion. | Pick Share on Facebook Report Facebook Who are these people who are shocked? Share on Facebook Report Twitter Report Report Report According to this article ‘the world’ which indicates that most of us are on another planet. Yet another G article which should be in the Mail. Share Facebook Share on Facebook Facebook Share on Twitter 13 Mar 2019 0:39 Share on LinkedIn GladysGlover 13 Mar 2019 0:39 Share on Facebook 3 Report | Pick Reply Order by oldest Show 2 more replies 344 345 13 Mar 2019 0:25 Share Twitter Twitter Tempted to write back something provocative there…. It’s simply, that he’s a 25 year old man – DATING – and extremely attractive 45 year old woman – Nothing shocking about this – nothing at all. Jonathan Hendry Reply 13 Mar 2019 0:33 It’s pretty much his job to be silly. Perhaps he’s not silly at home? I dunno, never met him. I’m not even sure what we’re doing here? houndicus 13 Mar 2019 0:50 Share on Twitter Facebook Are there legal limits on age difference? Certainly in the US there have been cases of people (men I think) being prosecuted for relationships with only a few months actual age difference? Twitter Reply Share Share Report 33 34 | Pick Watch Pete Davidson discuss his relationship with Kate Beckinsale on Saturday Night Live Share Share on Facebook Share on Facebook Share on Twitter Reply Reply TheSadMafioso richmanchester Share on Twitter 170 171 Reply Reply Share Twitter Facebook My problem is not the age difference, who cares? It’s 2019, my amazement is why is such a beautiful woman dating a total arsehole like Pete Davidson. davidc929 | Pick Report Share on Facebook Share Assistantref Reply Facebook Share Share on Facebook Twitter Twitter Reply 134 135 Twitter next Washington_Irving Reply LabourMess Share on Twitter This comment was removed by a moderator because it didn’t abide by our community standards. Replies may also be deleted. For more detail see our FAQs. Share “like two beer cans welded together” Or something like that but a bit more poetic. Facebook 123 124 Relationships AJVC1991 IdiomSavant | Pick Facebook Facebook Reply Report 99 100 They’re not shocked, they’re jealous. Reuse this content,View all comments > 13 Mar 2019 0:28 Share on Twitter | Pick Pinterest Report Report | Pick Reply Share Indeed. I couldn’t care less about the age difference. My concern is that possibly the most beautiful woman in the world is mooching around with that idiot. The world is capricious and cruel. Alan scott | Pick Share on Facebook 6 7 26 27 tosh79 | Pick 37 38 13 Mar 2019 0:33 unlessroundisfunny Reply Reply 13 Mar 2019 0:24 TenementFunster Facebook Reply Facebook Haven’t read the article but surely the issue here is how has this fella has dated two stunning women Ariana Grande and Kate Beckinsale? | Pick Report Report matt h Facebook | Pick billy2times Kirk Douglas? Michael Douglas (his son) surely. Reply Twitter FullClipTorres Facebook Share on Facebook Show 25 3 There’s a weird element of wanting to have it both ways to this article. Is a big age difference problematic, or not? It surely can’t be problematic when the man is older, but not when the woman is older. But that seems to be the implication here: Young man, older woman = awesome, older man, young woman = the patriarchy and therefore bad? Or can the author really say with a straight face she considers it totally unremarkable and unobjectionable when older men date young women? Personally I find relationships with large age differences disconcerting, especially when the younger party is really young. 25 is on the edge of that, and 45 is not so much older as to be really creepy. But I’d be potentially creeped out by a 20 year old dating a 50 year old, no matter what the gender combination happens to be. It’s not that it’s impossible that such a relationship would be healthy…but it seems statistically unlikely. Share on Facebook Reply Show 1 more reply Reply Twitter Reply 37 38 5 6 While society takes older men hooking up with younger women for granted, we still seem to have a lot of hang-ups about women dating younger guys. There is a one-word explanation for this: misogyny. I think it is far more to do with biology than misogyny. If it were misogyny, why would such a man disliking women have a relationship with a woman in the first place? Share on Facebook Share on Twitter Share on Twitter Share on Facebook 13 14 unlessroundisfunny 80 81 Share on Facebook richmanchester | Pick Saturday Night Live Reply 7 8 Report Loading comments… Trouble loading? Share on Twitter Um, she’s saying that society’s reaction is down to misogyny, not Pete’s decision to date her. 13 Mar 2019 0:38 13 Mar 2019 0:29 13 Mar 2019 0:24 | Pick 13 Mar 2019 0:34 | Pick Twitter Reply Reply Report Share on Facebook | Pick Birdmanrob Share Share on Twitter Share Share on Facebook Twitter Has Kirk usurped Michael?! That would be NEWS! Share on Facebook Share on Facebook Twitter Show 6 more replies 29 30 13 Mar 2019 0:22 Share on Twitter Share on Twitter Yup. That’s the thing with time lords .. Though I’m sure Captain TJ Hooker also had his fair share of flings with interplanetary cougars well beyond his youthful earth years. Reply Twitter | Pick 1 Sign in or create your Guardian account to recommend a comment Facebook Reply Share on Twitter Did anyone see the headline and wonder how old the woman must be if she is the older woman to Dr Who’s Peter Davidson? | Pick StumblingHome Share on Facebook 21 22 Washington_Irving Share on Twittercenter_img Share on Facebook ApeDrape Report Facebook Twitter Share on Twitter Share on Twitter FullClipTorres Share on Facebook Share on Twitter Report 161 162 79 80 Facebook Twitter Twitter jamesbeckman LabourMess 40 41 This comment was removed by a moderator because it didn’t abide by our community standards. Replies may also be deleted. For more detail see our FAQs. asparagusnextleft LabourMess Report Share 45/2 + 7 = 29.5 While I wouldn’t use the word “unacceptable” about any age difference that stays within legal limits, 45 and 25 is definitely outside the limits set by the Standard Creepiness Calculator. But hey, if they’re both happy, who’s to argue? Share on Twitter 30 31 creekwhore Share on Twitter Show 1 more reply Twitter 13 Mar 2019 0:29 Share on Twitter OutOfOptions LabourMess Share Share | Pick Twitter Share on Twitter 100 Facebook Twitter 13 Mar 2019 0:32 Report Reply 13 Mar 2019 0:23 4 Share on Facebook Twitter Facebook who cares there are more pressing problems in the world. The “world” shocked? The world doesn’t care. Share Share on Facebook Share on Twitter Twitter Share on Twitter Report Reply TenementFunster 13 Mar 2019 1:30 Share Foxy444 Twitter Facebook Share on Twitter Facebook Share on Twitter Gender Share Opinion Share on Twitter Facebook 13 Mar 2019 1:09 Share 28 29 Show 7 more replies Share on Twitter | Pick Twitter Twitter Arwa Mahdawi Share on Facebook Steve Townsend Share on Facebook 13 Mar 2019 0:20 Share on Facebook 13 Mar 2019 0:20 Share on Facebook Share 13 Mar 2019 0:24 13 Mar 2019 1:13 2 Twitter Twitter 13 Mar 2019 0:25 BrianBraddock Share on Facebook 13 Mar 2019 0:43 35 36 richmanchester Report richmanchester Pandora89 Share Share on Twitter Facebook Share on Twitter 4 | Pick Twitter It’s amazing, the sheen a regular-appearance-on-television will give ya This comment was removed by a moderator because it didn’t abide by our community standards. Replies may also be deleted. For more detail see our FAQs. Share on Facebook | Pick Facebook 28 29 Report 115 116 | Pick Report 25 Share | Pick Share on Twitter Share onona Share Share on Twitter Facebook Report Facebook Twitter Report Twitter TenementFunster unlessroundisfunny This comment was removed by a moderator because it didn’t abide by our community standards. Replies may also be deleted. For more detail see our FAQs. Facebook Share on Facebook Sorry there was an error. Please try again later. If the problem persists, please contact Userhelp BrianBraddock Facebook This comment was removed by a moderator because it didn’t abide by our community standards. Replies may also be deleted. For more detail see our FAQs. Reply Share Report Share on Twitter It’s probably been highlighted as it’s less common than older men with younger ‘trophy’ wifes. Of course, these older men with young partners get just as much criticism and mockery as the case in the article, which rather negates the whole point of the article. Share on Twitter 13 Mar 2019 0:28 Facebook | Pick Twitter 13 Mar 2019 0:28 13 Mar 2019 0:29 Reply Share on Facebook Quiz time! Put your calculators away, please, I have a maths problem designed to test every inch of your natural intelligence. Ready? Here we go: Pete Davidson is a 25-year-old comedian. He is dating Kate Beckinsale, a 45-year-old actor. What’s their age difference?Twenty years? Wrong. The correct answer, judging from popular responses, is: “Too many years to be acceptable”. While society takes older men hooking up with younger women for granted, we still seem to have a lot of hang-ups about women dating younger guys. There is a one-word explanation for this: misogyny.Davidson has addressed such double standards head-on. “People have a crazy fascination with our age difference, but it really doesn’t bother us,” he said when quizzed about the relationship on Saturday Night Live. “But then, I’m new to this,” he added. “So, if you have questions about a relationship with a big age difference, just ask … Leonardo DiCaprio, Jason Statham, Michael Douglas, Richard Gere, Jeff Goldblum, Scott Disick, Dane Cook, Derek Jeter, Bruce Willis, Harrison Ford, Tommy Lee, Alec Baldwin, Sean Penn …” | Pick ‘We still seem to have a lot of hang-ups about women dating younger guys’ … Pete Davidson and Kate Beckinsale.Composite: Getty/Rex Facebook Email (optional) Report Facebook This comment was removed by a moderator because it didn’t abide by our community standards. Replies may also be deleted. For more detail see our FAQs. newest Share on Facebook Birdmanrob | Pick Share MAppeal_62 Reply Pazuzu Share Facebook 13 Mar 2019 0:53 Report it’s not the age really, it’s that it’s Kate Beckinsale. It seems like such an odd pairing, but fair play to them. Report unlessroundisfunny Twitter thecheesyboy Twitter 12 13 Report I’ll never forget where I was when I heard this news. I was so shocked I spat hot macchiato over my phone, shouted profanities, jumped up and down and my trousers fell down. I was in Starbucks at the time, which didn’t help. Reply Share on Facebook onona Facebook stebbo | Pick 37 38 80 81 When she could be dating me instead….. oops Mrs Stebbo is about to give me a whack, Runnnn! Share Reply 13 Mar 2019 0:31 I believe the former made some comments that might be illuminating? Show 1 more reply | Pick | Pick brumell Share on Twitter Show 7 more replies 13 Mar 2019 0:45 LordMorganofGlossop What makes you think he’s a total arsehole? SweetVAR Report Twitter Share on Messenger FeedMeBerk Twitter 42 43 Report All Shane Fieldsend That relationship never gets mentioned because it isn’t a thing. Share Maybe she’s an arsehole too? Or maybe he’s not the arsehole you think he is? Would it make a difference if she wasn’t beautiful? 13 Mar 2019 0:46 Reply Reply Share 62 63 Share on Twitter Share on Facebook 13 Mar 2019 0:28 Share matt h 86 87 217 218 Facebook Facebook The lad’s punching to be fair! cmarrtyy | Pick Close report comment form 34 35 Report Well in a sexual relationship attraction tends to help. There’s a reason why teenage me didn’t get that excited when my gran had her mates from the WI around. Facebook 13 Mar 2019 0:26 Facebook onona Twitter And that’s the only thing that counts, right? Reply Twitter 13 Mar 2019 0:56 1 18 19 73 74 Share on Facebook Facebook Share on Twitter Share on Facebook 13 Mar 2019 0:42 Washington_Irving | Pick 141 142 | Pick Comments 324 next she’s beautiful Report 89 90 | Pick Share on Twitter | Pick Share on Twitter Share Share Jessica Roth | Pick Twitter Twitter | Pick 13 Mar 2019 0:23 Reply Report Not directly, no. But had these two started dating ten years ago, a few upset Twitter users would have been the least of her worries. Report eyesandears carefreewill Reply Reply Share I think a lot of it is that he doesn’t seem like the most mature guy. So he seems even younger than he actually is. I don’t think there’d be the same reaction if he were a famous young academic or a young startup CEO. Share on Facebook Facebook The list went on and on because (I’m not sure if you’ve noticed) men love dating much younger women. Indeed, many seem to see dating a woman their own age as a personal failing. Earlier this year, for example, Yann Moix, a 51-year-old French author and international moron, said he would be “incapable of loving a woman of 50 … I prefer the bodies of young women.”Thankfully, neanderthals such as Moix are slowly being balanced out by the likes of Emmanuel Macron, Hugh Jackman, and Davidson: men who are proud to be in relationships with older women. The gender age gap—like the wage gap – still has a long way to go, but we’re slowly getting there.Arwa Mahdawi also writes The Week in Patriarchy, a weekly newsletter on feminism and sexism. Sign up to receive it by email. Share Twitter Assistantref 13 Mar 2019 0:31 60 61 Report Share on Facebook 13 Mar 2019 0:26 Share Facebook Twitter Facebook He just sits there licking his eyebrows Share on Facebook billy2times Reply 15 16 11 12 Share on Twitter | Pick Share Share on Twitter Share on Facebook Share collapsed oldest georges1 Report Shane Fieldsend Facebook 12 13 Share Reply Share on Twitter Share on Twitter Share on Twitter Report Twitter Share on Facebook billy2times mintaka Assistantref 13 Mar 2019 0:36 simbasdad Reply I don’t. So long as it is a consenting relationship between adults, I don’t see how it is any of my business. 52 53 But they didn’t so your point is what? Facebook FullClipTorres As the article points out, there seems to be much more acceptance when the age gap is the other way around. What’s your evidence that older men with younger female partners are criticised and mocked an equal amount as when the woman is older? 13 Mar 2019 1:20 Share Reply Share on Twitter 13 Mar 2019 0:56 15 16 oviraptor 144 145 Report 13 Mar 2019 0:57 Share on Facebook Steve Townsend … we have a small favour to ask. The Guardian will engage with the most critical issues of our time – from the escalating climate catastrophe to widespread inequality to the influence of big tech on our lives. At a time when factual information is a necessity, we believe that each of us, around the world, deserves access to accurate reporting with integrity at its heart.More people are reading and supporting The Guardian’s independent, investigative journalism than ever before. And unlike many news organisations, we have chosen an approach that allows us to keep our journalism accessible to all, regardless of where they live or what they can afford. But we need your ongoing support to keep working as we do.Our editorial independence means we set our own agenda and voice our own opinions. Guardian journalism is free from commercial and political bias and not influenced by billionaire owners or shareholders. This means we can give a voice to those less heard, explore where others turn away, and rigorously challenge those in power.We need your support to keep delivering quality journalism, to maintain our openness and to protect our precious independence. Every reader contribution, big or small, is so valuable. Support The Guardian from as little as $1 – and it only takes a minute. Thank you. | Pick billy2times 13 Mar 2019 0:48 Twitter 13 Mar 2019 0:31 13 Mar 2019 1:16 Meh. I’m the same age as Beckinsale and I do get interest from young men that I definitely didn’t get when I was younger. These particular young men seem to be looking for adventure and life experience and seem to think I can supply them with it. I’m not that keen and that only seems to encourage them which makes me even less keen … One started telling me about his high school self to which my outer response was bemusement and my inner response was to shudder. Guys please take this advice – never remind a woman that you were once a teenaged boy. Nobody wants to think about that. matt h Shares141141 22 23 Lucky him !!! Facebook 13 Mar 2019 0:29 carefreewill Report Report GladysGlover Share on Twitter 18 19 A lot of young men seem to want to tick that “sleep with an older woman” box as well, just to add it to their list of experiences. Share Share on Twitter Assistantref Share on Facebook Twitter Reply Report richmanchester FenryHlower Facebook | Pick ApeDrape … Share on Facebook Reply Facebook Reply Reason (optional) Twitter Reply 13 Mar 2019 0:41 View more commentslast_img read more

first_img The Washington hat, created and designed by Steve Silver in 1982. Photograph: Courtesy Beach Blanket Babylon archive Twitter Share on Pinterest The Silver San Francisco Skyline hat, based on Steve Silver’s original sketches and designs, created for the 25th anniversary of Beach Blanket Babylon in 1999. Photograph: Courtesy Beach Blanket Babylon archive Topics For 45 years, a raucous musical revue show in San Francisco has lured locals and tourists alike, including the Queen, Prince Charles and Camilla, Duchess of Cornwall.Beach Blanket Babylon claims to be the longest-running show of its kind in the world. It also features hats of improbable dimensions. Last modified on Fri 19 Apr 2019 13.48 EDT Facebook Share on Twitter features Fri 19 Apr 2019 01.00 EDT Facebook San Francisco … we have a small favour to ask. The Guardian will engage with the most critical issues of our time – from the escalating climate catastrophe to widespread inequality to the influence of big tech on our lives. At a time when factual information is a necessity, we believe that each of us, around the world, deserves access to accurate reporting with integrity at its heart.More people are reading and supporting The Guardian’s independent, investigative journalism than ever before. And unlike many news organisations, we have chosen an approach that allows us to keep our journalism accessible to all, regardless of where they live or what they can afford. But we need your ongoing support to keep working as we do.Our editorial independence means we set our own agenda and voice our own opinions. Guardian journalism is free from commercial and political bias and not influenced by billionaire owners or shareholders. This means we can give a voice to those less heard, explore where others turn away, and rigorously challenge those in power.We need your support to keep delivering quality journalism, to maintain our openness and to protect our precious independence. Every reader contribution, big or small, is so valuable. Support The Guardian from as little as $1 – and it only takes a minute. Thank you. Twitter Prince Charles and Camilla, Duchess of Cornwall, at a special performance of Steve Silver’s Beach Blanket Babylon in 2005.Photograph: Paul Sakuma But on Wednesday, producer Jo Schuman Silver, the widow of creator Steve Silver, announced to her team of 85 staffers that the final performance of Beach Blanket Babylon would take place on 31 December. “Steve always said to me, ‘You will know when the right time is,’” Schuman Silver says. “The show is at the top of its game. He left me the show. He knew I would be able to do it. He said, ‘Jo, you’ll know!’”These days, the gentrifying and increasingly unaffordable San Francisco is reeling from a spate of closures. Decades-old bars and restaurants are shuttering everywhere, so the end of Beach Blanket Babylon has hit the city hard.Boasting a longer lifespan than Saturday Night Live, it distills absurd costumes, topical references, and a mildly bawdy sensibility into one unique package. Each show is framed by Snow White’s search for Prince Charming, but Beach Blanket Babylon circumnavigates the globe, encountering figures such as Melania Trump, Ruth Bader Ginsburg and whoever might be in the news that week.Every costume reveals a more elaborate costume – there are 10 to 12 outfit changes for a 90-minute performance – and every number is a showcase for a vocalist’s chops. And then there are the hats the size of a small European car. They come in the shape of San Francisco landmarks: the Golden Gate Bridge, Coit Tower, the Transamerica Pyramid, a row of Victorians, a Chinatown pagoda. Peter Lawrence Kane in San Francisco Twitter The absurd performance draws residents and tourists – including the royals – with its elaborate hats and skits Share on Twitter San Francisco US theater Beach Blanket Babylon: San Francisco’s bawdy, topical show to close after 45 years Twitter Pinterest With barely a moment to catch your breath, the show is designed to be enjoyed and appreciated by the least culturally aware person in the very back row. If audience members don’t recognize the public figure being lampooned on stage, they can squint and probably see their name written on the character’s T-shirt or emblazoned on an oversized button pinned to their lapel.Steve Silver began Beach Blanket as street theater, and its initial run was only expected to be six weeks. It was bold, though not as assertively pansexual or in-your-face as shorter-lived troupes like the Cockettes. The power broker and former San Francisco mayor Willie Brown famously dismissed it before becoming an outspoken fan, and a 1989 performance at the Oscars was not particularly well received. Disney threatened to sue over the use of Snow White.Yet over the years, Beach Blanket Babylon became that rare thing: an icon beloved by locals and tourists alike. Undoubtedly, the hats were a key element. Actors who wear them are given particular exercises and regular check-ups, and several examples have become museum pieces. Such is the instantly recognizable power of those hats that an actress wearing one can wordlessly assist at a ribbon-cutting for a tourist attraction at Fisherman’s Wharf, lending legitimacy and cachet just by smiling.center_img Share on Facebook Share on LinkedIn Pinterest Facebook Beach Blanket Babylon: San Francisco’s bawdy, topical show to close after 45 years Pinterest Pinterest Share on WhatsApp The Dish hat, created and designed by Steve Silver in 1978. Photograph: Courtesy Beach Blanket Babylon archive Some actors have remained with the company for 25 years or more. Paul Hovannes is among the newest principal cast members, having joined last August to play Bill Clinton, Eric Trump and Freddie Mercury – a recent addition – plus a number of background characters and one of the dancing french poodles, which have became a staple of the show.“When I saw the guys dancing in poodle suits, it was so unlike anything I would ever consider doing on stage myself,” Hovannes says. “But once you get in an actual suit, it’s the most fun. It’s impossible not to smile in those outfits.”The show is such a fixture that the block of Green Street on which the the 373-seat Club Fugazi, the show’s home, is located was designated Beach Blanket Babylon Boulevard in 1996. Now Club Fugazi will have to fill its seats some other way.Schuman Silver compares the closure to Jerry Seinfeld’s decision to end his 1990s sitcom after nine seasons, just as it reached No 1 in the ratings. The tightknit crew of alumni have all “been on the phone with each other making plans for New Year’s Eve”, she says.But that’s still to come. “We have to take care of the show right now and make sure every performance is wonderful,” she says “So that’s not the priority right now. We still have shows to do.” Share via Email Since you’re here… Facebook Shares268268 Support The Guardian Facebook Twitter Share on Facebook Share via Email Famous guests have included the prince and duchess, who saw a special performance during their first joint official tour of the US in 2005. The Queen met Steve Silver in 1983, and also saw a performance.The costume designer Jayne Serpa was hired in 1990 and estimates she has outfitted between 100 and 150 actors. “The quickest turnaround I think was Kate Middleton’s wedding dress,” she says. “I was very grateful that [Middleton] had simple tastes, let’s put it that way.” Pinterest An actor plays Kim Kardashian in Steve Silver’s Beach Blanket Babylon at Club Fugazi in San Francisco’s North Beach district. Photograph: Rick Markovich The Queen, Mary Martin, Tony Bennett and Steve Silver together in 1983. Photograph: Courtesy of Beach Blanket Babylon Share on Messenger Reuse this contentlast_img read more

first_img 15 May 2019 13:54 Opinion Harry Lagom Editorial Well fair play to them, they saw a niche and exploited it. Unpleasant people will always act this. Not sure.yiu can really legislate.against.it. sorry am drunk Share via Email TheRealCmdrGravy Share on Facebook republicantraveller Twitter Report 0 1 Share on Facebook Report Show 25 Read more NSO is not the only private firm in this digital arms trade, although it is the largest and probably the most successful. The only comparably advanced operators appear to be national governments. The NSA and GCHQ in the US and the UK have the legal power and duty to develop such weapons, although they are not for sale. The variety of Russian cyberweapons is astonishing. They have been used in attacks on the power-generation facilities of Ukraine as well as in the hacking of the Democratic party’s emails in the US presidential election campaign. One Russian network recently discovered used messages posted as comments in Britney Spears’ Instagram account to coordinate its operations.There are two great dangers to the spread of these weapons. The first is highlighted by the Pegasus case: they can be used against individuals who defy criminal governments or even large criminal gangs. The second is that they can be used against states, as part of low-intensity warfare. Here, the boundary between digital and physical becomes unclear: in its most recent bombing of Gaza, Israel claimed to have destroyed a Hamas “cyberwarfare” centre. These weapons must urgently be controlled in international law before there is a disastrous accident. WhatsApp ecstatist Shares2323 Topics Guardian: “Huawei poses security threat to UK, says former MI6 chief”No shit, Sherlock!Even if the code could be verified – there will still be nefarious nasties hiding at the microcode and even hardware level. Reply Share Share on Facebook Surveillance Reply Report Reply Share on Twitter Hawick1000 Ginen Twitter Share on LinkedIn Share Share on Twitter Facebook 15 May 2019 13:45 15 May 2019 9:19 Share on Facebook The biggest culprit is US and UK will do nothing about it. UK will subserviently obey the master in Washington. Jump to comment Share 16 May 2019 23:27 Politicians and law enforcement officials who call for mandatory back doors to secure communications software should consider that their private back doors are open to anyone who can detect them. The damage caused by criminal gangs let alone hostile frenemy states is potentially huge. Whole countries can be held to ransom. Reply Report Jump to comment | Pick Share on Facebook Share on Facebook Malware Share on Facebook Facebook Report Twitter There are a number of issues here that seem to be part of the standard mucky world of governing: a) Countries like Israel, and indeed the UK, are happy to sell weapons to dodgy countriesb) cyber-spying has become so routine that cyber-warfare was always inevitablec) developing a tool to disrupt an enemy is a good return on investment eg for the cost of a single missile you could employ several hackers for a yeard) state hackers don’t usually appear to be listed as employees or wear military uniform – they are deniable. The state with the most hackers is not listed above but is very effective at stealing corporate IP and getting into sensitive networks. 15 May 2019 5:21 Email (optional) Twitter Data and computer security ecstatist Facebook cam medow These weapons must urgently be controlled in international law before there is a disastrous accident. OldMiles Share SolentBound Share on Facebook | Pick Twitter Share on Twitter | Pick Share Reply Facebook Facebook Share Share on Facebook Share on Twitter NickStanford Twitter Twitter UkLawyer123 graun | Pick “These weapons must urgently be controlled in international law before there is a disastrous accident.” I’d like to know what the Guardian thinks such a treaty, which must be what it has in mind, would say, and how it would control rogue actors. At the moment, efforts appear to be focused on prevention. To take simple examples, at one time I used seriously secure phone lines for business calls, and I used to attend meetings at a western intelligence agency at which mobile phones had to be checked. They were not allowed in the room. The Democratic National Committee hack was surely preventable. Hillary Clinton’s use of a private server for classified e-mails was not only preventable, but it’s hard to understand how a Secretary of State could be that irresponsible. At the same time, offensive use of cyber weapons can come in handy. U.S. use of cyber warfare is thought to have set back Iran’s development of nuclear weapons, and the NY Times, within the last couple of years, published an interesting report on U.S. interference, through cyber means, with North Korea’s missile programme. As a westerner, I am not in a hurry to condemn this kind of activity. | Pick Facebook Share on Twitter This is appalling and very upsetting. | Pick | Pick 4 5 Share 2 3 0 1 Facebook Share on Facebook Report 1 2 Report editorials 2 3 Share on Twitter Reply Facebook ‘The NSO malware targeting WhatsApp is different in that it can install itself without the victim doing anything at all.’Photograph: Patrick Sison/AP Pushk1n | Pick 16 May 2019 17:06 SolentBound DismantleTrident Report SolentBound Facebook Hawick1000 Share on Facebook Twitter Twitter 0 1 15 May 2019 4:49 Comments 44 Share 100 Report 2 3 Even if such a law were to be agreed it would not stop organisations like NSO nor states like Russia from using their skills to develop and exploit cyber weapons. And, of course, states like the US and UK would insist on an exemption for national security and/or defence purposes. It’s going to be a long hard slog, and filled with obstacles and mistakes, but the only solution is to ensure that companies developing software for use by the public take greater care to leave no loopholes for hackers to exploit. That means using modern, professional, software engineering techniques, and the removal of loopholes quickly once discovered. I think it also means publicising software applications that are suspect, their removal from sale and availability, and legal sanctions against producers and sellers. A sea change will occur when we see the first legal class action against a big international company for distributing a system with loopholes which have been exploited by hackers, and a resulting massive fine. Opinion Twitter I suppose if I googled it I could find a list of the main hacks over the last 5 years. But thinking back a lot of the large online companies have been hacked in the last few years from Sony to whatsapp. But the public seem not to react most of the time as if they see it as an acceptable risk. Share Facebook Hacking | Pick Share on Twitter Support The Guardian Share on Twitter Facebook Report Share on Twitter | Pick 15 May 2019 14:19 15 16 0 1 Muzzledagain 3 4 Close report comment form Reply Share Reply Guardian Pick Twitter Reply TheRealCmdrGravy Share on Facebook Facebook republicantraveller Some people seem to be conflating the issue of corporate responsibility and personal security.Of course there are many actions we can personally take to risk our own security but the fact remains that at a company level these companies have been selling platforms as secure that have insecure code that can be exploited. Share on Facebook Twitter ghotiface Facebook Facebook Reason (optional) Share Share 1 2 2 | Pick Report I suspect it will take precisely a “disastrous accident” to mobilize international public opinion. No one in teh West took Muslim terrorism seriously, until 9-11. Russia would have gotten away with its land grab in eastern Ukraine, save for the fact that their army shot down MH-17, albeit mistakenly. As with Global warming, it’s disasters that “concentrate the world’s mind wonderfully.” Countries like Israel, in this case, mean almost every arms exporting nation in the world who supply the 97% of internationally traded arms that are not supplied by Israel. 16 May 2019 19:14 | Pick To circumvent constitutional laws preventing US agencies from warrantless searching of US citizens’ emails etc, they simply route the traffic through the UK where it is spied upon by 4 of the “5 eyes” and then reported to the 5th. Share on Twitter Twitter Share on WhatsApp Loading comments… Trouble loading? Report Sorry there was an error. Please try again later. If the problem persists, please contact Userhelp SomersetDan Apple – “what happens on your iphone stays on your iphone” /BSmarketing Facebook I think that the big issue, while not specifically mentioned in the editorial, is that it’s not hard to imagine a cyber attack that would constitute an act of war. One might argue that the U.S. examples that I gave are precisely that. If a state actor takes out the northeastern U.S. electrical grid, I guess we’ll find out what the real ramifications are. For the moment, I’d like to think that deterrence works, and that it’s mostly a matter of states saying “what can we get away with before all hell breaks loose” 🙂 Facebook | Pick Share Share Share on Facebook Report Peter Hitchens… ewww. Facebook 2 3 loopine Guardian Pick Twitter Share on Facebook Share Share on Facebook William D’arblay 75drayton Twitter | Pick Share on Facebook Share Share on Facebook Share on Twitter 4 5 Reply 0 1 Share 3 4 “NSO Group, an Israeli firm that has risen to a billion-dollar valuation on the strength of the aggressive hacking tools it sells to authoritarian governments across the Arab world, is being sued by lawyers and activists who claim to be victims of its software.” So by way of analogy, all those civilians that have become victims of guns and weapons built in the west should sue every western manufacturer that built them. Share on Twitter LucianOfSamosata 4 5 recommendations SolentBound 15 May 2019 5:05 Twitter 4 5 Reply Reply Twitter Reply Share on Facebook rockcasbah Anyone who uses anything that Zuckerberg is involved with must be mad! Share on Facebook Facebook | Pick Share That GPS on your phone, once hacked, will provide very useful information for the Death Squads of any future extremist UK Government. | Pick Share on Twitter Facebook 15 May 2019 6:08 Share on Facebook Facebook | Pick | Pick | Pick Report jason briggs Twitter 15 May 2019 5:30 Share Since you’re here… | Pick 0 1 Twitter Order by oldest Reply Share on Facebook Reply 16 May 2019 19:40 Share on Facebook Report Twitter Share on Facebook Show 1 more reply Share on Pinterest Share on Twitter Reply Share on Twitter The most important part to understand first is that there are no good governments in the world that are not into cyber shenanigans. They are all at it. Quite at what level is a game of Point the finger whilst hiding your own dirty work. We know now that A can do it to B and make it look as though it is C who has done it. Such is the cyberspace. So simply pick your enemy and away you go. OldMiles loopine Facebook 50 Threads collapsed | Pick Report newest Share I think the banking system is less than transparent of hacks to their systems and I think the secrecy surrounding the subject is sanctioned at government level for reasons of public interest. I listened to a security expert on BBC radio 4 say that during an audit of bank servers that he managed his team found hundreds of pieces of spyware on the particular bank’s servers. 1 2 0 1 16 May 2019 0:26 Share on Twitter Privacy Facebook Do you mean that Russia didn’t get away with its “land grab” of Russian speaking Ukraine?I must be behind the times. And the Lockerbie court (in Holland) convicted the right person? 1 2 Jabo4523 graun Share on Facebook 15 May 2019 5:43 15 May 2019 4:27 Reply SolentBound Allcenter_img Share on Facebook Facebook SomersetDan Share on Facebook Facebook Share NotSoLittleMouse Facebook yemrajesh Twitter Share 1 2 9 10 | Pick 2 3 graun 16 May 2019 22:59 Share on Twitter 15 May 2019 6:09 15 May 2019 22:33 The Guardian has more trackers embedded in its web pages than any other site I visit. It has no control over what metrics are drawn from the third-party trackers. Valid though its criticism of this spyware it, it would have more validity if it removed all its own trackers. Twitter kotbegemotuk Twitter 1 2 0 1 Facebook Twitter Share on Twitter Twitter Share on Twitter Reply Facebook 0 1 Share Share Share on Facebook expanded Share Facebook Report Reply Facebook Share on Facebook Pushk1n 15 May 2019 9:32 Reply 15 May 2019 Share on Twitter Brightonian Share on Twitter 15 May 2019 0 1 MicheNorman Report Share on Facebook madeiranlotuseater Report Twitter Facebook Reply unthreaded 0 1 kotbegemotuk Reply 15 May 2019 3:56 This comment was removed by a moderator because it didn’t abide by our community standards. Replies may also be deleted. For more detail see our FAQs. | Pick Share on Twitter Share on Facebook Report Share on Facebook It’s unlikely Corbyn will win the next election though and once he’s nationalised the computer networks unlikely anything would be able to use them efficiently enough for any serious damage to be done. Share Reply These weapons must urgently be controlled in international law before there is a disastrous accident. Something like the Non nuclear proliferation treaty you mean. Not very efficient. I am afraid that, as for nuclear, every nation will have to secure themselves from these attacks by developing equal tools. They all do it. Some more successful than others. I dont see a way to have it under control. Share on Twitter yemrajesh 15 May 2019 18:18 collapsed Report Reuse this content,View all comments > NickStanford | Pick 15 May 2019 3:54 Twitter | Pick Facebook Twitter Facebook | Pick Twitter Share Facebook Share on Twitter Share on Twitter So by way of analogy, all those civilians that have become victims of guns and weapons built in the west should sue every western manufacturer that built them. That depends. There are precedents. When people knowingly build criminal weapons especially ones used to specifically attack civilian population they are traditionally classified war criminals. Unfortunately, the only case they are ever brought to trial is when a country changes allegiance so it is an act of political convenience, not an act of justice. Share on Facebook | Pick Share oldest Facebook UkLawyer123 Report If we can normalise the use of knives and guns that actually kill people, we can come to terms with software that might “bug” us – but do no actual physical harm. So while this sort of thing is a slight inconvenience to the small numbers of (usually high profile) targets, it is nothing like as serious as physical weapons, used every day against ordinary people. Personally I have no concerns about having my phone hacked. I keep nothing of value on it. I would absolutely never keep critical information on it: for example a banking app. Phones are far too insecure or easily lost to ever trust them. And I feel it would be extremely foolish for anyone to keep anything critical or sensitive on one. Even if my phone was hacked, what’s the worst that would happen? The hackers get to see my Whatsapp messages and photos – maybe the passwords to some websites that I don’t really care about. Big deal! Fix the proliferation of real weapons first. Then worry about phone hacking. TheRealCmdrGravy | Pick Guardian Pick 15 May 2019 3:58 Share on Twitter Reply Report | Pick Share 1 2 Share on Twitter 15 May 2019 13:36 0 1 Share Share Share 15 May 2019 14:08 15 May 2019 22:59 Who is this arse hole on Newsnight and why is Emily interviewing this pond life sub Amoeba on British TV? Hawick1000 0 1 Reply Report ghotiface | Pick Report Share on Twitter 16 May 2019 3:45 Share Share on Facebook These weapons must urgently be controlled in international law before there is a disastrous accident. Facebook Twitter Report SolentBound Share on Twitter Share on Twitter Share on Twitter Report 15 May 2019 10:06 15 May 2019 4:11 0 1 Report Twitter Twitter Report Share on Facebook 15 May 2019 23:49 Share states saying “what can we get away with before all hell breaks loose” 🙂 Cyber attacks are often seen as a “bloodless” means of waging war. However the israelis have escalated this recently by destroying a palastinian “hacking” centre and killing the hackers inside. Whether other hackers will now feel they are justified in going after civilian targets with fatal consequences is something we should watch carefully. As for targetting the power grid: in the USA that seems unnecessary, given the announcement that PG&E prefer to cut electricity supplies to millions of californians rather than mend their antiquated infrastructure. Maybe all the “baddies” have to do is wait and let the rusting and bankrupt utilities take the country back to a pre-electricity era, on their own. Reply 1 | Pick Report Share on Twitter Chat and messaging apps While there are loopholes in systems (and it seems almost certain that there always will be) they will be open to exploitation by all sorts of people and agencies but the central thing that will make loopholes keep on appearing in supposedly secure systems is that it is not only criminal gangs but practically every Nation in the World has a cyber espionage capability and a desire to use it… whether to spy on its own citizens, other Nation’s citizens or both. I’m afraid we are probably just going to have to accept that our data is never going to be totally secure, in the face of a determined and skilled cyber attack, and try to find ways and workrounds to make this less disastrous and faster to recover from, than it currently can be. Share | Pick 25 Twitter Share on Twitter Twitter Report kotbegemotuk 15 May 2019 17:22 0 1 Facebook Share on Facebook Last modified on Tue 14 May 2019 15.05 EDT Tue 14 May 2019 13.38 EDT Facebook Twitter Twitter “These weapons must urgently be controlled in international law before there is a disastrous accident.” I’d like to know what the Guardian thinks such a treaty, which must be what it has in mind, would say, and how it would control rogue actors. At the moment, efforts appear to be focused on prevention. To take simple examples, at one time I used seriously secure phone lines for business calls, and I used to attend meetings at a western intellige… Please select Personal abuse Off topic Legal issue Trolling Hate speech Offensive/Threatening language Copyright Spam Other 15 May 2019 19:22 yemrajesh 16 May 2019 20:03 Cyberweapons are dangerous in themselves. Their proliferation makes them much more harmful Report | Pick Any advantage, strategic, economic, or financial, will always be sought. Like always, new technologies are benefiting from a lack of understanding and regulation. We had powder, machine gun, mustard gas, tanks, agent orange and so on .. The one holding the aces will claim fair game and resist any attempt to regulate, whilst the others will cry foul and try to regulate it’s use. In the meantime, it’s wild west and free for all. International collaboration is only sought once the different parties realised they can’t do it alone. On a side note:how Israel’s lengthy military service, especially in the cyber warfare division, is creating a conveyor belt of highly qualified professionals at the end of the military service is very interesting. Facebook Share on Facebook Share on Twitter Report Share on Facebook 15 May 2019 9:57 Report 4 5 NSO Group, an Israeli firm that has risen to a billion-dollar valuation on the strength of the aggressive hacking tools it sells to authoritarian governments across the Arab world, is being sued by lawyers and activists who claim to be victims of its software. One of the lawyers involved in the suit was targeted some weeks ago by mysterious WhatsApp calls to his phone in the middle of the night. When he contacted technical experts, they discovered Pegasus 3, an aggressive virus that can apparently install itself on a phone without the victim taking any action at all. Once installed, it takes control of the device, recording conversations and video. It can destroy the evidence of its own arrival and existence, and control any files on the device. In effect, it turns a smartphone into the perfect spying device, which the victim will carry everywhere with them.Similar programs are widely available to abusers of all sorts, which is one reason why many domestic violence shelters ban the use of smartphones. But the ones that can easily be bought require some action from the victim, usually a misplaced click, or else a few moments’ access to their phone. The NSO malware targeting WhatsApp is different in that it could install itself without the victim doing anything at all. To discover and exploit the programming mistakes that opened this vulnerability would take years and cost millions of dollars. That is why it’s assumed that only states, or state-backed actors, have the resources to produce them.The NSO group has claimed to have contracts with 22 European countries. Its Pegasus programs have been detected in 45 countries, though some of this may be the result of operators outside the country concerned. Although the company sells only to states approved by the Israeli government, these include Saudi Arabia, Mexico, Bahrain, Kazakhstan and the United Arab Emirates. All have a history of human rights abuses and of targeting dissidents and journalists. | Unpick While there are loopholes in systems (and it seems almost certain that there always will be) they will be open to exploitation by all sorts of people and agencies but the central thing that will make loopholes keep on appearing in supposedly secure systems is that it is not only criminal gangs but practically every Nation in the World has a cyber espionage capability and a desire to use it… whether to spy on its own citizens, other Nation’s cit… 15 May 2019 15:13 … we have a small favour to ask. The Guardian will engage with the most critical issues of our time – from the escalating climate catastrophe to widespread inequality to the influence of big tech on our lives. At a time when factual information is a necessity, we believe that each of us, around the world, deserves access to accurate reporting with integrity at its heart.More people are reading and supporting The Guardian’s independent, investigative journalism than ever before. And unlike many news organisations, we have chosen an approach that allows us to keep our journalism accessible to all, regardless of where they live or what they can afford. But we need your ongoing support to keep working as we do.Our editorial independence means we set our own agenda and voice our own opinions. Guardian journalism is free from commercial and political bias and not influenced by billionaire owners or shareholders. This means we can give a voice to those less heard, explore where others turn away, and rigorously challenge those in power.We need your support to keep delivering quality journalism, to maintain our openness and to protect our precious independence. Every reader contribution, big or small, is so valuable. Support The Guardian from as little as $1 – and it only takes a minute. Thank you. Show 1 more reply Share on Twitter Report Share Report Reply Pushk1n 0 1 Reply Reply Share on Twitter Share on Facebook 15 May 2019 16:38 Share via Email Twitter The Guardian view on hacking: a dangerous arms trade Reply This is what happens when British media don’t report much on the soon to be worlds biggest economy. We somehow manage to skip over the fact china’s regime has whole army divisions devoted to the task. And we chose instead to tare into ourselves and allies. Anyone really a fan of freedom, and their own human rights these days? Or we gonna continue the daft self sabotage while we give reaaal dictators the keys to control and rule over us? Report Share Hacking LucianOfSamosata republicantraveller Share on Facebook Facebook Reply Share on Twitter GrumpyOldFool Share Report Twitter Facebook Alternative action: disconnect your critical infrastructure from the internet. Guardian Pick 2 3 Reply Reply Share on Twitter Report Share Twitter 4 5 Share on Facebook Reply 15 May 2019 21:40 There’s still sneaker-net Twitter amoamasamat Harry Lagom Reply Share on Twitter 1 | Pick Report Reply Reply This comment was removed by a moderator because it didn’t abide by our community standards. Replies may also be deleted. For more detail see our FAQs. 1 2 Reply To be fair in your dreams . Russia would have gotten away with its land grab in eastern Ukraine, save for the fact that their army shot down MH-17, albeit mistakenly. I am eagerly awaiting that one to come to court (case is in Netherlands crawling towards ECHR) with a whole lorry of popcorn on order. We have convicted them in the media of being guilty of that by waving around a video which 1. Displays sunny weather on a day when our own met services have recorded overcast and drizzle (link is to official historic weather on timeanddate.com).2. Displays 17+ vehicles of up to 30 years old soviet vintage which do not have any smoke from their exhaust. 3. Displays 10+ vehicles which move past trees and bushes at 30mph+ without a single leaf moving. If anything that is an example of what a cyber-warfare treaty must take care of. It must also take care of dealing with people who use the Internet to pervert the course of justice – something which will happen when MH17 finally gets to court. The campaign to promote this video ABOVE known legitimate and clean evidence is a classic example of cyberwarfare. Just not the hacking variety. Reply 15 May 2019 5:21 //, an Israeli firm that has risen to a billion-dollar valuation on the strength of the aggressive hacking tools it sells to authoritarian governments across the Arab world//What almost everyone misses: these days, Israel simply is part of the Arab world.( it first struck me when looking at a Future City plan of MBS, which basically had “‘Saudi Arabia heart Israel” written all over it. ) Not quite sure whether that is progress or regress. It possibly comes under the “my enemy’s enemy is my friend” thinking. NickStanford “unlikely anything would be able to use them efficiently” That makes it worse, you could be sent for re-education because someone has a user name only one letter different from yours……. Share on Twitter Report | Pick Guardian Today: the headlines, the analysis, the debate – sent direct to you 3 4 15 May 2019 15:02 | Unpick Share | Pick Share on Messenger Share on Facebook | Pick | Pick BBBBBBBut this is undemocratic. It is DDDDDDDDictatorial. It is PPPPPPPPPutinist. That is exactly what their law on the subject does. It specifies a mechanism to disconnect the country from the Internet in case of a large attack on infrastructure. There is an excellent interview with the law author by the Guardian Russian equivalent (who even shares some contributors with it): https://www.novayagazeta.ru/articles/2019/01/08/79125-klishas It explains the rationale, the possible means of attack which have been considered and gives examples of why it is not insane scaremongering. I is also facility UK has had for more than a decade by having special requirements towards the job of the CTO of the London Internet Exchange. The fact that these exist was mistakenly published on JobSearch and CWJobs in 2010 (it was posted via recruitmentrevolution as job number 2466). Just UK pretends that it does not have it so it can scream abuse about lack of democratic process in Russia. No, they are not very democratic. However this particular aspect is the wrong example. They have discussed, codified in law and put aboveboard while we are pretending that it does not exist (ala Snowden). While in fact it does. 6 7 2 Reply 15 May 2019 6:03 Share on Twitter Share on Twitter comments (44)Sign in or create your Guardian account to join the discussion. 15 May 2019 22:37 Sign in or create your Guardian account to recommend a comment View more commentslast_img read more

first_imgThe portability of technologies like smartphones, tablets, and laptops indubitably helps individuals with disabilities perform daily tasks such as communicating, surfing the Web, word processing and so much more.  However, some individuals with mobility impairments have very limited use of their arms and hands making them unable to utilize the many features available on a smartphone or laptop.Individuals who use power wheelchairs to get around are now able to control these devices with their joysticks.  iPortal Mouse Mover + Accessibility is a sleek accessory module that plugs into your standard Dynamic Controls power wheelchair control system.  The all-new iPortal2 module uses Bluetooth to communicate with your laptop or personal computer, tablet or Apple iOS device, giving you full control of your communications technology.With Mouse Mover + Accessibility, users can now just roll on up to their computer and browse their computers, social networking sites, write documents or use spreadsheets,  engage in education or employment, send text messages and take photos with their iPhone—all from their power wheelchair joysticks.With the Accessibility feature enabled, the powered-wheelchair’s remote joystick is used to navigate, interact and control your iOS device.With the Mouse Mover feature enabled, the wheelchair’s joystick or other specialty input device is used to navigate and interact with your PC or laptop’s mouse pointerWith both the Mouse Mover + Accessibility features enabled, the wheelchair’s joystick or other specialty input device is used to navigate and interact with your PC or laptop’s mouse pointer as well as navigate, interact and control your iOS device.Share this…TwitterFacebookPinterestLinkedInEmailPrint RelatedTecla Shield: Hands-free control of smart devicesFebruary 8, 2017In “Independent Living”Control your computer with the Jouse3!November 25, 2014In “Computers”Control your computer with your eyesMay 15, 2014In “Tech Tips”last_img read more

first_imgBSI Reports Top Supply Chain Themes for 2019 PRNewswireApril 23, 2019, 4:03 pmApril 23, 2019 BSI SCREEN’s New Report Highlights the Top Challenges, Developments, and Trends Likely to Impact Supply Chains This Year BSI has identified five major themes that are most likely to impact the supply chain in 2019. The analysis of how these five themes will affect supply chains this year forms the business improvement company’s annual analysis of global supply chain risks. The five themes are: BSICTPATCustoms-Trade PartnershipCybersecurityMarketing Technology NewsNewsSupplY chain Previous ArticleSiriusXM Introduces New Streaming Subscription Package; Makes It Easier Than Ever To Subscribe and Listen Without a CarNext ArticleFishbowl, Inc. Names New Chief Revenue Officer Revision of the Minimum Security Criteria under the US Border Protection’s Customs-Trade Partnership Against Terrorism (CTPAT)Supply chain growth in Africa increasing exposure to varying risksOngoing mass migration posing both security and corporate social responsibility risksDramatic shifts in politics including those in Brazil, the US-China trade dispute, and uncertainty over Britain’s departure from the European UnionThe continued threat to supply chains posed by cybersecurity issues BSI has also identified several key trends in supply chain risk from 2018:Food and beverage remains the top commodity stolenMetal has now entered the top five commodities stolen worldwidePoor working conditions led as the top labour violation recorded last yearLabour strikes most frequently disrupted manufacturing operationsJim Yarbrough, Global Intelligence Program Manager at BSI, said: “We’re seeing key shifts to global supply chains this year, driven by quite dramatic changes in the geopolitical landscape. The concern is that as supply chains change – with Chinese companies moving operations to Africa, for example, or the US sourcing goods from other Southeast Asian nations – major implications will also evolve.“Increased exposure to labour exploitation, terrorism, corruption and natural disasters must be a consideration for companies making changes to their supply chain, and best practices must be maintained in order to prevent threats to business continuity or corporate social responsibility.”Marketing Technology News: Sales Engagement Leader Outreach Reaches Unicorn Status, Raises $114 Million Series EThe report provides analysis of each of these top supply chain challenges, developments, and trends to help organizations increase their understanding of potential exposures. A sample of the analysis by theme is identified below:CTPAT Minimum Security CriteriaWithin the United States, companies enjoying trade benefits under CTPAT will soon need to meet new criteria for certification in order to meet the evolving risks of today’s operational environment. As the revised criteria for CTPAT are unveiled, companies will need to undertake new efforts to achieve supply chain security and mitigate emerging risks.Exposure to varying risks in AfricaBSI’s report reveals the potential for increasing movement of supply chains to Africa, particularly amongst companies based in China spurred on by the US-China trade dispute. Shifting manufacturing operations to Africa, where labour costs are lower and shipping to the US or Europe is cheaper and can be cost-effective compared to staying in China.However, BSI warns that the relatively unchecked risk of terrorism in African countries, where 23 percent of all supply chain terror incidents take place, sets the operational environment apart from that of Asia. Companies whose supply chain moves to Africa must be wary of this increased risk, often compounded by corruption among security and customs personnel.Migration continues to pose a riskAs conflict, together with political and economic conditions, continue to drive mass migration, businesses must contend with the double-edged challenge of security and corporate social responsibility risks.This year’s report records an increase in stowaway and labour exploitation risks stemming from migrants traveling along three major flows: Central to North America, Intra Southeast Asia, and Africa and the Middle East to Europe.BSI has also noted regression in countries such as Brazil – where budget cuts are reducing the resources available to carry out inspections – that could increase the risk of migrant labour exploitation.Approximately half (48 percent) of all corporate social responsibility (CSR) incidents recorded by BSI in the last year involved migrants. The often desperate need for income to support their family leads many vulnerable individuals into labour exploitation.BSI believes this issue will remain key for supply chains in 2019, and companies must invest in a more thorough understanding of their supply chain to truly assess the risk of migrant labourer exploitation.Marketing Technology News: PCM Partners with RingCentral to Bring Cloud Communications Solutions to EnterprisesDramatic policy shiftsRecent shifts in political ideology in the governments of Brazil, Mexico, the United Kingdom, India, and the United States are setting the stage for an eventful 2019.Newly-elected leadership in Brazil and Mexico are attempting to chart a new course in Latin America. President Bolsonaro in Brazil has swiftly undertaken efforts that may pose corporate social responsibility risks for some industries operating in Brazil, particularly in relation to the rights of workers, the LGBTQ community, and indigenous territories. BSI recommends companies take a more active due diligence role on business partners in Brazil, to fill gaps left by the government’s removal of some regulatory requirements.Mexico’s president is undertaking new initiatives to curtail corruption that has historically underwritten organized crime, cargo theft, and oil theft in the country. The ramifications of such initiatives may have sweeping consequences for business continuity and cargo security, but despite President Obrador’s actions, BSI expects that security challenges will continue to affect businesses in the coming year, in particular in-transit cargo theft.The US-China trade dispute has raised new concerns related to intellectual property protections and the relocation of relevant facilities for a host of businesses. However, companies looking to other Southeast Asian countries should weigh the costs of tariffs against the cost of increased risks to their supply chains. Exposure to child labour, forced labour, and natural disasters are each prevalent in other Southeast Asian countries.The outcome of negotiations on Brexit remains unclear, creating ripples of uncertainty through supply chains operating within and through the United Kingdom and the European Union.India’s ongoing elections in April and May could create a shift in politics with effects on global supply chains. Workers’ dislike of many recent policies, with strikes over low wages and fuel prices, could cause immediate disruption and longer-term changes.CybersecurityWithin this new global landscape, cybersecurity stands as an overarching and multi-faceted struggle for all parties throughout the supply chain. Securing data and facilities in a fast-paced and modular world connected by the Internet of Things is an emerging challenge that all supply chain professionals undertook in 2018 and will continue to grapple with in 2019.The data and analysis within this report is pulled directly from our global supply chain intelligence platform, SCREEN. SCREEN provides insight into global supply chain security, business continuity and corporate social responsibility threats and trends in real-time. SCREEN allows users to visualize risk on a global scale and easily identify high-risk locations and potential exposures. Our spotlight news feature and proprietary global risk maps help organizations stay up to date with emerging threats and better protect their supply chain, brand and reputation.Marketing Technology News: Userful Announces New Drag-and-Drop Command and Control Module for Visual Networking Platformlast_img read more

first_imgLead Investor Access Technology Ventures Joins Haoqipei Board of DirectorsBusiness-to-business (B2B) auto parts trading platform Haoqipei closed US $60 million in Series D financing to continue its rapid growth across China. Access Technology Ventures led the round, adding David Yang to the Haoqipei Board of Directors.Additional participants in the financing included existing investors XVC Venture Capital, Jeneration Capital, DCM and SIG.Founded in 2016 and now having raised more than US $150 million in private capital, Haoqipei is an online, technology-driven trading platform connecting vehicle repair shops with auto part suppliers. The company provides market price comparisons and online payments through its software as a service (SaaS) system, and offline warehousing and logistics services.Marketing Technology News: Facebook Shoots Down ‘Innovation’ Chaos with a New CryptoCurrency Platform ‘Calibra’The company has a presence in more than 100 cities in Guangdong, Zhejiang, Hunan and other provinces.“The auto industry in China is set to become the largest in the world, with nearly 250 million cars. As the average life of cars on the road continues to increase, the $180 billion-plus automotive aftermarket will continue its strong growth,” said Chen “Alex” Xi, Haoqipei founder and CEO. “Haoqipei is transforming the process of purchasing auto parts by decreasing costs, improving quality and increasing speed and transparency. The value proposition to both buyers and sellers on our online platform is very strong.”Yang said, “Haoqipei represents a unique opportunity to leapfrog offline auto parts distribution by moving directly to an online model.” He noted that Access Technology Ventures has been an investor in Haoqipei since 2018, calling it “a prime example of our investment thesis to back market-leading foundational technology companies serving large- end markets at compelling inflection points.”Marketing Technology News: Profisee Adds Market Analyst Bill O’Kane to Leadership TeamXVC Partner Boyu Hu said, “Starting from a platform that matched suppliers and buyers, Haoqipei has developed into the go-to place for auto parts, covering the full lifecycle of the transaction, including marketplace, warehousing, and logistics. Haoqipei’s business model development continues to lead the industry and create competitive advantages. As the earliest institutional investor in Haoqipei, and one of its largest investors, XVC continues to support Haoqipei’s future growth.”Marketing Technology News: PX Launches Private Marketplaces to Support Direct Advertiser to Publisher Engagement Haoqipei Secures US $60 Million in Series D Funding to Further Accelerate Growth of its Online B2B Auto Parts Marketplace PRNewswireJune 21, 2019, 11:02 pmJune 21, 2019 business-to-businessDCMfundingHaoqipeiMarketing TechnologyNewsXVC Previous ArticleMarTech Interview with Kevin Kohn, CEO at iQ MediaNext ArticlePMG Launches Marketing Intelligence Platform — Meet Allilast_img read more

first_img Dani From ‘Girl Next Door’ is Absolutely Gorgeous Now at 36 By Joel Hruska on July 16, 2019 at 7:08 am Movies That Hollywood Didn’t Want to Make Facebook Twitter Linkedin Pinterest Google Plus Reddit Hacker News Flipboard Email Copy 20shares This site may earn affiliate commissions from the links on this page. Terms of use. We Now Understand Why Sean Connery Has Disappeared Tagged In scienceintelcpusartificial intelligencesemiconductorsaimachine learningneuromorphicneuromorphic computingLoihineuromorphic processor Post a Comment 17 Comments The Real Reason Emma Watson Refuses to Do a Nude Scene You Might Also LikePowered By ZergNet Don’t Watch These Movies With Your Parents Intel’s Neuromorphic Loihi Processor Scales to 8M Neurons, 64 Cores 17 Comments Season 2 of Netflix’s ‘Mindhunter’ Release Date Confirmed Intel has announced a significant advance for its neuromorphic research processor, codenamed Loihi. The company has now scaled up its Loihi implementation to the 64-processor level, allowing it to create a system with more than 8M neurons (8.3M). This new configuration (codenamed Pohoiki Beach) delivers 1,000x better performance than conventional CPUs in applications like sparse coding, graph search, and constraint-satisfaction problems. Intel claims that the new Pohoiki Beach delivers a 10,000x energy efficiency improvement over conventional CPU architectures in these sorts of tests.Neuromorphic computing is a subset of computing that attempts to mimic the brain’s architecture using modern technological analogues. Instead of implementing a typical CPU clock, for example. Loihi is based on a spiking neural network architecture. The basic Loihi processor contains 128 neuromorphic cores, three Lakefield (Intel Quark) CPU cores, and an off-chip communication network. In theory, Loihi can scale all the way up to 4,096 on-chip cores and 16,384 chips, though Intel has said it has no plans to commercialize a design this large.A close-up shot of an Intel Nahuku board, each of which contains 8 to 32 Intel Loihi neuromorphic chips. Intel’s latest neuromorphic system, Pohoiki Beach, is made up of multiple Nahuku boards and contains 64 Loihi chips. Pohoiki Beach was introduced in July 2019. (Credit: Tim Herman/Intel Corporation)“With the Loihi chip we’ve been able to demonstrate 109 times lower power consumption running a real-time deep learning benchmark compared to a GPU, and 5 times lower power consumption compared to specialized IoT inference hardware,” said Chris Eliasmith, co-CEO of Applied Brain Research and professor at University of Waterloo. “Even better, as we scale the network up by 50 times, Loihi maintains real-time performance results and uses only 30 percent more power, whereas the IoT hardware uses 500 percent more power and is no longer real-time.”One of Intel’s Nahuku boards, each of which contains 8 to 32 Intel Loihi neuromorphic chips, shown here interfaced to an Intel Arria 10 FPGA development kit. Intel’s latest neuromorphic system, Poihoiki Beach, annuounced in July 2019, is made up of multiple Nahuku boards and contains 64 Loihi chips. Pohoiki Beach was introduced in July 2019. (Credit: Tim Herman/Intel Corporation)The Pohoiki Beach implementation is not the largest planned deployment for the neuromorphic chip. Intel states that it intends to roll out an even larger design, codenamed Pohoiki Springs, which will deliver “an unprecedented level of performance and efficiency for scaled-up neuromorphic workloads.”We’ve covered the advances and research in neuromorphic computing for several years at ET. The work being done on these CPUs is closely related to the work that’s being conducted in AI and machine intelligence overall, but neuromorphic computing isn’t just concerned with how to run AI / ML workloads efficiently on existing chips. The ultimate goal is to build processors that more closely resemble the human brain.One of the oddities of computing is that analogies comparing human brain function and how computers work are so prevalent. Human brains and classic computers have very little overlap in terms of how they function. Transistors are not equivalent to neurons and the spiking neural network model that Loihi uses for transmitting information across its own processor cores is intended to be closer to the biological processes humans and other animals use than traditional silicon.Projects like this have a number of long-term research goals, of course, but one of the most fundamental is to better understand how brains work in order to copy some of their energy efficiency. The human brain runs on roughly 20W. Exascale supercomputing, which is considered the minimum for advanced neural simulation of anything more complex than an earthworm, is expected to consume megawatts of power per supercomputer. The gap between those figures explains why we’re so interested in the long-term energy efficiency and computation potential of the brain in the first place. Architectures like Loihi aren’t just an effort to write programs that mimic what humans can do; the goal is to copy aspects of our neurology as well. It makes their progress a bit more interesting.Feature Image Credit: Tim Herman/Intel CorporationNow Read:New Leak: Intel 10-Core Comet Lake CPUs Will Counterattack Ryzen 3000 FamilyIs Moore’s Law Alive, Dead, or Pining for the Fjords? Even Experts DisagreeIntel’s New Omni-Directional Interconnect Combines EMIB, Foveros Helen From ‘Waterworld’ Is 56 Now and Incredibly Gorgeous 10 Scientifically Proven Side Effects of Growing a Beardlast_img read more

first_imgBest Practices for Using LinkedIn Live Adrian FisherApril 22, 2019, 4:00 pmApril 17, 2019 LinkedIn recently announced LinkedIn Live, its version of live streaming. The option to broadcast real-time video comes 18 months after the professional social network introduced video to its site. According to TechCrunch, video has been the fastest-growing medium on its platform.LinkedIn Live provides a significant opportunity for people and organizations to broadcast live video to select groups on a more global scale. Live stream examples include sharing conferences, product announcements, behind-the-scenes tours, and conducting Q&As. For instance, a real estate agent could use LinkedIn Live to give clients a first-look inside available properties and answer any questions they may have about the property.Those who want to take part in the first roll-out of the live streaming tool will soon be able to apply via a contact form. As of now, it’s uncertain when LinkedIn Live will be available to its 600+ million users.Read More: Eye Rolls at Pre-Rolls: How to Escape the Trap of Annoying AdsWhat is certain is that it will be important for business professionals to be familiar with live streaming before trying the new feature. The sooner users can jump on LinkedIn Live, the better. As with any new marketing feature, early adopters will be at an advantage compared to those who arrive later to use the tool.Here are some best practices to keep in mind when using LinkedIn Live:Schedule and promote broadcasts in advanceRather than choosing to go live at the spur of the moment, professionals should carefully plan early on, picking a date and time to stream their live event. Additionally, it can be helpful to schedule live streams much like a broadcast TV show. Creating consistency gets the audience in the habit of seeking out content at the same time, whether it’s daily, weekly, or monthly.Planning in advance allows plenty of time for promoting the live stream. It’s imperative to publicize repeatedly before, during, and after the broadcast. Consider creating an eye-catching image to share all the details about the LinkedIn Live broadcast.Professionals should cross-promote the event on every platform possible. This includes via website and email newsletter, as well as other social channels such as Facebook and Twitter. Letting as many people as possible know about the event increases the likelihood of good live stream attendance.Pick an optimal timeWhen planning a live video, it’s important to consider not only the content that will be streaming but also the target audience. Which time zone are the majority of viewers in? When will they have time to view the content?Consider their locations and daily routines to come up with a time that would be suitable for them. If the time isn’t convenient, attendance could be less than ideal.Develop a plan for engagementUsers of LinkedIn Live should be prepared to engage with their audience and encourage viewers to participate. For instance, greet viewers by name as they arrive and ask them where they are from for a good ice-breaker. In addition to striking up a conversation, it’s important that hosts acknowledge incoming questions, which will further increase engagement.Leveraging subject matter experts that can answer viewer questions and provide excellent insight is an additional way to create engagement and valuable content for the audience. For example, real estate agents could host a Q&A with a mortgage loan consultant to offer lending advice to first-time homebuyers.If engagement is high, it’s best to consider placing someone in charge of monitoring questions and comments during the live stream. This person can pick questions to discuss on-air and make the streaming process less overwhelming. It’s also a good idea to put together a list of questions and talking points to be covered in case viewers are reserved and don’t immediately ask questions.Read More: 3 Ways Mobile Technology is Changing the Brick-and-Mortar ExperiencePractice ahead of timeJust because an event is live, doesn’t mean it should go unrehearsed. It’s essential for business professionals to rehearse, not memorize, and be very familiar with the content they are discussing.Guest speakers will also need to be prepared. Hosts can send a list of questions beforehand, but shouldn’t be afraid to deviate in order to provide the audience with valuable information they might need.Nothing is going to be perfect with live video, but practicing ahead of time will decrease the occurrences of any on-air mishaps and blunders.Test technical aspectsSince there are no second chances in live video, it’s very important to test the audio, video, and Internet connection to ensure everything works well. If viewers have difficulty hearing or seeing the stream, they may end up frustrated and leave the event.A reliable, high-speed Internet connection is essential for airing a successful live stream. Users should also have an ethernet cable on hand in the event that the wifi suddenly drops. In addition to performing technical tests using equipment and connection, lighting is also a crucial element to test before streaming.Video is one of the most engaging marketing tools, and with the launch of LinkedIn Live, it will only continue to rise in popularity. LinkedIn’s new video streaming feature presents a massive opportunity for business professionals to engage with their growing target audience. Keeping these best practices in mind will help them get the most out of their live streaming efforts.Read More: How AI will Change the Game for Influencer Marketing broadcastsEngagementhigh-speed InternetLinkedInLinkedIn LiveMarketing TechnologyPropertySimple Previous ArticleTechBytes with Ivaylo Bahtchevanov, Head of Data Science, ForgeRockNext ArticleA Guide to Understanding MarTech AI Lingolast_img read more

first_imgAuto distributor’s marketing platform to be powered by Acxiom’s Unified Data LayerAcxiom, the data and technology foundation for the world’s best marketers, announced that Southeast Toyota Distributors, the world’s largest independent distributor of Toyotas, has expanded its 15-year data relationship with the company.In an effort to create a unified and privacy-compliant view of their customers and prospects across channels while connecting its Martech and Adtech ecosystems, Southeast Toyota Distributors will utilize Acxiom’s award-winning Unified Data Layer (UDL) framework to power its marketing platform at the data layer. The resulting solution will enable Southeast Toyota Distributors to better understand their customers and prospects, have meaningful conversations with them at every point in their brand journey, and lower the company’s cost of acquisition while improving conversion.The path to auto purchase has changed in this digitally disrupted landscape. Consumers still visit dealerships, but the path also includes online research, reviews and comparison. While so much has changed, people have changed far less – they still appreciate good service, relevance, and being heard. This is fundamental to customer relationship management and requires recognizing and understanding the customer digitally and offline to deliver a frictionless, easy buying experience and provide an all-around satisfying ownership experience people desire.Marketing Technology News: Waze and Arrive Unveil Enhanced Trip Planner for Stadiums and VenuesCustomer expectations are higher than ever, with more data available than ever. Yet this data explosion is also coupled with more stringent regulations – it’s not easy to harness data and empower the great marketing technology that’s available. The Southeast Toyota Marketing Platform, powered by Acxiom’s UDL framework and IdentityBuilder, will connect the distributor’s relevant data across channels and technologies to provide a better understanding of their customers and prospects, powering more meaningful engagement wherever and whenever they connect. The solution includes a data environment for customers and leads data and includes the ability for dealers to verify the customer information so vital to delivering an enhanced experience. In addition, Southeast Toyota Distributors will now be able to connect digital data with offline data to optimize their marketing campaigns. Finally, the Southeast Toyota Marketing Platform also includes an analytics data mart, where the company can explore and fine-tune their up-sell, loyalty and new customer targeting strategies.“Southeast Toyota Distributors has been on a digital transformation journey to better enable a seamless experience to our existing customers and those considering a purchase,” said Sheri Gosselin, Director of Customer Journey at Southeast Toyota Distributors. “The Acxiom solution allows us to bring together all of our data and existing marketing and advertising technologies, like our onboarding provider, campaign management tool and DMP, into one activation center that has privacy-compliance built in. We’re able to continue to build on our capabilities without replacing things that are working well.”Marketing Technology News: Tata Elxsi is a Certified Widevine Partner, Selected as the System Integrator for Google Widevine CAS solutions“Expanding our 15-year relationship with Southeast Toyota Distributors is both rewarding and exciting,” said Steve Letourneau, VP, Strategic Growth at Acxiom. “The innovation we’ve achieved with our Unified Data Layer framework is particularly meaningful when a long-time client recognizes additional value Acxiom can bring to their marketing efforts. Acxiom has gained a lot of traction with UDL; from the launch of our UDL framework, we have successfully implemented 20 UDL solutions, and the UDL won a BIG Innovation Award presented by the Business Intelligence Group earlier this year. We are thrilled to bring this capability, along with our experience in identity resolution and expertise in ethical use of data, to our valued partners at Southeast Toyota Distributors, enabling them to navigate this disrupted digital landscape with relevance and respect, so every customer journey is a memorable one.”“Customer centricity begins with getting your data, and your data strategy, right,” said Chris Lanaux, CTO at Acxiom. “Acxiom’s UDL framework unifies data across channels and enterprise silos to deliver a holistic view of each customer, applying the necessary privacy governance through its privacy-by-design approach, while managing increasing complexity and delivering faster speed to value at lower cost. The solutions we implement utilize cloud-based architecture, allowing us to easily plug into our clients’ existing Martech and Adtech stacks, reducing rip and replace costs and accelerating the orchestration of data for key use cases.”Marketing Technology News: Shuttlerock Expands European Presence to Paris Southeast Toyota Distributors Expands Relationship with Acxiom Business WireJune 12, 2019, 7:48 pmJune 12, 2019 AcxiomadtechBig Innovation AwardmartechNewsSheri GosselinToyota Previous ArticleCreatorIQ Announces $12 Million Series B Funding Round By TVC Capital, Affinity Group, And Unilever Ventures For Its Enterprise Creator CloudNext ArticleHitachi Vantara Federal Welcomes Dr. Pragyansmita Nayak as New Chief Data Scientistlast_img read more

first_img AIAutomation ExchangeIoTmachine learningNews Previous ArticleBest Cities for Entrepreneurs: Small Business Trends Announces 2019 RankingsNext ArticleBenefitfocus June Software Release Unveils Tools and Functionality to Automate Benefits & Delivers Insights to Improve Consumers’ Lives Across Platform and Mobile App Cisco helps IT teams better understand network behavior and predict issues with new artificial intelligence and machine learning capabilities Cisco announces software innovations designed to make managing and securing networks easier. As today’s businesses increasingly invest in digital technologies, IT teams are struggling under the amplified workload. To alleviate this burden and allow IT to focus on delivering innovation, Cisco is introducing new artificial intelligence and machine learning capabilities to allow IT teams to function at machine speed and scale through personalized network insights. As part of its broadened capabilities offering, Cisco is also unveiling innovations to more effectively manage users and applications across the entire enterprise network – from campus networks and wide-area networks, to data centers and the IoT edge.IT teams currently face a daunting challenge. According to 451 Research, nearly two-thirds of organizations report that their IT teams are facing increased workloads; but increased IT headcount is in the cards for only about one-third of companies in the coming year. At the same time, it has never been more imperative for IT to deliver great digital experiences in this hyper-competitive landscape. Bridging the gap between the needs of a business and the resources available requires innovative network automation and analytics tools, powered by data and underpinned by artificial intelligence and machine learning.Cisco, as a leader in networking and security, collects one of the most well-informed, context-rich telemetry data sets in the IT industry. Now, Cisco is leveraging new software capabilities designed to utilize deidentified and aggregated data, which when combined with Cisco’s 35 years of institutional knowledge building the world’s networks, results in more intelligent solutions that allow IT teams to operate more effectively.Marketing Technology News: Forging MarTech with Big Data: Salesforce Eyes Tableau’s Big Data Expertise with $15.7 Billion DealThese new capabilities will grant IT teams:More Visibility: No two networks are the same. Environments are always changing. Cisco continuously collects relevant data from local networks and correlates it against the aggregate deidentified data set to create highly individualized network baselines. These baselines constantly learn and adapt as the number of devices, users and applications evolves, and as environments change.Greater Insights: Network complexity has grown beyond the human scale of processing. Cisco uses machine learning to correlate the immense amount of data coming from the network against the individualized network baselines to uncover the issues that will have the greatest impact on the network. This improves issue relevancy, alerting IT of the issues that matter most. It also discovers trends and patterns, so IT can pre-emptively identify issues before they become a problem.Guided Actions: Cisco uses machine reasoning algorithms and automated workflows to perform the logical troubleshooting steps that an engineer would execute to resolve a problem. This helps IT detect issues and vulnerabilities, analyze the root cause and execute corrective actions faster than ever.“As the pace of change and diversity of the environment continues to rapidly evolve, Cisco is committed to continually simplifying our solutions,” said Scott Harrell, Senior Vice President and General Manager of Cisco’s Enterprise Networking Business. “Artificial intelligence and machine learning can enable businesses to efficiently discern which issues to prioritize, becoming more nimble and proactive. This will have a profound effect on network operations and the IT teams that run them. At Cisco, we’re future proofing our networks and the workforce through automation and intelligence.”Marketing Technology News: Domo IoT Cloud Now Integrates with Zendesk Data Platform to Deliver Better Customer ServiceReducing Complexity with the Multidomain NetworkTo help customers simplify the unprecedented complexity of modern IT, Cisco is building an architecture that spans every domain of the intent-based network — campus, branch, WAN, IoT, data center and cloud.  Cisco has created solutions optimized to meet the unique needs of each of these networking domains. Today, Cisco is introducing new integrations, so users have a secure, consistent experience no matter where, when or how they connect. The new integrations allow for end-to-end:Network segmentation: The integration of Cisco SD-Access with Cisco SD-WAN and Cisco Application Centric Infrastructure (ACI) makes it easier for IT teams to consistently authorize, onboard and segment users and devices across campus, branch, data center and cloud networks, even when users and applications change. Because of this segmentation, IT is able to safeguard against unauthorized access to sensitive data and critical applications.Application experience: Cisco now automatically conveys application requirements between the data center and the WAN, allowing the network to select the best path and prioritize traffic even if applications move or change. This allows IT teams to dynamically elevate application performance across the enterprise and branch.Pervasive security: As an industry leader in cybersecurity, Cisco is leveraging its security innovations across all domains. By extending the ability to detect threats in encrypted traffic across public clouds, and by protecting the campus, branch and WAN against threats, Cisco is providing the end-to-end security customers need.Cisco’s Ecosystem Drives InnovationAs the network becomes increasingly programmable, Cisco’s ecosystem of partners and developers has been crucial to drive innovation. To help organizations keep up with the relentless pace of change, Cisco DevNet, the company’s developer program, has introduced community-backed efforts to make adopting networking technology easy and accessible. This includes machine learning and artificial intelligence developer resources, which include use cases and resources to get started with new applications; the Cisco DevNet Automation Exchange, which contains a curated repository of code for all levels of network automation use cases; and the Cisco DNA Center Platform, which helps networking professionals and software developers alike to build new applications and integrations.Marketing Technology News: ATX Adds OTT Video Streaming Capabilities to Media Distribution SolutionAvailability, Licensing and ServicesCisco AI Network Analytics will be a standard part of Cisco DNA Assurance and will be available in the next version of Cisco DNA Center, generally available summer of 2019. Cisco AI Network Analytics capabilities will be included in the Cisco DNA Advantage software licensing tier.The multidomain network integrations will be available with the next version of Cisco DNA Center, generally available summer of 2019. These integrations will be included in the Cisco DNA Advantage software licensing tier.Cisco Customer Experience for Cisco DNA solutions accelerates deployment of next-gen intent-based networking solutions while reducing risk and disruption. The Cisco Customer Experience portfolio of services delivers expert guidance, best practices and innovative tools to help customers transition with greater ease and confidence. This also allows them to innovate faster, stay competitive, extract more value and realize faster ROI.Marketing Technology News: Smartsheet Announces General Availability of Smartsheet Gov at AWS Public Sector Summit Cisco Explains the Benefits of Deploying AI and Machine Learning for IT and Business Ops PRNewswireJune 11, 2019, 4:53 pmJune 11, 2019 last_img read more

first_imgTransPerfect’s Tech Division Simplifies Multilingual Content Management for Salesforce UsersTranslations.com, the technology division of TransPerfect, the world’s largest provider of language and technology solutions for global business, announced the launch of its new GlobalLink Connect integration for Salesforce Marketing, Service, Commerce, and Knowledge Clouds.The company will demo these integrations as well as other modules in the GlobalLink suite of translation management technologies at Salesforce Connections, Salesforce’s digital experience conference taking place June 17–19 in Chicago.Since 2011, GlobalLink Connect for Salesforce has provided global marketers and Salesforce users with a simple, end-to-end solution for easily launching and maintaining multilingual content—all without ever leaving the Salesforce platform. More than 50 companies use GlobalLink Connect integrated with their Salesforce instance to create and streamline their multilingual customer experiences.Marketing Technology News: Vidyard Expands Offering to Bring Personalized Video App to Any Sales Professional, No Matter How They WorkOn average, organizations save 50–70 percent time to market and overall costs on launching and maintaining digital content in multiple languages with GlobalLink.Key features of GlobalLink Connect for Salesforce include:Translation workflow automationSite and content change detectionSearchable intuitive dashboardVanity link in-language optimizationAI-powered localizationContent fragments supportSupport for non-standard Salesforce site structuresMarketing Technology News: AdQuick.com Releases Campaign Genius, so Marketers can Plan and Optimize Out of Home (OOH) Advertising Campaigns in MinutesBenefits of the integrated solution to joint customers include:Faster connector implementationReduced or eliminated IT dependencyExpedited deployment timelines for global contentLower project management costsLower translation costsTransPerfect President and CEO Phil Shawe commented, “By releasing these four new Salesforce Cloud integrations, our shared clients will enjoy the ability to more effectively manage the in-language experience they deliver to their customers while continuing to manage all content through their familiar Salesforce interface.”Marketing Technology News: Nami ML Emerges from Stealth to Unveil the Future of Mobile App Subscriptions Translations.com Debuts Four New Salesforce Cloud Integrations For GlobalLink Translation Management System PRNewswireJune 17, 2019, 2:19 pmJune 17, 2019 cloudGlobalLink ConnectNewsPhil ShaweSalesforceTranslation Management SystemTranslations.com Previous ArticleDeloitte’s Heat Launches Artificial Intelligence Practice ‘Heat AI’Next ArticleAkamai Introduces the Edge Cloud Solution, Designed to Scale, Secure and Simplify IoT Connected Device and In-Application Messaginglast_img read more

first_imgDeluxe Is Transforming With Salesforce to Improve Customer Insights, Ignite Innovation and Reach Its Diverse Customer Base With Highly Relevant Products and ServicesDeluxe Corporation, a Trusted, Tech-Enabled Solutions Company, announced an expanded agreement with Salesforce, the global leader in CRM, to accelerate Deluxe’s go-to-market strategy and improve customer engagement by getting a 360-degree view of customers across its entire business.“Deluxe truly understands the importance of innovation and digital transformation to meet customer demands”Founded in 1915, Deluxe serves millions of small business, banking and enterprise customers, providing everything from printed products to websites, logos and payroll, AI-enabled payment processing to receivables management solutions and more. With this broad portfolio, Deluxe has accumulated customer data from multiple sources, varied across legacy tools and systems.As the company prepares for the next 100 years, it is focused on digital transformation and fundamentally changing its go-to-market strategy. This includes expanding its decade-long partnership with Salesforce, enabling Deluxe to better leverage its customer data to gain a holistic understanding of its customers across multiple business segments and deliver highly relevant products and services.Marketing Technology News: Creator by Zmags Brings Greater Agility to Ecommerce Creativity“Deluxe is transforming from a company known for traditional manufacturing and check printing to a tech-enabled solutions company,” said Mike Mathews, Chief Information Officer of Deluxe Corporation. “By expanding our existing relationship with Salesforce to include all aspects of its cutting-edge CRM platform, we will be able to provide our more than five million customers with an incredible and growing product portfolio tailored to their needs. The ability to have a single view of our customers is a game changer for Deluxe.”In partnership with Salesforce Success Cloud advisory services, Deluxe is consolidating its customer service, direct and indirect sales, digital commerce, analytics and marketing systems onto a single CRM platform. This will offer Deluxe unprecedented insight into its diverse customer base and the ability to cross-sell and up-sell products and services best suited to each customer.Marketing Technology News: Evolution Digital and Vast Broadband Announce Agreement for Full App-Based TV Offering with eMERGE User Experience“Deluxe truly understands the importance of innovation and digital transformation to meet customer demands,” said Dave Justice, Executive Vice President at Salesforce. “Deluxe will now be able to access the full power of Salesforce to engage their customers and partners in a whole new way.”As part of this long-term agreement, Deluxe and Salesforce will also collaborate to provide mutual small business customers with innovative product solutions, including Deluxe’s growing portfolio of Small Business Solutions and Salesforce Essentials. More details on the partnership will be communicated in the Fall during Deluxe’s appearance as a speaker at Salesforce’s annual event, Dreamforce, the world’s largest software conference.Marketing Technology News: Amperity and Snowflake Partner to Help Joint Customers Power Customer 360 Initiatives Deluxe Corporation Strengthens Existing Partnership With Salesforce to Accelerate Its Go-To-Market Strategy and Customer Engagement Business WireJuly 3, 2019, 12:47 pmJuly 3, 2019 crmDave JusticeDeluxe CorporationMarketing TechnologyNewsSalesforceTech-Enabled Solutions Previous ArticleHitachi High-Tech Group to Lead Japanese Distribution of SparkCognition’s Automated Machine Learning Modeling Product, DarwinNext ArticleTechBytes with Christopher Mohs, VP Strategy and Ops at Cora + Kristlast_img read more

first_img Appleapple eventapple event 2019Apple iPhone Launch First Published: June 24, 2019, 7:43 PM IST | Edited by: — Apple is all set to launch its 16-inch MacBook Pro in September this year, media reported on Monday. “We foresee that Apple will release a new product in September 2019 Apple event if there’s no unexpected development issue,” said Jeff Lin, Associate Director of Consumer Electronics at IHS Markit, reported The Verge. The upcoming MacBook Pro is said to feature an LCD panel from LG display with a resolution of 3072 x 1920, which is better then the current high-end model’s 15.4-inch 2880×1800 display. In an earlier report, famed Apple analyst Ming-Chi Kuo spoke about the launch of new Apple devices. Kuo stated that the company might launch a new iPad with 10 or 12-inch screen in late 2020 or early 2021 and a MacBook with 15 to 17-inch screen size in the first half of 2021 equipped with mini-LED panels. Kuo has also previously claimed that two new iPad Pro models will enter mass production between the fourth quarter of 2019 and the first quarter of 2020. last_img read more

first_img achanta sahrath kamalbegusarai-s04p24chhindwara-s12p16Dimple Yadav First Published: April 28, 2019, 9:53 PM IST New Delhi: While last time it was about political heavyweights battling for repute in their constituencies, the fourth phase of Lok Sabha election, constituting 72 parliamentary constituencies across nine states, will witness promising first-timers throwing down the gauntlet.Campaigning for the fourth phase of polling came to an end on Saturday. Polling will be held in 17 seats in Maharashtra, 13 each in Rajasthan and Uttar Pradesh, eight in West Bengal, six each in Madhya Pradesh and Odisha, five in Bihar, three in Jharkhand and a part of the Anantnag constituency in Jammu and Kashmir.The stakes are high for the ruling BJP and its allies as it had swept 56 of these seats in 2014, leaving just two for the Congress and the rest for other opposition parties such as the Trinamool Congress and Biju Janata Dal.The fate of 961 candidates, including Union ministers Giriraj Singh, Subhash Bhamre, SS Ahluwalia and Babul Supriyo of the BJP and former Union ministers Salman Khurshid and Adhir Ranjan Chowdhury of the Congress, will be decided by about 12.79 core voters in this phase.Among other key contestants in the fray are Kanhaiya Kumar (CPI), Baijayant Panda (BJP), Urmila Matondkar (Congress), Dimple Yadav (Samajwadi Party), Satabdi Roy (TMC) and Milind Deora (Congress).Prime Minister Narendra Modi, BJP chief Amit Shah, Congress president Rahul Gandhi and a host of Union ministers among others canvassed for their party candidates over the past few days, undertaking whirlwind tours of the constituencies.In Maharashtra, where election will come to end with this phase, the opposition Congress is facing a tough task of reclaiming its lost base in north Maharashtra and Mumbai, while the NCP is trying to get a foothold in Thane district and western Maharashtra. The BJP and its ally Shiv Sena had won all 17 seats in 2014.During the canvassing, which mainly remained centred around issues such as nationalism and agricultural distress, Prime Minister Narendra Modi tried to woo rural as well as urban voters by highlighting infrastructural and development work done under his rule.For his part, Congress president Rahul Gandhi tried to project the Congress’ proposed minimum income guarantee scheme ‘NYAY’ as a game-changer for the poor.In Rajasthan, where the BJP had won all the seats in 2014, the Congress appeared to make a comeback, forming the government in the state with a narrow majority after last year’s Assembly election.In Uttar Pradesh, most of these 13 seats are seeing a direct fight between the BJP and SP-BSP alliance with Kannauj being a matter of prestige for the SP.In 2014, the BJP won 12 of these 13 seats in the state. Only Kannauj, won by the Samajwadi Party, defied the Modi wave that year among them. Former chief minister Akhilesh Yadav’s wife Dimple is seeking re-election from the seat.The Congress has a good presence in at least three of the constituencies — Unnao (Annu Tandon), Farrukhabad (Salman Khurshid) and Kanpur (Sriprakash Jaiswal).In Odisha, electioneering had reached a feverish pitch for this phase as a galaxy of leaders from parties such as the BJP, Congress and the ruling Biju Janata Dal (BJD) undertook tours of the constituencies, mostly in the coastal belt. This will be the final phase of polling in the state.Prominent among the hopefuls include BJP national vice-president Baijayant Panda (Kendrapara) and state Congress president Niranjan Patnaik (Bhandaripokhari). Polling will also be held in 41 Assembly seats in Odisha in this phase.In Bihar, the BJP and its allies are looking to retain all the five seats in the face of a spirited fight put up by the RJD-Congress alliance.The cynosure of all eyes in this phase, however, is the Begusarai seat which will witness an electrifying contest between the political Left and the Right with CPI debutant Kanhaiya Kumar taking on firebrand BJP leader Giriraj Singh.Monday’s voting in three constituencies will be the first phase in the BJP-ruled Jharkhand. Addressing poll rallies in Jharkhand this week, a host of top BJP leaders, including Modi and Shah, appealed to the people to re-elect the NDA to take forward the development work and protect the country.No prominent national-level leaders of opposition parties campaigned in the three seats — Lohardaga (ST), Chatra and Palamu (SC) — in the run-up to the election.In West Bengal, all the eight seats, which are spread across four districts, will see a four-cornered contest between the Trinamool Congress, BJP, Congress and Left Front.Electioneering in Kulgam district, which is part of Anantnag Lok Sabha constituency, remained by and large peaceful.The constituency is spread over four districts of Anantnag, Kulgam, Shopian and Pulwama with 16 Assembly segments. The Lok Sabha election to this constituency is being held in three phases due to security reasons.In all the six seats of Madhya Pradesh, a direct fight between the Congress and BJP is expected. Chief Minister Kamal Nath’s son Nakul is the Congress candidate from Chhindwara Lok Sabha seat.The by-election to the Chhindwara Assembly constituency where Kamal Nath is in fray will also be held on Monday.Election to 542 Lok Sabha seats is being conducted in seven phases between April 11 and May 19. Election in Vellore constituency in Tamil Nadu has been cancelled following excess use of money power.In the first three phases, voting has been held in 302 Lok Sabha constituencies apart from Anantnag. Results will be declared on May 23. last_img read more

first_imgKolkata: The eight constituencies of Tamluk, Kanthi, Ghatal, Jhargram, Medinipur, Purulia, Bankura and Bishnupur will go to polls in the latest phase in the state. Of these, a few are the once-dreaded areas populated by Maoists. While Birbhum voted in the fourth phase on April 29, Purulia, Bankura, Midnapore and Jhargram will vote on Sunday. However, currently only Jhargram constituency is categorised as Maoist-affected after the central government removed 44 such districts, including West Midnapore, Purulia, Bankura and Birbhum, from its list last year.The red corridor now comprises 90 districts in 11 states as opposed to 126 districts earlier. Junglemahal, known as the Maoist belt, comprises five Lok Sabha constituencies. But today, it is seen as a peaceful area, with no recent incidents of Maoist activities reported. However, this does not mean that security forces have lowered their guard in the upcoming elections. “With 22 years work experience in Left-Wing Extremist (LWE) areas, and having conducted several elections in these troubled parts, I can say that the forces should be on high alert on the eve of polling day and on D-day,” said Raveendran Sankaran, Inspector General of Police of CRPF, West Bengal sector. “Just because nothing has happened in the past few years, one cannot afford to be complacent. If you are complacent, the enemy shall strike. An undercurrent does prevail along the borders of Jharkhand, Odisha and Bengal.”According to the official, there is pressure as arms and ammunition have been recovered and Maoist leaders arrested by the Jharkhand Police and central paramilitary forces over the last two years. In a bid to escape, the Maoists try to enter West Bengal, keeping security forces on alert.At least 638 companies of central paramilitary forces from across the country are being deployed in the sixth phase. They will be briefed by local security personnel, including superintendents of police of the areas under their jurisdiction. “My area of jurisdiction is the triangular belt of Jharkhand, Orissa and West Bengal. We are alert and working with the state police to prevent an untoward situation. Apart from ensuring free and fair elections, my other concern is the safety of polling parties and security forces,” added Sankaran. 2019 lok sabha electionsJunglemahalMaoist areas West BengalWest Bengal First Published: May 8, 2019, 8:36 PM ISTlast_img read more

first_imgScreenshot from Kartik Aaryan’s Instagram account Screenshot from Kartik Aaryan’s Instagram accountSara and Kartik were first linked up before the former’s debut film Kedarnath’s release. While appearing on Koffee With Karan, Sara had jokingly admitted that she had a crush on Kartik. Since then, gossip news have pegged the two as a couple, who are supposedly dating under the radar. Pictures of Sara and Kartik from the sets of Love Aaj Kal sequel are also going viral on social media and the two are often spotted hanging out together. Both Sara and Kartik are yet to spill the beans on their relationship status as of now.Follow @News18Movies for more A sequel to 2011 hit comedy film Dostana (2008) was annouced by filmmaker Karan Johar on Thursday, with lead actors Kartik Aaryan and Janhvi Kapoor. Karan also informed that Dostana 2 will also feature another male actor, alondside Kartik, whose name was not revealed by the former while announcing the film. As soon as the news surfaced on social media, hearty congratulations started pouring in for Kartik, and Janhvi, from all quarters but Sara Ali Khan’s response to the news is unmissable.Sara, who is working with Kartik in the sequel to romance-drama film Love Aaj Kal (2009), took to Instagram to share her excitement over Dostana 2’s announcement. Commenting to Kartik’s post about the upcoming film, Sara wrote, “Congratulations it’s going to be lit,” as she used a fire emoji to accompany her post. Responding to Sara’s reply, Kartik simply made a heart emoji, forcing us to wonder whether his reaction was to Sara’s excitement or otherwise. See the exchange of pleasantries on Instagram here:center_img ananya pandayDirector Imtiaz AliDostana 2imtiaz ali First Published: June 28, 2019, 2:12 PM ISTlast_img read more

first_imgThis week, Tom Cruise surprised his fans when he released the trailer of Top Gun: Maverick, the much-awaited sequel to his military action film Top Gun after a gap of 34 years.Bollywood also treated its fans an action-packed trailer of War, starring Hrithik Roshan and Tiger Shroff, fighting in snow, fields and air. Also, Taylor Swift took a step forward to proclaim her love for cats as she draws out her claws in the recently released trailer of Cats. From Bollywood, Hollywood and streaming giants, here are top 5 trailers of the week that you shouldn’t miss.Top Gun: MaverickTop Gun roared back when Tom Cruise revealed the first trailer of the much-awaited sequel to his military action film. Top Gun: Maverick, which is due for release in June 2020, sees the return of Cruise’s fighter pilot avatar more than 30 years after the original movie. The sequel picks up decades after the 1986 box-office hit and features actor Miles Teller as the son of Anthony Edwards’ pilot Goose, who is killed during a training exercise in the first movie.WarYash Raj Films has released the teaser of War, a film with Hrithik Roshan and Tiger Shroff going full throttle on each other. War is set to be a visual spectacle for quintessential action cinema lovers as they would witness Hrithik and Tiger pull off jaw-dropping sequences as they try to beat each other. The action entertainer will see Hrithik and Tiger pitted against each other in a ferocious showdown.Mission MangalAkshay Kumar has assembled his team of talented scientists to work for ISRO for a nearly impossible task. The film follows the story of a group of ISRO (Indian Space Research Organisation) scientists, who are on a mission to put India on the map of countries who have landed on Mars. But the team has all sorts of hindrances in establishing its space power. However, Kumar leads the team to reach supremacy at any cost.CatsThe star-laden movie version of hit stage musical Cats released its first trailer this week. The film features Taylor Swift in her first film role, along with Jennifer Hudson, Judi Dench, Ian McKellen, Idris Elba and James Corden. The film uses the actors’ faces and covers their bodies in computer-generated fur as they sing and dance on a larger than life set.Casa de Papel (Money Heist)Hugely popular Spanish series Casa de Papel (Money Heist) is finally out with its season 3. This Spanish crime based thriller is the most-watched non-English language series on the Netflix. The series will pick up right after two years of Spanish mint robbery. As the first two parts of the series dealt with the heist and the fall-out of it, the upcoming season will witness the gang coming together to save Rio from the authorities.For fresh trailers and latest movie updates check back here next week. Akshay KumarBollywood Film TrailersBollywood movie trailersBollywood trailers First Published: July 21, 2019, 11:41 AM ISTlast_img read more