• Home
  • Tag: 杭州”品茶”上课群

GAA PRESIDENT GETS SPECIAL WELCOME AT SCOIL CHOLMCILLE

first_imgCholmcille Football & Hurling Team Guard of HonourPresident of the GAA Liam O Neill has been given a warm welcome at Scoil Cholmcille Letterkenny as part of his promotion of Ulster Féile 2014.The President took part in a short Q&A with 5th and 6th class pupils.Scoil Cholmcille football and hurling teams formed a Guard of Honour to welcome him to the school. Sean Boyle, President of St Eunan’s GAA club, Paul Carr Chairman of St Eunan’s GAA Club were in attendance as well.And of course Mr Rory Kavanagh, County player and teacher along with Mr Paraig Cannon sincerely welcomed the GAA President.Mr O’Neill entertains some teachers…including county star RoryPaul Carr- Chairman St Eunan’s GAA club/Charlie McAteer-Secretary St Eunan’s GAA club/Sean Boyle-President St Eunan’s GAA club.Liam O Neill-President GAA/Paraig Cannon-Principal/Sean Boyle-President St Eunan’s club/Rory Kavanagh-County Player & Scoil Cholmcille teacher.   GAA PRESIDENT GETS SPECIAL WELCOME AT SCOIL CHOLMCILLE was last modified: May 13th, 2014 by John2Share this:Click to share on Facebook (Opens in new window)Click to share on Twitter (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on Reddit (Opens in new window)Click to share on Pocket (Opens in new window)Click to share on Telegram (Opens in new window)Click to share on WhatsApp (Opens in new window)Click to share on Skype (Opens in new window)Click to print (Opens in new window) Tags:GAA presidentLiam O’Neillscoil cholmcilleSt Eunan’s GAA clublast_img read more

Ohio Ag Weather and Forecast — April 18, 2018

first_imgShare Facebook Twitter Google + LinkedIn Pinterest 180418_RyanMartinSun this morning will be followed by increasing clouds this afternoon as low pressure moves into east central IN by early to mid-afternoon. This low will bring moisture back into Ohio later this afternoon and then we see action holding through evening, overnight and into tomorrow morning. Moisture has about 60% coverage, and will be most significant over the northern half to third of the state. Moisture does not look that impressive, still under a quarter of an inch for the most part, although a few locations may push closer to a third. Liquid precipitation is expected through evening but temps fall tonight, meaning after midnight we may be able to see some mixing or change over to light wet snow. We do not expect any problems, and the wet snow will be limited in coverage. Precipitation in generally will mostly be over the northern half of the state and we can see the best wet snow chances tonight and tomorrow morning mostly near the lake. Temps do not look to fall off too far overnight, and that will help keep snow at a pretty low threat.We dry down and see clouds break up tomorrow afternoon and se should see sunshine in full force ahead of sunset. We then keep a dry pattern in our forecast dry for Friday through the weekend and through a good chunk of next week. For us in Ohio, the key day to watch will be Tuesday…mostly in the afternoon. The storm complex that we have been watching continues to fall apart. At this point, we don’t want to take action completely out, because we can see a few scattered showers over about 40% of the state. But, we are talking moisture of a tenth of an inch or less in that 40% coverage zone…which is down significantly from earlier this week. There is a good chance that most of us miss the action Tuesday. If that turns out to be the case, we will have a nice, long dry window emerging, as our next batch of moisture probably holds off until late on Friday night or next Saturday. So, keep your fingers crossed!There is still a good chance of moisture with a strong system around the 28th into the 29th. Moisture totals are not as impressive this morning, but we still are leaving the door open to some rains from .25”-1” over 70% of the state. Then we have an unsettled finish to the 11-16 day forecast window. Models are unsure how to handle moisture, but we do expected at least one more strong front between the 2nd and the 4th. The front likely has some strong to severe weather potential and can bring rains up to 1”. Timing is the main uncertain part to precipitation in early May.Temperatures likely do not get quite as cold as what we saw Monday again. However, we are still projecting a mostly below normal temperature profile through the end of the month. A couple of moderating days will be in there, but generally, we stay cool. Keep in mind, normal temps are rising, rather rapidly this month, as we pointed out before…but still, we do not see any significant above normal warming coming for at least several more weeks.last_img read more

Weekly Wrapup: The ReadWrite Real-Time Web Summit

first_imgTop Reasons to Go With Managed WordPress Hosting Structured DataThe Real-Time WebPersonalizationMobile Web & Augmented RealityInternet of ThingsWorld’s Largest Paid Blogging Platform Goes Real-TimeTypepad, the SixApart-owned paid blogging service believed to be larger than any other online, announced this week that every one of its blogs will now make updates available in real time. A fast-growing number of sites around the web are now flying the real-time banner, so blogging could steal a little thunder back from immediacy-rich social networks like Facebook and Twitter. The Dirty Little Secret About the “Wisdom of the Crowds” – There is No Crowd Recent research by Carnegie Mellon University (CMU) professor Vassilis Kostakos pokes a big hole in the prevailing wisdom that the “wisdom of crowds” is a trustworthy force on today’s web. The findings showed that a small group of users accounted for a large number of ratings. In other words, small but powerful groups can easily distort what the “crowd” really thinks. VC Series A Web Tech Deals in August This week was the anniversary of the Lehman Brothers collapse, which triggered the financial meltdown. That was when ReadWriteWeb started tracking Series A deals in Web technology. Executive summary for August: down from July, with seed deals very weak. Analysis: decadent Europeans are not the only ones who take holidays in August. Read on for details.SEE MORE WEB TRENDS COVERAGE IN OUR TRENDS CATEGORYA Word from Our SponsorsWe’d like to thank ReadWriteWeb’s sponsors, without whom we couldn’t bring you all these stories every week!Mashery is the leading provider of API management services.Domain.ME, the official registry for all .ME Domains.Codero, Dedicated Hosting with Backup & Managed Services.Groupsite.com, How Groups Make Things Happen.Crowd Science gives you detailed visitor demographics.hakia is a semantic search engine.Rackspace provides dedicated server hosting.Aplus provides web hosting services for small business hosting needs.MediaTemple provides hosting for RWW.SixApart provides our publishing software MT4. Related Posts Why Tech Companies Need Simpler Terms of Servic… In this edition of the Weekly Wrapup – our newsletter summarizing the top stories of the week – we announce our first event: The ReadWrite Real-Time Web Summit on October 15th in Mountain View, California. It’s a 1-day event that will bring together some of the smartest minds doing real-time work for an industry-changing, face-to-face conversation. Also this week we look at which ‘light blogging’ service is the most popular, tell you how to fix your Facebook privacy settings, analyze web tech VC trends in August, and more. We also check in on our two new channels: ReadWriteEnterprise (devoted to ‘enterprise 2.0’ trends and products) and ReadWriteStart (dedicated to profiling startups and entrepreneurs). Subscribe to Weekly WrapupYou can subscribe to the Weekly Wrapup by RSS or by email (form below).RWW Weekly Wrap-up Email Subscription form: 5 Easy Steps to Stay Safe (and Private!) on Facebook When the President of the United States warns schoolchildren to watch what they say and do on Facebook, you know that we’ve got a problem. People everywhere are mindlessly over-sharing on the world’s largest social network, without a second thought as to who’s reading their posts or what effect it could have on them further down the road. But what can be done? It’s not like you can just quit Facebook, right? No – and you don’t have to either. You just need to take a few precautions. Google Acquires reCAPTCHA to Fight Spam and Improve Google Books OCR Google announced this week that it has acquired reCAPTCHA, one of the leading providers of CPATCHAs, the hard-to-read puzzles you often have to solve before you can sign up for a new web service. Google is looking at reCAPTCHA as a way to improve the optical character recognition (OCR) software it uses for large scale text scanning projects like Google Books and the Google News Archive Search.Making Search Prettier: Bing Launches Visual Search Since Microsoft launched Bing, the company has been trying to position it as a ‘decision engine’ and not just as another search engine. This week, Microsoft took another step in this direction with the launch of Visual Search in Bing. For a growing number of searches, instead of giving users a list of 10 blue links, Bing will now give users the option to visualize the search results on a 3D grid with icons or photos.SEE MORE WEB PRODUCTS COVERAGE IN OUR PRODUCTS CATEGORYThat’s a wrap for another week! Enjoy your weekend everyone. richard macmanus Announcing the ReadWrite Real-Time Web Summit Tags:#web#Weekly Wrap-ups A Web Developer’s New Best Friend is the AI Wai… ReadWriteWeb is pleased to announce our very first event, The ReadWrite Real-Time Web Summit on October 15th in Mountain View, California. It’s a 1-day event that will bring together some of the smartest minds doing real-time work for an industry-changing, face-to-face conversation. In conjunction with the Summit, we’ll be releasing our second original premium research report in October. Registration is now open for the The ReadWrite Real-Time Web Summit, we hope to see you there!Web TrendsReadWriteWeb’s Top 5 Web Trends of 2009 Last week we ran a series of posts outlining the 5 biggest Internet trends of this year: Structured Data, Real-Time Web, Personalization, Mobile Web / Augmented Reality, Internet of Things. Effectively this was ReadWriteWeb’s State of the Web 2009. We’ve now compiled the main points into a single presentation, available on Slideshare and embedded below. You can view the presentation in full screen by clicking the “full” button at the bottom of the presentation. You can also download the presentation as a Powerpoint file. All of the links in the presentation are clickable, should you wish to explore a certain topic more. 8 Best WordPress Hosting Solutions on the Market ReadWriteEnterpriseOur channel devoted to ‘enterprise 2.0’ and using social software inside organizations. Adobe Acquires Omniture: It’s All About the Revenue ModelAdobe is looking to stall falling sales and profit by entering into a new market: analytics. But rather looking to R&D, Adobe is instead coughing up $1.8 billion for analytics leader Omniture. This is the largest acquisition by Adobe since the purchase of Macromedia for $3 billion in 2005.The acquisition has puzzled many, since Adobe and Omniture products really have no natural cooperation. There have been comments about the measurement capabilities that Omniture will give to content built with Adobe products. But in the end the entire deal revolves around two words: recurring revenue.ReadWriteStartOur channel ReadWriteStart, sponsored by Microsoft BizSpark, is dedicated to profiling startups and entrepreneurs.Going Viral in 6 Questions, Part One: Spymaster Many web apps claim virality; very few actually find it. In a new series exploring the anatomy of truly viral apps, our first specimen is Spymaster, the Twitter- and Facebook-based social game that exploded with tens of thousands of users within hours of the creators throwing up a simple page and absolutely no media coverage. From creating addiction to managing site traffic, read on to learn how they did it and what they’re doing next.SEE MORE STARTUPS COVERAGE IN OUR READWRITESTART CHANNELWeb ProductsPoll: Which Light Blogging Service Do You Use? This week we reported that Posterous, a popular minimalist blogging service, had added the ability for its users to import their Tumblr content. Tumblr is a competing ‘light blogging’ service – the market leader in fact. Other similar services include Soup.io, Noovo, Vox, Profilactic and even WordPress.com and Blogger.com are used for this purpose (although they’re more used for long-form blogging).last_img read more

Obama and Romney Should Quit Worrying About China And Start Worrying About Education

first_imgIn the presidential debates both candidates focused much of their energy on job creation and the future of America. They missed the third part of that equation, namely, the role immigrant entrepreneurs play in economic growth—and why the exodus of these highly-educated workers is a cause for alarm. (I covered this topic in my book The Immigrant Exodus: Why America Is Losing the Global Race to Capture Entrepreneurial Talent.) But even beyond the obvious, Obama and Romney are missing a number of larger trends that need to be understood in order to plan effective policies. China Is Not The Real IssueFirst, they both have seemed to be focused on nailing China up as a currency manipulator. This may have been an issue in the past, but is going to become decreasingly important. That’s because China is well down the path to Japanification. The central government has bet the farm on last-generation technologies in solar, transportation, and batteries.Beijing has flooded the economy with infrastructure projects and financing for construction. Now this is coming home to roost with rampant inflation and soaring wages. Already factory jobs are leaving China for cheaper locales like Vietnam and Bangladesh. So Mitt and Barack, please forget about China. That’s the wrong target.Instead, focus on our education system. The U.S. education system is actually quite underrated. The university system remains, despite all the cutbacks, the envy of the world. And our public education system, for all its faults, continues to turn out high quality graduates.But we are in the midst of a revolution in education. Technology has eliminated the need for students to sit and listen to teachers deliver subject matter. Lectures and exercises can be pursued at home, on tablets or PCs, at a student’s own pace. Instead, class time will be used for Socratic study, with teachers answering questions and serving as guides and consultants. Rebooting EducationThis is a far more efficient way to learn, and numerous startups are jumping on this bandwagon. The question is, how long will it take the U.S. government to get a clue and push down reforms around these new self-paced, Socractic learning methods—replacing the now archaic and largely failed “No Child Left Behind” policies which have shackled schools to arbitrary testing regimes that largely measure rote memorization.Simultaneously, the rise of the “DIY” and Maker generation will allow students to delve deeper and deeper into functional problem solving as part of education. Yes, chemistry kits have always been available as have model rockets. But today an ambitious high schooler can download Arduino, code up some novel software, and have a unique UAV, or a remote controlled robotic vacuum cleaner. Supporting and encouraging functional, creative learning will help secure our national future.A New Kind Of ManufacturingThis also ties into another trend that the candidates have missed — micro and regional manufacturing. Rapid improvements in 3D printing are shrinking the factory to the size of a desktop, blowing up the old advantages of economies of scale. By removing labor from the equation and enabling assembly of small complex objects from CAD files, 3D printing will enable an explosion of boutique manufacturing and unprecedented creativity. What’s more, 3D printing will actually fuel the ongoing revival of big-ticket manufacturing in America.One of the reasons that Apple builds in China is because all the key fabrication shops and parts suppliers are now over there after the U.S. manufacturing sector hollowed out in Silicon Valley and other technology centers. But when Johnny Ive wants a new enclosure mockup and he can get it from his own desktop or from a high-end 3D printer at a custom fabrication facility, then all of a sudden the benefits of having the people who makes screws and touch screens in the same city goes away because those items can quickly and easily be fabbed anywhere.Beyond old-line products, these printers will be used for genetic material manufacturing and personalized medicine, medical device manufacturing, micro-solar arrays, and even home building, to name a few. What does this have to do with Romney and Obama? 3D Printers, 2D RegulationsThis new style of manufacturing will demand a new, lightweight set of regulations. Just as small farmers have struggled to meet food safety guidelines that larger foodcos can easily digest, small manufacturers using super-clean 3D printing technology could struggle with regulatory burdens born by large factories.Neither Romney nor Obama seems to have given much thought to the future of manufacturing and that’s not a good thing because the U.S. Federal Government should start crafting economic policies (not subsidies but regulatory changes) designed to suit next generation pint-sized, high-powered factories. Granted, our two candidates have a lot to talk about in other areas. But the truth is, nothing else matters if the U.S. economy continues to sputter and growth remains stunted. In that same vein, nothing else matters if our education system fails to produce world-beating graduates (and attract the world-beating immigrant scholars) that have made America the reigning global hegemon.Focusing scarce energy and political capital on the ghost of China past does not serve our future nor does it provide a viable economic solution to our current woes. America has always won by focusing on the future and clearly seeing where the ball is bouncing, not where it was on the last play. Let’s hope our candidates can refocus forward in time to make the shifts required to keep growing our economy and pay for our profligate past while securing the future for our children and their children. Vivek Wadhwa is a Fellow at Stanford Law School and VP of Innovation and Research at Singularity University. Follow him on Twitter: @wadhwa.Image courtesy of Shutterstock. Serverless Backups: Viable Data Protection for … vivek wadhwa Tags:#China#education#manufacturing Related Posts center_img Top Reasons to Go With Managed WordPress Hosting Cloud Hosting for WordPress: Why Everyone is Mo… How Intelligent Data Addresses the Chasm in Cloudlast_img read more

6 technologies you need to know to secure your IoT network

first_imgAI: How it’s Impacting Surveillance Data Storage Follow the Puck Alisia Watson Tags:#api#Big Data#data security#featured#Internet of Things#IoT#IoT networks#top Alisia Watson is a brand strategist at My Ultimate Success Tips and Open Sky News. According to Gartner forecast, there are 8.4 billion internet-connected IoT devices in use currently and most new business systems and business processes will incorporate IoT. Ericsson Mobility report predicts that the number of IoT connected devices will reach 28 billion marks globally by 2021 and it would surpass the number of mobile devices. Cisco estimates endorses that point as they predict that there would be 3.4 connected devices per person by 2020. All these statistics shows why IoT is the hottest emerging technology and it has a bright future ahead. Even businesses have started taking IoT seriously and are looking to maximize their efficiency by using internet of things. We might see a significant increase in investments in the field of internet of things.See also: Vint Cerf sees big IoT security issues in our futureEvery coin has two sides. Similarly, emerging technologies also have their drawbacks. One of the biggest downside of internet of things (IoT) is security and privacy because online privacy was never so exposed. Recent IoT breaches are a testament to that and many security professionals thinks that this trend will continue and we will see an increase in IoT attacks. In this article, you will learn about six technologies that will help you secure your IoT network.#1: IoT Network SecurityUnlike traditional networks, it is much more challenging to secure an IoT network. The reason is that there is wide range of communication protocols, standards and devices involved, which makes things more complex. Hackers will try to attack the network because it gives them the control of all the IoT devices in the network. Use antivirus, firewalls and other intrusion detection and prevention system to secure the IoT network and prevent any intrusion.#2: AuthenticationAnother way to secure your IoT device from attacks is through authentication. Users have the options to go for simple authentication or complex and much more secure authentication in the form of two-way authentication, digital certificates and biometrics. Unlike traditional authentication methods, which require presence of human being, IoT authentication does not require human intervention for authentication purposes most of the time because it is mostly embedded sensors and machine-to-machine interaction in IoT. Therefore, you will have to go in with a different mindset when authenticating IoT devices.#3: EncryptionEncrypting data in rest and data in motion will help you to maintain the integrity of your data and reduce the risk of data sniffing by hackers. Due to varying hardware profiles of different devices, no standard protocol and encryption that can be implemented across all IoT devices. This pose a big challenge when it comes to encrypting your IoT data as you will have to use a different encryption technique for every device. To matters even worse, encrypting IoT data requires efficient encryption key lifecycle management. Inefficient key management can make you more vulnerable to IoT security attacks and increases the risk of data breach. On the bright side, if you could encrypt your IoT data, then you can save it from attackers.#4: Public key infrastructureWith varying hardware capabilities, some IoT devices might limit or prevent the use of public key infrastructure but that does not mean that it is not effective in securing your IoT network. It take advantage of complex digital certificates and cryptographic keys and offer extensive key lifecycle management capabilities including generation, distribution, management and revocation of public and private cryptographic keys. You can load these complex digital certificates into IoT devices that are enabled by third party public key infrastructure software, which enhances the security of communication between IoT devices. Manufacturers could also install these complex digital certificates after manufacturing.#5: API securitySecuring API is also critical to ensure that the data transmitted through end-point to back end system is only done by authorized persons. It will not only help you in making sure that authorized devices, developers and apps are using the API but also aids in detecting threats and attacks on APIs. According to Muneeb Qadar Siddiqui App developer at Branex, “App developers will have to be vigilant during app development process because any security flaws in APIs can wreck havoc on your IoT application.” App developers will have to make sure that their IoT app not only connects and performs concurrently but also secure their apps too. Keep an eye on specific threats against any API you are using take security measures to protect it.#6: Security analyticsFrom collecting to aggregating data, from monitoring to normalizing data from IoT devices, you need a monitoring that provide you options for reporting as well. Security analytics act as a brilliant way to alert organizations about any malicious activities that might be taking place in the background and breaching the set policies. It takes full advantage of big data techniques, artificial intelligence and machine learning and let you predict anomaly detection, which goes a long way in reducing the number of false positives. There is still a lot of work to be done to ensure that these security analytics could prove to be helpful in detecting IoT specific attacks and intrusions that goes under the radar of traditional network firewalls.But no single magic bulletIt is important for businesses to balance the benefits that IoT devices can deliver with a recognition that the same IoT devices have become a soft target for hackers and cyber criminals who are looking to intrude into your IoT networks and get access to your confidential and sensitive information.  Remember that there is no single magic bullet to fix all IoT security issues. In order to protect your IoT networks from external attacks, you will have to use a combination of these technologies. Authentication and encryption is crucial and so does the measures to secure your network. Establishing an efficient public key infrastructure will help you manage the whole process from key generation to key revocation effectively. You will have to follow a proactive approach and make security a priority. Related Posts How Data Analytics Can Save Lives Why IoT Apps are Eating Device Interfaceslast_img read more

Opening Your World with Social Media

first_imgCanadian Astronaut Chris Hadfield will be long remembered as one of the most visionary and perceptive users of social media to advance space exploration.Canada’s top space explorer, Chris Hadfield, has been described by Forbes magazine as the “most social media-savvy astronaut ever to leave the Earth.”He returned recently to earth to well-deserved fanfare.Hadfield has sparked a passion for space exploration across Planet Earth through his social media presence, even while living and working more than 200 miles above it as commander of the International Space Station.All professionals can — and should — draw inspiration from what he has achieved with social media. Hadfield has accomplished something that NASA has struggled to do for 40 years: re-ignite a sustained, passionate interest in space exploration among ordinary people. He has done it using common social media tools such as Twitter, Facebook, Tumblr and Reddit, though with additional help from an onboard digital camera.How did he do it?He’s Personalized His MessageFor starters, Hadfield struck an effective balance between the mundane and the sublime aspects of space exploration.As one of his sons, Evan, who was quoted in the February 22, 2013 online edition of the Guardian, described it, “Dad wanted a way to help people connect to the real side of what an astronaut’s life is— not just the glamor and science, but also the day-to-day activities.”His YouTube appearances dealt with all sorts of topics related to living in space — for example, how to brush one’s teeth and shave in space; how to clean up spills; and how to make a peanut butter sandwich in zero gravity.By highlighting the routine aspects of his job, he’s humanized his message in a way that enables ordinary people to relate to him.He Democratized It, TooHadfield also democratized his message by inviting an active dialogue with thousands of people across the planet.He organized an “Ask Me Anything” session on Reddit that drew almost 7,800 comments and followed this with the first Google+ hangout from space, answering questions via a live downlink from space.Words with PicturesHadfield also understood the value of visual imagery — telling his story not just with words but with pictures, often stunningly beautiful pictures.His daily posts feature not only natural phenomena such as rain forests, deserts and polar ice caps but also of the world’s major cities, captioned with verbally picturesque descriptions: “a somber spring night in Boston,” “Manila in the night, like a vase full of flowers,” and “Paris, well-named City of Light.” (Small wonder why Hadfield has been credited with possessing a poet’s turn of phrase.)Hadfield carried his visual passion into his YouTube presentations, many of which generated hundreds of thousands of views. Almost all of these presentations were accompanied by visual props, whether these happened to be his sleeping compartment, his toothbrush, or his razor. He strove to be visual in all facets of his social media work.The Art of Simple but Concrete MessagingHadfield, while keeping his messages simple, also was careful never to deviate beyond his core theme. Borrowing a phrase from Chip and Dan Heath, authors of the New York Times bestseller “Made to Stick,” he mastered the importance of “discarding a lot of great insights in order to let the most important insight shine.”Virtually all of his messages were also anchored in what the Heaths term concreteness. In one of his YouTube presentations, for example, he not only discussed the challenges of maintaining dental hygiene in a weightless environment but also demonstrated it by brushing his teeth. While discussing what it’s like to sleep in zero gravity, Hadfield donned his Russian-supplied pajamas, floated into his personal cubicle and zipped himself into his sleep bag.Takeaway LessonsWhile earth-bound professionals may not live and work in as glamorous environment as the International Space Station, we can still learn a lot from what Hadfield has achieved.Personalize and Democratize!The title of an old hit song from the early 1960s, “Welcome to My World,” first popularized by Jim Reeves, could be readily applied to the success Hadfield has acquired through his social media efforts.Hadfield has succeeded spectacularly partly by identifying his strengths, namely his passions, interest, training and unique professional perspectives, and packaging them in an unusually compelling way through social media. But in addition to capitalizing on these strengths, he also found a way to personalize his message — to welcome people into his world — that has resounded with hundreds of thousands of ordinary people across the globe.We should be asking ourselves: What are the talents, personality traits and expertise that set us apart from others, and how can we use these to build our own social media presence?Likewise, we need to give more thought to how we can personalize and democratize our messages more effectively. With the right amount of forethought and planning, we can learn how to weave both the mundane and remarkable aspects of our work into social media products that our users not only find entertaining and enlightening but also highly useful.Visualize!Canadian Astronaut Chris Hadfield spacewalking outside of the International Space Station.For better or worse, pictures increasingly trump text in this social media-driven age.Hadfield understood this. Virtually all of his postings dealt in some way with visuals, whether these happened to be tweets of images from the earths’ surface or the expert use of props in his YouTube presentations.We should be actively searching for ways to anchor our messages in compelling imagery. Most of us, if we think about it, are equipped with all sorts of visual imagery that we can weave into our social media narratives.Be Concrete!Borrowing a page from Hadfield, we should strive to ensure that all our messages our simple and straightforward and, equally important, as concrete as possible — and, when possible, enhanced by images that help convey the point clearly and succinctly.Parting WordsGranted, in both a literal and figurative sense, we may never reach as high as Chris Hadfield. Even so, let’s not forget that we all possess a unique set of training and insights that potentially could be shared with people from many different backgrounds.We, too, have compelling stories to tell. The sooner we envision ways to personalize, democratize and visualize our stories, the better equipped we will be to reach out to our audiences, whoever they happen to be. Author: Jim LangcusterThis article was originally published Monday May 16, 2013 on the Military Families Learning Network blog. This work is licensed under a Creative Commons Attribution 3.0 Unported License.last_img read more

Dabholkar case: CBI seizes arms cache from Andure’s kin

first_imgThe Central Bureau of Investigation, in collaboration with the Maharashtra Anti-Terrorism Squad, has seized a weapons cache from the house of a relative of Sachin Andure, who was arrested last week in connection with the murder of rationalist Narendra Dabholkar. CBI officers said Mr. Andure, who was arrested on August 18, revealed that he had hidden some weapons in his cousin’s house in Aurangabad. “We sought ATS [anti-terrorism squad] assistance and on Tuesday morning, the house in question was searched, and a bag was found, which contained a sword, a dagger, a 7.65mm pistol and three live rounds of the same calibre,” a CBI officer said. Since ammunition of the same calibre was used in Dabholkar’s killing, the gun seized on Tuesday would be sent for ballistic testing. “Once the reports are received, we will compare it with the ballistic reports of the ammunition used in the offence,” the officer added. Mr. Andure’s arrest was the result of the interrogation of Sharad Kalaskar who, along with Vaibhav Raut and Sudhnwa Gondhalekar, was nabbed by the ATS on August 10. Mr. Kalaskar allegedly confessed to have been directly involved in Dabholkar’s murder, along with Mr. Andure, who was then summoned for inquiries and later handed over to the CBI on August 18. The ATS went on to arrest a fourth accused, Shrikant Pangarkar, from Jalgaon on Sunday. Disruptive activitiesThe ATS is still working on ascertaining the intentions of the four accused, who are charged with planning disruptive activities in various parts of the State. A large quantity of arms, ammunition and explosives has been recovered from the first three accused, while Mr. Pangarkar is said to be a “facilitator and provider” for the trio. “Investigations so far reveal that the group that the accused are part of is a highly organised one, with various modules operating in silos. There is no interaction between members of different modules, and each module is instructed to focus on its own assigned task, similar to the working of sleeper cells of terrorist organisations. The level of training that the accused appear to have received also indicates an organised set up,” an ATS officer said. The officer said the scope of the investigation is likely to extend beyond the State’s borders. “We have found out that the arrested have travelled all over the country,” the officer said.last_img read more

Indian men win, women lose tamely

first_imgSomdev Devvarman and Karan Rastogi steered India to a 3-0 whitewash against a lowly Qatar in the Asian Games men’s tennis competition, but got crashed out of the women’s team event after being drubbed 0-3 by Indonesia in the first round, in Guangzhou on today.Rastogi gave India a blistering start with a 6-1 6-1 demolition of Al Mutawa Jabor Mohammed in 46 minutes, before Somdev showed equally ruthless approach in brushing aside Zayed Mousa Shanon in 38 minutes in the centre court of the Aoti Tennis centre.Somdev later combined forces with Sanam Singh and outclassed Zayid Mubarak Shannan and Al Haretth Abdulrahman Ali 6-0 6-1 to complete the rout.Rastogi, who served two second-set aces and hit 15 service winners in all, broke his Qatar rival Al Mutawa in the second game of the first set but was broken back immediately.However, he picked up his pace soon after to go 3-1 up with his second service break and then did not drop a single game to win the opening set 6-1 in 22 minutes.The Indian player grabbed a 3-0 lead in the second set before he dropped his serve, but then surged to take the next three games for the set and match.Thereafter, 25-year-old Indian No 1 singles player Somdev, ranked 106 in the world, fired an ace each in the two sets and hit 16 service winners.After clinching the opening set in only 16 minutes, Somdev allowed his rival to hold his serve once before closing out the second in 22 minutes.advertisement”I played very well. It is a good start and it is also a good experience for me. I think I can do a good job in the next matches,” Somdev said after his easy victory.With inputs from PTIlast_img read more