Tag: 香草419

Clemson extends trend in the `Bowden Bowl’

Clemson extends trend in the `Bowden Bowl’

first_imgFinally, they were told the play stood. Harper, a junior, was a big reason for the celebration. He connected with freshman tight end Brian Linthicum on an 11-yard scoring pass and Aaron Kelly for a 41-yard TD connection as the Tigers took a 21-0 lead less than 17 minutes into the game. In between, tailback James Davis scored on a 29-yard run. Florida State stumbled through a miserable first half, when it managed one first down and 62 yards. Weatherford was under constant pressure and looked lost when he wasn’t. Florida State only crossed midfield once in the first half. The Seminoles found their rhythm in the second half. Antone Smith had a 49-yard run to Clemson’s 1, then followed with the score that drew them to 24-11. Goodman’s TD catch tightened things up even more. But Weatherford and the Seminoles couldn’t sustain the rally. They got to Clemson’s 31 with three minutes left. But Florida State’s junior quarterback threw three incomplete passes and was taken down from behind by defensive lineman Philip Merling. Harper was 14-for-24 passing for 160 yards and no interceptions. Davis gained 102 yards on 18 carries. The victory closed Tommy within a win of his father after the ninth meeting of college football’s best known family feud. Bobby’s Seminoles won the first four games in the series by a combined score of 160-79. Tommy won four of the last five. Texas Tech 49, SMU 9: Even with a whole new set of starting receivers and a practically new offensive line, Texas Tech still has the same old prolific offense. Redshirt freshman Michael Crabtree had touchdown catches of 42, 2 and 1 yards, and Danny Amendola went 49 yards for another score, leading the Red Raiders in Dallas. Quarterback Graham Harrell kept his new targets busy by going 44-for-59 passing for 419 yards and four TDs. His completions were a career best – and he had that mark during the third quarter. He also scored on a 1-yard dive. Harrell, a junior, is Tech’s first incumbent quarterback since Kliff Kingsbury was in charge from 2000-02. His poise helped with the seamless transition for his four new blockers and the receivers who are replacing a trio that caught 504 passes for 7,014 yards in their careers. Harrell went 6-for-6 on the opening drive, then capped it with his TD plunge. His next two TD drives went 95 and 88 yards, and he converted on six of his first eight third-down tries. Crabtree caught 12 passes for 106 yards, and Amendola had 149 yards on 10 receptions. Eric Morris had seven catches for 70 yards. Shannon Woods ran for 45 yards and Tech’s last two touchdowns. SMU’s Justin Willis, the Conference USA freshman of the year last season, was 15-for-33 for 138 yards with two interceptions.160Want local news?Sign up for the Localist and stay informed Something went wrong. Please try again.subscribeCongratulations! You’re all set! Instead, it was Harper and the Tigers who came out throwing to take a 21-0 lead before the game was 17 minutes old – and bring their coach, Tommy, his third straight win over father Bobby’s Seminoles. Florida State rallied from 24-3 down in the second half. When Drew Weatherford hit Richard Goodman for a 15-yard TD pass with 11:40 left, the Seminoles trailed by six. Weatherford and the Seminoles got the ball back three more times after that, but could not score. “It looked like stage fright,” Bobby Bowden said. “We were running a new offense, but I thought we grasped it better than that. We were bad.” Clemson fans rushed the field and the collapsible goal posts came down after Weatherford’s final pass fell to the ground. But officials chose to review the play, moving orange-clad fans out of the way. From news services Florida State’s new offense still needs a lot of work. Its defense could use a tune-up, too, after first-time starter Cullen Harper threw two touchdown passes to lead Clemson to a 24-18 victory over No. 19 Florida State in their season opener Monday night at Clemson. This was supposed to be a retooled Florida State attack with first-year offensive coordinator Jimbo Fisher bringing the flash back to the Seminoles in the latest version of the father-son Bowden Bowl. last_img read more

Decades after World Series walk-off, Kirk Gibson apologizes to Dennis Eckersley, and here’s why

Decades after World Series walk-off, Kirk Gibson apologizes to Dennis Eckersley, and here’s why

first_imgAuthor Chad Finn: … It was a chance meeting. Dennis Eckersley was a Boston Red Sox broadcaster. Still is.Kirk Gibson was a Detroit Tigers broadcaster. Still is.In a hallway in back of the press box in Detroit’s Comerica Park, they happened upon each other.So reads the wonderful profile of Eckersley recently published in the Boston Globe. Any baseball fan knows you can’t profile Eckersley without spending a little time on the 3-2 backdoor slider that soared into baseball lore.last_img

Cell Operations Amaze, Inspire

Cell Operations Amaze, Inspire

first_img An analysis of complexes with large chimeric oligonucleotides shows that the basic tails of both proteins are attached flexibly, enabling them to bind rigid duplex DNA segments extending from the core in different directions. Our results indicate that the basic tails of DEAD-box proteins contribute to RNA-chaperone activity by binding nonspecifically to large RNA substrates and flexibly tethering the core for the unwinding of neighboring duplexes. Electric cells:  You’ve heard of electric eels; how about electric bacteria?  Researchers at Harvard, publishing in Science, were curious about the electrical properties of cells: Antenna tower construction crew:  Cilia are complex organelles in the cell membrane that protrude into the intercellular medium, where they can sense the surroundings and perform other functions.  Some are motile, like the cilia in the human respiratory tract that sweep foreign matter out with coordinated strokes.  Cells build cilia using molecular ore-carts powered by kinesin-2 motors in a process called intra-flagellar transport (IFT), in which components are hoisted up into the cilium on trackways.  Scientists suspected that additional factors regulate the construction of cilia.  Now, two American molecular biologists publishing in Current Biology identified one such member of the construction crew, named KLP6, that moves independently of kinesin-2 and acts to reduce its velocity.  Note: they found this in a particular kind of cell in a roundworm. Gatekeeper dance:  Ion channels play many vital roles in our bodies.  According to Science Daily, they are “essential for the regulation of important biological processes such as smooth muscle tone and neuronal excitability.”  One such channel, named BK, performs large conductance of potassium ions in the presence of calcium ions.  Scientists had thought that all ion channels followed a unified theory of activation.  Researchers at the University of Texas at Austin have found that BK channels are not that simple.  DNA orchestra:  An article on PhysOrg about DNA translation begins, “Just like orchestra musicians waiting for their cue, RNA polymerase II molecules are poised at the start site of many developmentally controlled genes, waiting for the ‘Go!’-signal to read their part of the genomic symphony.”  Researchers at Stowers Institute for Medical Research found that Super Elongation Complex (SEC), an assembly of some 10 transcription elongation factors, conveys the downbeat to the translation machine and “helps paused RNA polymerases to come online and start transcribing the gene ahead”.  This quick-start device “reduces the number of steps required for productive transcription and allows cells to respond quickly to internal and external signals,” one of the researchers explained.  Continuing the orchestra metaphor, the article said, “Transcriptional control by RNA polymerase II (Pol II) is a tightly orchestrated, multistep process that requires the concerted action of a large number of players to successfully transcribe the full length of genes.” Quality control inspectors:  At the exit gate of the ribosome, where new proteins have just been assembled, molecular machines called chaperones stand at the ready to help them fold properly.  A Stanford team studied two of these, the Signal Recognition Particle (SNP) and Nascent Chain associated Complex (NAC), which have the remarkable ability to work on a wide variety of proteins, helping them fold properly.  Publishing in PLoS Biology, they said, The Science Daily article reported that a team at Howard Hughes Medical Institute produced the highest-resolution diagram ever of a sodium channel .  In this excerpt, you can sense the fascination as the team looked down the channel for the first time in such detail: “We hope to gain insight into why they selectively let in sodium ions and nothing else,” the researchers said, “and how they respond to changes in the cell membrane voltage, how they open and close, and how they generate electrical signals.”  The researchers have already spotted intriguing molecular movement, such as rolling motions of some functional parts of the sodium channel molecule and their connectors…. Bacterial membrane potential provides a major component of the driving force for oxidative phosphorylation, membrane transport, and flagellar motion. Yet this voltage is inaccessible to techniques of conventional electrophysiology, owing to the small size of bacteria and the presence of a cell wall. Little is known about the electrophysiology of bacteria at the level of single cells. So they checked.  They observed E. coli bacteria producing electrical spikes at a rate of about one per second.  The electrical charge is generated by ion channels in the membrane that create electrical gradients, working against the natural tendency of charges to cancel out.  “Spiking was sensitive to chemical and physical perturbations and coincided with rapid efflux of a small-molecule fluorophore,” they said, “suggesting that bacterial efflux machinery may be electrically regulated.”  In other words, they were not observing a stochastic effect, but a coordinated action of many ion channels that must organize their active transport mechanisms as a unit.  They speculated that the spiking represents a stress response by the organism.  Coordinated electrical response is known in higher organisms, like electric eels and humans, but “These simple estimates show that some of the tenets of neuronal electrophysiology may need rethinking in the context of bacteria.” Salt of the cell:  If you enjoy having a healthy heart, brain and pancreas, thank your sodium channels.  Like the BK potassium channels, sodium channels regulate a wide range of physiological activities.  According to Science Daily, “Mutations in voltage-gated sodium channels underlie inherited forms of epilepsy, migraine headaches, heart rhythm disturbances, periodic paralysis, and some pain syndromes.”  When the dentist numbs your gums, he is effectively blocking the local sodium channels from doing their job – sending pain messages to the brain.  “The ribosome uses two active mechanisms to unwind messenger RNA during translation.” (Nature)  “Crystal structures of [lambda] exonuclease in complex with DNA suggest an electrostatic ratchet mechanism for processivity.” (PNAS) “Mechanism of activation gating in the full-length KcsA K+ channel.” (PNAS) We further show interactions between the peptidyl-prolyl isomerase and Trp-Trp (WW) domains amplify the conduit response, and alter binding properties at the remote peptidyl-prolyl isomerase active site. These results suggest that specific input conformations can gate dynamic changes that support intraprotein communication.  Such gating may help control the propagation of chemical signals by Pin1, and other modular signaling proteins. RNA linemen:  We’ve all watched in the movies how rescue workers toss a line over a wall or pole so that they can climb up.  Something like that happens with some machines that unwind RNA.  In PNAS, a team of researchers described a helicase with the awful name “mitochondrial DEAD-box protein Mss116p” that acts as a general RNA chaperone.  (They really should give these machines better names, like the Chuck Norris Hammerlock Clamp.)  Not only does the machine clamp down on the RNA, it first latches onto it by means of a couple of tails that fasten onto the RNA, tethering the machine to its target: Transport vesicles are created when coat proteins assemble on a flat membrane, select cargo, and deform the membrane into a bud. The budded vesicle is then carried to its target organelle, where it docks by means of ‘tethers’ before undergoing membrane fusion. The vesicle coat was once thought to fall off as soon as budding was complete, but we now know the coat is important for binding the tethering factors that help the vesicle identify the correct organelle. Coat proteins and tethers must be removed before fusion can take place, but what triggers their disassembly has always been a mystery. A paper recently published in Nature now shows that, when one kind of transport vesicle docks with its target membrane, it encounters a kinase that breaks the bond between the coat proteins and the tethers, kick-starting the disassembly process. The problem she was considering was how the steps are coordinated: “how can a vesicle hang onto its coat long enough to reach its target, but shed it once it arrives?”  Part of the answer appears to be in good management.  Though not yet fully understood, “These results paint a picture of Sec23 as a master regulator of budding and fusion, participating in successive interactions that are regulated by phosphorylation.”  She added, though, that “While this is an attractive model, it may not be the whole story.”  Other protein machines interact in vital ways with Sec23.  Her diagram illustrates several pieces locking together like Lego blocks, arriving and releasing at precise times in a process reminiscent of a space shuttle docking with the space station.  This complexity undermines a claim on PhysOrg that “Endocytosis is simpler than expected.”  There, researchers in the Netherlands found a simpler model for the way the coat molecules (clathrin) rearrange from flat to spherical during the process of vesicle formation.  That’s only a minor aspect of a much larger multi-stage process involving many protein parts, and as this animation shows, the geodesic-style clathrin molecules are pretty clever little building blocks. Rubber baby copper pumper:  In “Structural biology: A platform for copper pumps,” Nigel Robinson, writing in Nature, said, “Copper is vital to most cells, but too much is lethal. The structure of a protein that pumps copper ions out of the cytosol provides insight into both the pumping mechanism and how certain mutations in the protein cause disease.”  His diagram shows a molecular machine called LpCopA, comprised of at least 5 protein domains, that safely pumps copper ions out of the cell.  First, the ions have to be delivered to the pump with special chaperone molecules that know how to handle it safely.  Inside the pump are three binding sites that deliver the ion to an L-shaped platform that gently holds the ion while undergoing conformational changes like a lever arm, ejecting the ion safely to the outside.  Then the platform resets for the next round.  Serious brain diseases can occur when these pumps are damaged by mutations. Our results provide new insights into SRP selectivity and reveal that NAC is a general cotranslational chaperone. We found surprising differential substrate specificity for the three subunits of NAC, which appear to recognize distinct features within nascent chains. Our results also revealed a partial overlap between the sets of nascent polypeptides that interact with NAC and SRP, respectively, and showed that NAC modulates SRP specificity and fidelity in vivo. These findings give us new insight into the dynamic interplay of chaperones acting on nascent chains. Stereo amplifier:  Researchers at Notre Dame and Virginia Tech found that an important signaling enzyme named Pin1 is stereoselective.  “Pin1 is a modular enzyme that accelerates the cis-trans isomerization of phosphorylated-Ser/Thr-Pro (pS/T-P) motifs found in numerous signaling proteins regulating cell growth and neuronal survival,” they wrote in PNAS, showing that conduit response differs if the enzyme binds on one channel instead of the other.  Here’s the scoop for bio-geeks: A student’s view of a cell under a light microscope is misleading.  It reveals only a tiny fraction of what is really going on.  Within that package of life, invisible to the student’s gaze, complex machines work together in cellular factories.  Signals pass back and forth in complex networks.  Libraries of code are transcribed and translated into machine parts.  Security guards open and close gates, and emergency response teams repair damage.  Even a simple bacterial cell has the equivalent of a city council, library, fire department, police department, industrial center, transportation infrastructure, disposal and recycling center, civil defense system and much more.  Here are just a few snippets from recent scientific papers that zoom in past the microscope lens to reveal wonders unimagined just a few decades ago. Halfway down in the activation channel, a certain amino acid residue M314 in one of the transmembrane proteins does a little dance, “rotating its side chain from a position in the closed state not exposed to the hydrophilic pore to one that is so exposed in the open state.”  This conformational change is part of a larger validation process that ensures only the right ions make it through the selectivity filter.  M314 “might not actually form the part of the activation gate that blocks ion passage, but that motions in the deep pore may be required for blocking ion passage elsewhere in the channel,”  the article explained.  So much for unified theories; “Importantly, they say, the study demonstrates that BK channel activation is not an open-and-shut case as previously suspected.” Readers may wish to investigate these additional papers published this month with intriguing titles: Dirigible doughboys:  Sometimes cells build dirigible-like “transport vesicles” out of parts of the cell membrane, to float large cargo molecules to other organelles in the cell.  This complex process involves many players, including proteins that coat the vesicle, and dockers that hold the dirigible when it comes in for landing; in the case of the cell, though, the dirigible’s coat fuses with the target organelle, so that the contents can enter safely through a membrane tunnel.  Elizabeth Conibear [U of British Columbia] introduced some of the complexity of this process, called endocytosis, in Current Biology, saying, “When a coated transport vesicle docks with its target membrane, the coat proteins and docking machinery must be released before the membranes can fuse. A recent paper shows how this disassembly is triggered at precisely the right time.”  The first paragraph of her review article described just a fraction of what goes on in these operations: Time does not permit referencing all these papers; click on the links to go to the abstracts.  These represent part of the backlog of papers on cellular wonders.  Each of them deserve a complete discussion.  Many of them talk about how parts are “highly conserved [i.e., unevolved] from bacteria to humans,” and none of them attempt even a minimally-plausible account of how they might have emerged by chance.  In these exciting days of opening the cellular black box, we should be standing in awe of the design (and the Designer), not ascribing the machinery inside to mindless, purposeless nothingness.  The record speaks for itself.  Researchers need Darwin like alcoholics need wine (Dar-wine).  It turns them into WINOs, Wesearchers In Name Only (to be pronounced with a drunken drawl).(Visited 25 times, 1 visits today)FacebookTwitterPinterestSave分享0last_img read more

Quiz Results: The Puzzler

Quiz Results: The Puzzler

first_img SharePrint Related7 Tips for Achieving All 7 Souvenirs of AugustJuly 25, 2014In “7 Souvenirs of August”Quiz Results: The TravelerOctober 31, 2013In “7 Souvenirs of August”Four tips for hiding quality geocachesFebruary 19, 2019In “Geocaching Weekly Newsletter” You are…The Puzzler!Using your brain is the name of the game. You enjoy creative geocache hides that put your mind to the test…and so you laugh in the face of D5 geocaches.You’ll love this geocache: QuadLockLog (GC330KJ)Your ultimate geocaching tools:Don’t head out on the trail until you know you are on the right path. Use GeoChecker to double check that the coordinates you have puzzled out are correct.Try creating a Pocket Query for Difficulty 5 geocaches. These geocaches are sure to make you furrow your brow.Quick Tip for the Brainy Geocaches: Absolutely stumped? Try viewing the page source on the geocache details page, or look for white text. You may just find the clues you need…Do you have additional tips and tricks for your fellow Puzzlers? Tell us about them in the comments below. Don’t think this geocacher type fits you? Try taking the quiz again!Share with your Friends:Morelast_img read more

How to host the best New Year’s event for Last/First

How to host the best New Year’s event for Last/First

first_imgWithout further ado, here are five easy steps to hosting a great New Year’s Eve geocaching bash!Step 1: Choose a themeLike creating a GIFF film, all great Event Caches start out with a theme. We’ve brainstormed a few ideas to get you inspired:Throw a “geocaching resolutions” party. Have everyone choose a geocaching resolution to complete in 2018 (“Complete my Difficulty/Terrain grid,” “Hide my first cache,” or “Invite someone new to geocaching”). Bonus points if everyone meets again at the end of the year to see who followed through with their resolutions!Keep things “Hygge.” Pronounced hue-guh, the Danish word Hygge is the state of being warm, cozy, or charming. Plan a daytime event on January 1 at a coffee shop or cafe so geocachers can warm up (or cool down) after finding their first geocache(s) of the year.Step 2: Select the date and time of your eventThis is an easy one: plan your event for December 31 or January 1 so it qualifies for a souvenir. When selecting a time, remember some guests may bring young kids, so you may want to plan your event earlier on New Year’s Eve or even schedule a daytime event on January 1.Reminder: The geocaching guidelines prohibit event stacking. To avoid this, Event Caches must be:Held at different timesOrganized by different geocachersHave a minimum duration of 30 minutes, andTake place at different locations than other events.Check out the geocaching guidelines for more information.Step 3: Find a venueYou can host Event Caches anywhere available to the public—a restaurant, park, or even your house. Be sure to find a place that has enough space for activities! Don’t forget to provide a description of your event in the Cache Details. This is a great place to explain any limitations with the venue such as whether it’s dog friendly. You can also add a reminder here to dress warm for an outdoor event.Step 4: Plan fun and engaging activitiesA great way to make your event fun for all is to schedule activities to help your guests meet each other. Here are four ideas to get you started:Do a polar plunge. There’s no cooler way to bond with fellow geocachers than by jumping into freezing water together at the height of winter! For lucky geocachers in the Southern Hemisphere, host a picnic on the beach and enjoy the warmth of summer.Create a geocaching bucket list. As a group, make a bucket list of geocaches you want to find in 2018. Make plans throughout the year to find them together!Play geocaching bingo. Create a bingo card based on geocaching achievements (“Earned a new country souvenir” or “Found more than 100 geocaches”). Guests must find other geocachers at the event who have completed the achievements to fill in their board.Bake a lucky trackable into a cake. In Greece, coins are baked into bread or cake, and whoever finds the coin has good luck for the entire year! Give your guests the gift of geocaching luck by hiding a trackable in the dessert. Make sure to mention this to them before they take a bite!Step 5: Invite friends, new and old!Now that you’re feeling inspired, create a new event on Geocaching.com. Remember, events must be submitted at least two weeks prior to the event date. Once it has been published, share the GC code with your local geocaching organization.Whether you’re already a well-established social butterfly or a first-time attendee, geocaching events are a great way to meet new people who share your love for geocaching. We hope these tips help you host a rockin’ New Year’s Eve geocaching bash!Make sure to check out Shop Geocaching for the Last/First geocoin and tag set!What tips do you have for throwing a great geocaching New Year’s event? Tell us in the comments below!Share with your Friends:More New Year’s Eve is an opportunity to celebrate the end of one year and the beginning of the next. While end-of-year traditions come in many shapes and sizes, this year you can start a new tradition by hosting an event with your geocaching buddies. To get us off to a good start, we’re announcing two new souvenirs: one to celebrate your last cache of 2017 and one to celebrate your first cache of 2018! Earning the souvenirs is easy:Find a geocache or attend an event on December 31, 2017 to earn the Last Cache of 2017 souvenir.Find a geocache or attend an event on January 1, 2018 to earn the First Cache of 2018 souvenir.center_img SharePrint RelatedGuide to hosting an unforgettable Last/First New Year’s eventNovember 27, 2018In “Community”How to throw an awesome New Year’s geocaching bash in 5 easy stepsNovember 10, 2015In “Community”Out with the old, in with these two new souvenirs!November 8, 2018In “Geocaching.com Souvenirs”last_img read more

Twitter to Save Us From Ourselves & Phishing; More Is Needed to Make Innovation Safe & Viable

Twitter to Save Us From Ourselves & Phishing; More Is Needed to Make Innovation Safe & Viable

first_imgmarshall kirkpatrick It never ceases to amaze me how many high-tech industry elites get ensnared in every Twitter phishing attack. (See our November story 7 High-Tech Twitter Users Who Fell for Phishing Scams) This evening Twitter announced that a new program will intercept links sent out by Direct Message and through email, checking to make sure they are safe. Phishing prevention is no small matter.Twitter’s is a good move but a lot more is needed all over the web. If we want a transactional developer ecosystem of distributed identity and portable user data, there are both user education and technical changes that need to be made.I don’t mean to be pedantic about this, but here’s my take on the subject.It’s only because there is a big developer ecosystem creating interesting new services on top of our Twitter identities that any of us would ever consider logging in to Twitter while on another website. That ecosystem is great, and it’s the kind of thing that an interconnected web that leverages portable user data would be filled with. But if user data is a form of currency and even people who are professional technology analysts (paid hundreds of dollars an hour for their technology advice – and many of these people are falling for Twitter phishing scams) – if even these people can’t tell the difference between a good transaction and a bad one, then what does that say for the future of distributed developer ecosystems and data portability?Apparently, though, fooling people these days into handing over their Twitter login through an unsafe transaction is like taking candy from a baby. It’s really easy. That’s a failing of user education and of the design of distributed authentication transactions, isn’t it? (Though it’s tempting to blame the users who fall for it, it really is!)Remember when debit and credit cards were first introduced and many people didn’t trust them? Aren’t you glad we figured out how to make that work? Similarly, we need a combination of user education (don’t give out your credit card number to random people who call you on the phone) and practical measures – credit card transaction receipts have two copies, your copy is the one with the full number printed on it – take it with you. Little things like that and more made plastic a viable platform for commerce. Distributed online identity needs similar measures taken.You know what also doesn’t help? People who try to be helpful by urging users to not even click on phishing links. It’s not like these are mysterious poisonous substances that will kill you if you touch them. Go ahead and click on them! Just don’t give the resulting spoof pages your username and password. That’s the problem!It’s early days in all of this and more moves like Twitter’s tonight will be needed. For the good of user security but also for the good of all the innovation this web has the potential to deliver. 8 Best WordPress Hosting Solutions on the Market A Web Developer’s New Best Friend is the AI Wai… Tags:#news#web center_img Why Tech Companies Need Simpler Terms of Servic… Top Reasons to Go With Managed WordPress Hosting Related Posts last_img read more

As Internet Growth Slows, Tablets And Mobile Data Are The Industry’s Best Hope

As Internet Growth Slows, Tablets And Mobile Data Are The Industry’s Best Hope

first_imgowen thomas Related Posts Tags:#Internet#Internet usage#Kleiner Perkins#Mary Meeker#mobile#mobile revolution Growth in Internet usage on the whole is slowing, technology investor and analyst Mary Meeker warned in her latest Internet Trends report, an annual exercise in looking at the state of the industry that she’s done since her days as an analyst at Morgan Stanley and has continued at Kleiner Perkins, the venture-capital firm where she’s now a partner.While Meeker spent most of the report, which she published online and delivered at the Code Conference in Los Angeles Wednesday morning, looking at the Internet’s opportunities, the first line of the report should give people pause:• Internet Users<10% Y/Y growth & slowingfastest growth in more difficult to monetize developing markets like India / Indonesia / Nigeria  A Web Developer’s New Best Friend is the AI Wai... Top Reasons to Go With Managed WordPress Hosting • Smartphone Subscribers +20% strong growth though slowingfastest growth in underpenetrated markets like China / India / Brazil / Indonesia Tablets are surging, with unit shipments growing at a 52 percent annualized rate; tablets have now surpassed both desktop and laptop PCs in sales. And mobile data usage is growing even faster, at 81 percent.Yet if overall Internet usage isn’t growing, especially in the developed markets where it’s easiest to make money off of users, that suggests that tech companies are, to a large extent, just reshuffling deck chairs, shifting share around as consumer habits change.Or they’re looking to make more money off the users they have. Meeker pointed out that Google makes six times as much money per user as Facebook does, and twelve times as much money as Twitter.One area where Meeker sees growth is the continuing shift of video usage from linear television to on-demand, online video.See also: Goodbye, TV Channels—And Hello, TV AppsMeeker’s complete report is available on Slideshare:KPCB Internet trends 2014 from Kleiner Perkins Caufield & Byers Why Tech Companies Need Simpler Terms of Servic... 8 Best WordPress Hosting Solutions on the Marketlast_img read more

Government accepts resignation of Madras High Court Chief Justice

Government accepts resignation of Madras High Court Chief Justice

first_imgNew Delhi: The resignation of Madras High Court Chief Justice V K Tahilramani has been accepted, according to a government notification. Her resignation has been accepted with effect from September 6, it said. She had resigned after the Supreme Court collegium declined her request for reconsideration of transfer to the Meghalaya HC. Justice V Kothari has been appointed as the acting chief justice of the Madras High Court, another notification said. Also Read – 2019 most peaceful festive season for J&K: Jitendra SinghThe transfer of Justice Tahilramani from the Madras High Court to the Meghalaya High Court had snowballed into a major controversy with lawyers in Chennai as well as in her home state of Maharashtra coming out in protest against the Supreme Court collegium’s decision in this regard. Later on September 12, the apex court had come out with a statement, saying that each of the recommendations for transfer of Chief Justices and Judges of various high courts was based on “cogent reasons”. Also Read – Personal life needs to be respected: Cong on reports of Rahul’s visit abroadWithout naming Justice Tahilramani, the statement issued by the office of apex court’s Secretary General Sanjeev S Kalgaonkar had said the reasons of transfer of judges were not disclosed in the interest of the institution but the apex court collegium would not hesitate to disclose them in the circumstance it becomes necessary. The statement was released against the backdrop of media reports and speculation on the transfer of Justice Tahilramani. Justice Tahilramani had resigned on September 6, days after the Supreme Court Collegium declined her request for reconsideration of her transfer. She had sent her resignation letter to President Ram Nath Kovind, a copy of which was sent to Chief Justice of India Ranjan Gogoi.last_img read more

New Delhi There have been three firing incidents

New Delhi There have been three firing incidents

first_imgNew Delhi: There have been three firing incidents in various parts of Delhi within a span of 24 hours which left two persons dead and one battling for life. The three shooting incidents occurred in Kalyanpuri, Rohini and New Usmanpur area.In the first incident, objecting to the foul language of some ruffians proved fatal for a young man as he was murdered by the group in Kalyanpuri area of East Delhi. The man was shot dead purportedly for objecting to their use of foul language. Also Read – More good air days in Delhi due to Centre’s steps: JavadekarThe victim has been identified as Jaspal, a resident of the same area. Sources said that the incident took place when some men in a car were using bad language which was objected to by Jaspal. This made the men furious and they fired at Jaspal. The firing took merely 100 meters from the local police station. The police said that the cause of the murder was being ascertained. A criminal, Guddu, has been detained and investigations were underway. Police recovered a damaged motorbike from the spot, which was said to belong to the criminals involved in the incident. Also Read – Union min Hardeep Singh Puri, Delhi L-G lay foundation stones for various projects in DwarkaIn the second incident, a 22-year-old man was shot dead by some persons in Rohini’s Prem Nagar allegedly after an argument over consumption of liquor, police said on Tuesday. The man, identified as Ashish was living inPrem Nagar in a live in relationship with a girl. Ashish was involved in smuggling of illicit liquor, a senior police officer said. On Monday, at around 8 pm, an argument broke out between him and some persons over consuming liquor, following which one of the accused shot him in the stomach. He died instantly. The third incident happened in North east Delhi’s Brahampuri where a man was shot by unidentified assailants. The victim Mohammad Abbas received a bullet injury on his neck. He is admitted and his condition is said to be stable. “The injured, as well as other persons present at the time of the incident, have not alleged any one. The circumstances seem suspicious,” said Ved Prakash Surya, DCP North East Delhi. On September 26, a man identified as Mohammad Hasan was shot dead in the same area by gunmen.last_img read more

New Delhi A court here has ordered framing of cha

New Delhi A court here has ordered framing of cha

first_imgNew Delhi: A court here has ordered framing of charges against seven people for allegedly abducting children, including newborns, and selling them. It observed that trafficking in human beings is a multi-layered phenomena that can take different forms and occur in various industries. “There common characteristic is the element of constraint, deceit, threat, fraud, coercion, etc. used with an aim to economically and/or sexually exploit one or other persons and besides that there are other, less widely known forms of trafficking,” Additional Sessions Judge Anil Antil said. Also Read – More good air days in Delhi due to Centre’s steps: Javadekar Prima facie various offences, including trafficking and forgery, are made out against the seven accused, the court said, adding it cannot be said that sale and purchase of infants are out of the purview of the offence of trafficking. It said the seven accused abducted children from their guardians by fraud and were actively involved in trafficking. “All the accused, who in connivance of their common intention, were knowingly or actively involved in the commission of offence of trafficking and for this purpose they abducted innocent babies from their lawful guardianship by playing fraud upon their parents/guardian,” the judge said. Also Read – Union min Hardeep Singh Puri, Delhi L-G lay foundation stones for various projects in Dwarka The court passed the order of framing charges against the seven people — Mohd Jahangir, Rahul Baudh, Jyoti Baudh, Jitender Kumar, Mithla, Shakeela Khatoon and Kavita. “Though it seems that the babies were taken from their parents with the consent but I must state that consent by playing fraud and based on false and misleading facts is no consent in the eyes of law in terms of Section 90 of the IPC,” the judge said. The Crime Branch of Delhi Police in February last year busted a child trafficking racket following a tip off and recovered a 10-day-old old baby from Jahangir’s possession. Officials had arrested Jahangir, along with the other co-accused, who during interrogation revealed about other cases of abduction. Later, police recovered some minors and cash worth Rs 43,500 from one of the accused persons. The counsel for accused submitted in court that they cannot be framed for chid trafficking since consent of victim was mandatory to indicate that there was exploitation and therefore, the said provisions were not applicable to case of minors. The counsel further contended that mere sale and purchase of infants cannot be termed as exploitation.last_img read more