jfmzxtmy

3 More Companies Say They’ll Build Microsoft Surface RT Tablets

By on December 15, 2019

first_imgTags:#Microsoft#web Top Reasons to Go With Managed WordPress Hosting Dell, Lenovo and Samsung have committed to building their own Surface RT tablets, Microsoft announced on Monday, building out an ecosystem for the company’s heavily hyped new Windows 8 platform.Microsoft also disclosed new details about the capabilities of the new tablets, including that they will be able to sit within a “connected standby” state for more 17 days, an extended period during which the tablet will silently collect new email and other updates, then display them when the user restores the Surface from standby.The message here – again – is while Acer complained about Microsoft entering the hardware business with the Surface tablet, Microsoft’s other hardware partners have joined in, apparently enthusiastically. Microsoft’s announcement Monday brings the total number of OEMs supporting the Surface RT ecosystem to four, after Asus announced its Tablet 600 at Computex.Surface RT to Come in Many FlavorsThe industry also now has an official label for the “RT” versions of the Surface devices. Microsoft labeled “Surface RT” with a trademark ™ designation within its post, indicating that that will be the official name of the product. In June, Microsoft announced the two members of the Surface family in June at an event in Los Angeles. The cheaper Surface RT uses a version of Windows 8 optimized for the ARM processors that the tablets will run on; in a Monday blog post, Mike Angiulo, the vice president of Microsoft’s Ecosystem and Planning team, noted that the company had developed a single version of Windows RT that encompasses and supportsthe numerous versions of CPUs developed by component partners Nvidia, Qualcommm, and Texas Instruments.That’s significant, as there will be likely more variations of Surface RT products, based upon processor and screen size, than there will be for the full-featured Surface (also known as the Surface Pro). The Surface Pro uses either an low-power processor from either AMD or Intel; the recently-announced Lenovo Tablet 2 uses an Intel Atom “Clover Trail” chip.Unfortunately, we still don’t know exactly what type of Surface RT tablets Dell and the other OEMs will announce. However, Microsoft did say that their Surface RT tablets won’t necessarily be, well, tablets. “Some of our Windows RT PCs come with full keyboard and touchpad solutions, whether removable/dockable or a traditional clamshell,” Angiulo wrote.Microsoft’s overarching point, however, was that those tablets were coming.“Dell’s tablet for Windows RT is going to take advantage of the capabilities the new ecosystem offers to help customers do more at work and home,” Sam Burd, vice president of Dell’s PC product group, said in a statement. “We’re excited to be Microsoft’s strategic partner, and look forward to sharing more soon.”Lenovo and Samsung had not commented at press time.What Surface RT Can DoWhile the OEMs weren’t ready to divulge details of their product offerings, Microsoft itself provided more important information: exactly what the tablets could do.“…All of these Windows RT PCs will have consistent fast and fluid touch interactions, long battery life, connected standby, and are beautiful, thin, and light designs,” Angiulo wrote. “All of these are designed to make the most of the capabilities of Windows RT.”Specifically, Microsoft said that the Surface RT tablets it was aware of ranged in weight from 500 grams (1.1 pounds) to 1,200 grams (2.6 pounds). The tablets ranged from between 8.35 mm to 15.6 mm thick, with lengths that spanned 263 mm (10.3 inches) to 298 mm (11.73 in.) and widths ranging from 168.5 mm (6.63 in.) to 204 mm (8.03 in.)In terms of hardware capability, Microsoft said that the tablets would be able to generate the Windows 8 animations at a fluid 60 Hz, and sample finger input at a smooth 100 Hz per finger. Users wil be able to “bump” or tap two Windows RT devices together and share photos, URLs, map directions and other information. The Surface RT tablets will be able to play HD video continuously for about 8 to 13 hours at screen brightnesses of 200 nits.Microsoft also said that about 90% of the released-to-manufacturing apps for the Windows Store supported Windows RT, aided by the 1,500 or so Windows RT reference systems it seeded to software and hardware developers.Perhaps the most impressive capability, though, is the “connected standby time,” now measured in weeks rather than hours or days. Microsoft said that it had seen Windows RT tablets with batteries ranging between 25 Watt-hr to 42 Whr in capacity. Google’s Nexus 7 tablet claims to have a 300-hour standby time, versus the 320-hour to 409-hour times quoted by Microsoft.Microsoft also detailed some of the Windows RT gestures, which will seem familiar to tablet and phone users. The cursor is moved with a swipe, and double-clicks are enabled either with two quick taps, or a single tap with two fingers. Swiping in from the right edge toggles the charms, and swiping from the left edge enables the previously used app. Pinch to zoom is also enabled, a feature that’s not part of the update to Microsoft’s latest mouse.Surface product shot courtesty of Microsoft. Steve Ballmer Surface introduction shot by Fredric Paul for ReadWriteWeb. A Web Developer’s New Best Friend is the AI Wai… Related Posts center_img markhachman 8 Best WordPress Hosting Solutions on the Market Why Tech Companies Need Simpler Terms of Servic…last_img read more

Continue Reading

fpnsrhds

Intel Acquires AppMobi’s HTML5 Developer Tools And Staff

By on

first_imgThe tools most important to Intel will be the jqMobi and directCanvas products which give developers environments to build HTML5 applications and to accelerate them on mobile devices. Developers that are currently using appMobi’s tools will not be effected by the move to Intel except for a one time re-registration to Intel’s systems. The HTML5 tools will continue to remain free to use through Intel. Ultimately, this will be a smart move for Intel as it tries to validate its presence in the mobile development space. By acquiring a robust set of HTML5 tools it can give developers the option of creating cross-platform apps that will work in any environment on any device and (most importantly) any computer chip. Here’s appMobi’s email to developers on the Intel move, followed by a FAQ also produced by the company: Related Posts Role of Mobile App Analytics In-App Engagement Why IoT Apps are Eating Device Interfaces dan rowinski What it Takes to Build a Highly Secure FinTech … Tags:#HTML5#Intel Intel has gutted the HTML5 mobile-app development firm appMobi, acquiring its tools and related staff – but not the startup itself. The move is part of Intel’s bid to build out its own suite of developer tools for mobile applications.According to documents obtained by ReadWrite (see below), appMobi will turn into a pure play cloud services provider, offering developers backend service support for HTML5 mobile applications. Terms of the deal were not disclosed.ReadWrite’s 2012 Most Promising CompanyReadWrite named appMobi “the most promising company of 2012” for its work on creating HTML5 solutions for mobile application developers. The company aimed to rethink how developers can use HTML5 for audio and video as well as accelerating performance for Android and iOS. It created Mobius, a mobile video standard that aimed to kill Flash (which ended up dying in mobile anyway) and helped create innovative ways for HTML5 developers to monetize their products. appMobi’s most innovative (and controversial) product came in the form of jqMobi, a HTML5/JavaScript framework designed to give mobile developers a mobile-ready JQuery. The company created a proof-of-concept, fully HTML5 game called BoomTown to show game developers that, yes, fully functional mobile games can be built using a mobile browser as a backbone.Tools And MigrationSpecifically, the tools that Intel is acquiring from appMobi include the XDK IDE (Integrated Developer Environment), PhoneGap XDK, GameDev XDK, jqMobi and jqUI developer frameworks, directCanvas HTML5 acceleration, the Mobius Web browser along with testing and debugging tools. The Rise and Rise of Mobile Payment Technologylast_img read more

Continue Reading

zpmdrqts

Tumblr’s Perverse Lesson: To Get Rich, Don’t Make Money

By on

first_imgWhy Tech Companies Need Simpler Terms of Servic… Top Reasons to Go With Managed WordPress Hosting Related Posts Matt Asay Tags:#acquihire#acquisition#M&A#Tumblr center_img A Web Developer’s New Best Friend is the AI Wai… $1.1 billion. That’s how much your company is worth if it’s long on users and short on paying customers. Just ask Tumblr. Or Instagram. Each yanked down billion-dollar acquisitions despite making virtually no revenue. Is this a big deal?Acquihires And Billion-Dollar PayoutsSome seem to think so. At least, for acquihires, the kissing cousin to the revenue-free-massive acquisition. For example, Pando Daily‘s Sarah Lacy slams the acquihire, arguing thatLazy profit-seekers love these periods in the Valley. Why not? They can make money without having to actually build a company. It’s like a get-out-of-actual-entrepreneurship-free card.Venture capitalist Mark Suster goes one step further, holding that acquihires actually have a corrosive effect on the tech industry:You have been at Google, Salesforce.com, Yahoo! for years. You have worked faithfully. Evenings. Weekends. Year in, year out. You have shipped to hard deadlines. You’ve done the death-march projects. In the trenches. You got the t-shirt. And maybe got called out for valor at a big company gathering. They gave you an extra 2 days of vacation for your hard work.And that [jerk] sitting in the desk next to you who joined only last week now has $1 million because he built some fancy newsreader that got a lot of press but is going to be shut down anyways.What kind of message does that send to the party faithful who slave away loyally to hit targets for BigCo? …It says if you want to make “real” money  – quit.Fair enough. I’ve been involved in three such acquihires, and I see their point. Acquihires send a signal that failure is OK and, indeed, profitable.But the same holds true for the billion-dollar exits on chimerical revenues. They represent entrepreneurs cashing in on popularity contests without actually having done the hard work of monetizing that popularity. That is, they represent entrepreneurs making big-money success on little-revenue failure. The Downside To Making MoneyAnd why shouldn’t they? It turns out that it’s very difficult to remain popular while charging for one’s service. LinkedIn has done it by charging recruiters. Google has done it by aligning relevant ads next to search results. But monetizing people’s inane pictures of their meals? Instagram didn’t even bother.Pinterest is starting to roll out paid services. Foursquare, too, has been straining to make more money lately. Ironically, these noble efforts to actually sustain the companies on real revenue may make them far less valuable.For one thing, monetization efforts can fail. Just look at Groupon’s gyrations as it has sought to turn a massive sales force into a profit-generating machine. It hasn’t been pretty, and it can turn off users who don’t want to be sold.But more pertinently, the second a business starts to make significant revenue, it will start to be valued on real-world metrics like “profit” and “operating margin” and “sales,” not breathless potential based on “users” and “page views” and “social engagement.” It turns out that the multiples on the former are far lower than they are on the latter.The Entrepreneur’s DilemmaWhat to do? Entrepreneurs can’t really set out to build a revenue-free company that VCs will sustain indefinitely. So most are probably right to initially focus on adoption. Assuming they can get traction, it pays to continue to focus on adoption, because it’s harder to turn free-riding users into paying customers (or find businesses to pay for access to those users). So long as the venture money is flowing, why would an entrepreneur ever choose to fixate on the dismal science of making money? For me, I think if you’re not making profitable money then your future – and that of your customers’ – is always up for grabs. Whatever promises the purchasing company makes, they are the buyer, and you are the seller. As Dave Winer points out, this inevitably means they’re in control. Not you.  Maybe that doesn’t matter. But it does mean we may be building disposable companies with little lasting impact. That doesn’t seem like a good thing.Image courtesy of Shutterstock.  8 Best WordPress Hosting Solutions on the Marketlast_img read more

Continue Reading

elarrezf

Two-Factor Authentication Is For Wusses, Get A Tattoo

By on

first_imgThink you’re all bad-ass with your two-factor authentication and 40-character passwords? If Motorola’s vision of the future comes to pass, that kind of security is for wusses.In a conversation at All Things D’s D:11 conference this week, Motorola Mobility’s head of advanced technology and projects group Regina Dugan lamented the fact that for all of the technological advances that we have made over the decades, we are still relying on outmoded password-based authentication, the kind the guys in the lab coats were using back in the day.And we’re doing it a lot. Dugan speculated that power users would have to authenticate themselves nearly a hundred times a day.(See also Two-Factor Authorization Is Awesome – Until You Lose the Damn Token.)Dugan presented two options for better ways to securely access information in the near future: tattoos and “authentication vitamins.”The electronic tattoo, which Dugan demonstrated on stage at the conference, are biostamps made by the firm MC10, which can be used by healthcare professionals to monitor a patient’s vital signs. In a medical context, these tattoos, which are thin and stretchable, could be implanted within the body to monitor conditions like irregular heartbeats or brain activity.The technology, Dugan explained, can also be used as an authentication tool, worn right on the user’s skin.Ink not your thing? Dugan pulled out another conceptual idea: a small pill-like device that, when swallowed, would turn your whole body into a authentication device.The device runs “like a reverse potato battery,” Dugan explained, pulling power from the acids in your stomach to generate an 18-bit authentication signal from the embedded chip inside. The pill has reportedly been approved already by the U.S. Food and Drug Administration.Motorola seems to be taking a shortcut to the coveted holy grail of pure biometric identification with these interim bio/tech hybridized tools. The more technology that an authentication system employs, however, the bigger the more chance it can be hacked.That said, tattoos and pills are a pretty interesting place to move the authentication conversation.Image courtesy AllThingsD. Tags:#authentication#security How to Write a Welcome Email to New Employees? Related Posts Why You Love Online Quizzescenter_img 7 Types of Video that will Make a Massive Impac… brian proffitt Growing Phone Scams: 5 Tips To Avoidlast_img read more

Continue Reading

udqwcpsb

Why Secure-Email Startup Lavabit Shut Down: The Feds Wanted Its Keys

By on

first_img8 Best WordPress Hosting Solutions on the Market Related Posts david hamilton Tags:#Edward Snowden#email#nsa#public-key encryption#surveillance Lavabit, a secure-email provider startup that counted NSA leaker Edward Snowden as one of its customers, abruptly closed down in August rather than “become complicit in crimes against the American people,” as founder Ladar Levison wrote at the time. And now we know why.Federal court records unsealed yesterday reveal that the FBI demanded access to Lavabit’s private SSL keys, which would have allowed the feds to decrypt the email of any Lavabit user, not just that of Snowden—the FBI’s presumed target, although the documents redacted names associated with accounts sought by the feds. (The government denied any interest in reading email unrelated to its target.)See also: Death Before Dishonor: Secure Email Services Shut Down Rather Than Comply With Feds“[T]hey wanted to break open the entire box just to get to one connection,” Levison told the New York Times.Levison initially refused until threatened with fines and criminal contempt charges—at one point, he printed out the keys in a four-point font that filled 11 pages, which U.S. government lawyers complained was “illegible.” Finally, however, he ran out of options. So he turned over the digital keys, but simultaneously closed down Lavabit, rendering further surveillance impossible.Levison is appealing the lower-court order; opening briefs are due by October 10. See the unsealed documents in the case here.center_img Top Reasons to Go With Managed WordPress Hosting Why Tech Companies Need Simpler Terms of Servic… A Web Developer’s New Best Friend is the AI Wai…last_img read more

Continue Reading

fixecpqd

An Insider’s 11 Take-Aways from Companies Winning Industrial (IIoT) Cybersecurity

By on

first_imgAs you read through blogs and articles about cybersecurity and the Industrial Internet of Things (IIoT), it’s easy to get so focused on the complexities (and there are many), that you lose sight of the big picture. There is huge opportunity in this space—untapped by the existing IT cybersecurity players.To state it in the simplest terms, when protecting free consumer accounts like, Gmail or Facebook accounts, the motivation for investing in security is driven by certain objectives—protecting customer trust, avoiding an unpleasant hit to the company’s reputation, etc. These are, of course, real and important concerns. But when an industrial company is trying to protect a $10 million turbine, the economics of investing in security become very different—and much more straightforward. There’s a reason why much of current security investments are directed towards the industrial space: it’s an enormously promising market—and one where new innovations can have an enormous impact.GE Ventures, the venture capital subsidiary of General Electric, is one of the organizations that recognizes the large opportunities (and even greater responsibility) to lower costs and eliminate unplanned downtime for their customers. They have been working closely with industrial companies for decades. The company has also built longstanding trust relationships with customers and helps them take advantage of the industrial Internet and protect them from its inherent risks. They are rising to that challenge—their own Predix architecture, a platform that help to optimize industrial business processes, has an extensive security-in-depth strategy.In addition to the security-in-depth strategy on their platform, GE Ventures is always on the lookout for startups that are advancing the industrial cybersecurity art. According to them, there are some very talented ones out there. Of course, IIoT is not an easy market to break into for startups. Industrial networks are different than enterprise IT that makes them a terrible place for moonlighting—having a great product roadmap in traditional IT is not a birthright to succeed in industrial cybersecurity. But there are some commonalities among the most successful and promising startups in this space. Here are a few from GE Ventures’ perspective:1.) They know their stuff.There are lots of things That GE look at when evaluating a startup: A team with the right specialties. Differentiated technology. But the most important factor separating companies treading water from those already swimming laps is that they are staffed top-to-bottom by people who “get” industrial applications.The most successful startups have a kind of institutional knowledge of industrial control systems (ICS)—often gleaned from working in industrial in their previous careers. They’ve learned important lessons (sometimes the hard way): They know the market. They understand its constraints. They understand through experience the attack surface and exposure. And they always, always keep their eye on the ball: the business continuity of the customer.2.) They take the IIoT Hippocratic Oath: First, do no harm.No matter what they’re working on, successful IIoT startups never lose sight of their customers’ primary objective: this machine cannot fail. Whatever work they’re doing to secure a system, they know that it absolutely cannot slow down or knock out industrial assets. They create a security layer that’s at least as agile, if not more so, than the devices and systems it’s protecting.3.) They don’t make things harder for the customer.Successful IIoT startups know that their target customer has been doing things a certain way for years. They know not to make assumptions that these customers have the same in-house capabilities and institutional knowledge that a non-industrial enterprise would—or, when it comes to software, that they even speak the same language. And they don’t assume that the customer will be willing to fill in gaps that are lost in translation. The most promising IIoT startups are ready to deliver IT solutions to industrial, and they’re not afraid to make it clear that that’s where their expertise lies. But they come out of the gate speaking OT.4.) They make security integrated.Successful IIoT startups know that treating security as an additional feature or up-sell will never fly. Their customers expect security to be baked into the product and fully integrated into existing industrial process.5.) They don’t try to eat the whole cake at once.Enterprise IT security and IIoT cybersecurity are two totally different animals. You can’t just port something from one world into the other. Yet, there are lessons to be learned from the evolution of enterprise security. Among the biggest that successful IIoT startups adhere to: they don’t try to solve the security problem in one fell swoop.In the enterprise world, we started with one big problem (protecting digital assets and data), and ultimately broke it down into a whole lot of smaller problems: perimeter security, identity/authentication, data loss prevention, compliance, etc. Smart IIoT startups apply the same thinking to IIoT cybersecurity. They’re not looking to “solve” industrial cybersecurity. They’re attacking smaller, discrete problems and developing useful solutions.6.) They start with the assumption that they will be targeted.Even the biggest and best digital companies in the world find malicious or unexplained code in their environments—sometimes threats that have been lying dormant for years. Smart IIoT startups expect that their solutions will be subject to the same types of malicious and/or intelligence gathering threats as well. That doesn’t mean they don’t spend a huge amount of time and effort trying to prevent breaches. But they spend just as much time and effort making sure that, if someone does get in, they can isolate that breach and prevent it from infiltrating the rest of the system. And they recognize that the ICS attack surface extends beyond industrial devices and networks themselves, to all parts of the organization and supply chain.7.) They’re ready to scale.Successful IIoT startups never forget that for industrial customers, zero downtime is acceptable. They know that it’s not enough to have great tech—they have to be ready to engage that technology on a scale of thousands of deployments, sometimes in multiple countries—sometimes overnight.8.) They know that security starts well before connecting a single industrial device.Successful IIoT startups recognize that some of the most dangerous vulnerabilities aren’t just flaws in their code, but weaknesses in their supply chain. They know that any OEM that incorporates subassemblies made by others can potentially introduce tampered firmware into their system by accident. And they’ve learned the lesson from vendors who had excellent technology but saw deals evaporate because the customer realized they were using an untrusted vendor for one component of the supply chain. Solid IIoT startups take steps to secure their products during every step from building to shipping, when it can be most vulnerable to mistakes or malicious actors.One of the more interesting areas now being explored: public ledgers. A growing number of companies are looking at Blockchain public ledger technologies to help authenticate assets and provide an audit trail with end-to-end chain of custody. (Industry groups are getting involved too—the Trusted IoT Alliance recently announced a new initiative to promote standard ledgers to authenticate IoT devices.) It’s still very early days, but work like this could prove incredibly valuable for ICS, where many categories of non-IT assets (engines, parts, sub-parts) are connecting back to the IT backbone.9.) They don’t get distracted by buzz words.The startup space, or at least the media covering it, tends to be overly sensitive to the hype cycle. Whatever the latest hot concept may be (currently, AI and machine learning), companies rush to make sure they can claim to check those boxes. Successful IIoT startups don’t spend their time worrying about the latest flavor of the month. They’re laser-focused on delivering concrete answers to specific industrial problems.10.) They understand the need to secure data at rest and in motion.Industrial customers need solutions not just to secure data at the edge—where more data than ever before is being collected and processed—but also to secure data in motion as it travels to the cloud.Data in motion poses a particularly cumbersome challenge for industrial systems. Some companies in this space are developing solutions to simplify passthrough of encrypted data, eliminating the need to decrypt data at any point in transit, and its associated risks.11.) They understand the job is never done.Good cybersecurity startups recognize that they’ll never be “finished” with their solution, and they don’t get too comfortable with their current design. They understand that real-world cybersecurity means ongoing, indefinite iteration.This isn’t a comprehensive list. But if you’re charting the course of companies developing interesting new solutions in IIoT cybersecurity, it’s a good place to start.Authors: Michael Dolbec & Abhishek Shukla, Managing Directors of GE Ventures Tags:#cybersecurity#ge ventures#IIoT#Industrial IoT#security#smart iot#tips Internet of Things Makes it Easier to Steal You… Related Posts Leveraging Big Data that Data Websites Should T…center_img AI: How it’s Impacting Surveillance Data Storage How Data Analytics Can Save Lives Michael Dolbec & Abhishek Shuklalast_img read more

Continue Reading

poyadjfd

Lighting for Video: Background Lights

By on December 12, 2019

first_imgUsing background lights in your video interview setups is an easy way to make your talent pop.In our ongoing series, Lighting for Video, we’re taking a look at different types of professional film/video lights and their subsequent accessories. In this video, we examine background lights and examine lighting examples from some documentaries that I have shot.Background lights are a great way to make your entire scene much more dynamic. As stated in the video, you don’t simply want to throw a soft-box on the background. Try experimenting with color temperatures or gels, as different colors can drastically change the tone of your scene. Gels come in a wide assortment of sizes and prices but you should be able to pick up a variety pack for less than $40 on Amazon.In the video I used a cookie to create a pattern on the background. You can make your own cookie by simply cutting out holes in some aluminum foil. However unlike a gel, a cookie isn’t attached to the light itself but rather sits on a stand in front of the light. This gives you the ability to adjust the sharpness and scatter of the pattern or design.This was the 12th and final installment in our Lighting for Video Series. If you have any questions about lighting or tips to share with fellow filmmakers, please use the comments below.Be sure to check out all the videos in our Lighting for Video tutorial series!last_img read more

Continue Reading

isgtifyp

VFX Breakdown: Only God Forgives

By on

first_imgTake a behind the scenes look at the VFX of “Only God Forgives”.Nicolas Winding Refn’s Only God Forgives wasn’t a hit with the critics. Receiving only 58% percent on Rotten Tomatoes and 40% on IMDB  it wasn’t nearly as well received as Drive, his previous film also starring Ryan Gosling. But what Only God Forgives lacked in substance it made up for in blood. This was one of the goriest films of 2013 and the post-production team was so kind as to give us a behind the scenes look at how they created some of the awesome VFX.First off, if you haven’t seen the trailer:Looks like Kill Bill meets Drive, right? Well the movie has come and gone in the theaters, but Nordisk Films has just released a behind the scenes look at the making of some of the visual effects. The effects were a mixture of VFX and on-set special effects. The results are pretty astounding. The VFX supervisor for Only God Forgives was Martin Madsen, who seems to be very active in the VFX world.Warning: The behind-the-scenes video contains some spoilers, as well as some gory content that might be considered a little too gritty for work viewing. This behind the scenes look was first posted on the Nordisk Film Vimeo page. Thanks for sharing guys!What did you think of the VFX breakdown? Share in the comments below.last_img read more

Continue Reading

udqwcpsb

Affordable Filmmaking: An Overview of Rokinon’s New Wide Angle Lenses

By on

first_img10mm T3.1 Ultra Wide-Angle LensThe 10mm T3/1 is the only full frame wide-angle lens that was recently announced. It features a useable, but not amazing T3.1 aperture. However, at 10mm it’s one of the widest full-frame lenses that could be classified as “affordable“.Mounts: Sony A, Sony E, Nikon F, Micro 4/3, Canon-EFPrice: $579The following overview video created by B&H outlines the main features associated with each lens, along with some pretty awesome test footage:This video was created by B&H and first shared on their YouTube channel. Thanks for sharing guys!What do you think of the new Rokinon lenses? Already shoot on Rokinon glass? Share in the comments below. This insightful overview shows the new Rokinon wide-angle cine lenses in action.Rokinon is an extremely popular lens manufacturer among the indie-filmmaking community, and rightfully so. There isn’t any good quality lens manufacturer that gives you comparable specs for such a low price. The Rokinon/Samyang/Bower brand has already put out a line of extremely powerful cine-lenses specifically designed for the indie filmmaking community.These Cine-lenses all come with de-clicked apertures and a focus ring that allows for smooth focusing. Each cine-lens also comes with large geared focus and aperture rings which can be easily attached to a follow focus.Just recently, Rokinon released a few new additions to their cine-lens line. We found a great overview video created by B&H that give us a quick overview of each lens and talks about a few of the pros and cons associated with them.8mm T3.1 Fish-Eye II LensThe 8mm T3.1 is a new and improved fish-eye lens designed for cropped sensors. The short focal length makes for some extremely exaggerated barrel distortion.Mounts: Canon EF-M, Fujifilm X Mount, Samsung NX, Sony EPrice: $39912mm T2.2 Cine LensWhile not as wide as the Rokinon 8mm, where the 12mm Cine lens falls behind in field of view it more than makes up for in aperture. This lens is a bit more practical than the 8mm lens as it doesn’t distort as much.Mounts: Canon EF-M, Micro 4/3, Fujifilm X Mount, Samsung NX, Sony EPrice: $429last_img read more

Continue Reading

brjcnxay

DJI Drones Can Now Fly on Their Own and More Major Updates

By on

first_imgFollow MeThis may be the most anticipated update — though it’s only available for the Phantom 3 series. Set the aircraft to follow you, and it will automatically fly and keep you in the cameras view. WaypointsWaypoints allow users to set multiple GPS points, called Waypoints, that the aircraft will automatically fly to. This allows pilots to set a flight path so they can focus on camera control. The Phantom 3 or Inspire 1 will fly along the same path repeatedly, travel at a set speed, and save the pattern for future use. Home LockPilots can set flight controls to relate to their location at all times. With Home Lock you can flick a switch and the control stick will move forwards, backwards, left, and right all in relation to the set home point. Course LockAn easy navigation option, Course Lock allows the pilot to set the controls to correspond with the aircraft’s current path. This lets you fly in a set direction while moving alongside objects. Point of InterestPilots wanting to circle a specific building or location can lock onto their target with Point of Interest. The drone will continuously circle until the user captures their shot. Owners of the DJI Phantom 3 and Inspire 1 now have their own personal assistant. DJI has announced Intelligent Flight Modes, a series of custom flight paths.Following a new line of Phantom quadcopters and an much improved app, DJI has now introduced Waypoints, Point of Interest, Follow Me, Home Lock, and Course Lock. DJI GO AppImage via DJIIn August, DJI released the updated DJI GO app. The app (now available for iOS and Android) introduced many new features and replaced the previous DJI Pilot app. DJI GO created low-resolution files that would save to the pilot’s phone or tablet, allowing instant playback. It also allowed you to quickly post photos and videos online. The app featured enhanced editing tools and also integrates the DJI forum to allow users to easily share tips and find information. DJI has now announced updates to the app (iOS V2.2.0 and Android V2.1.0) but it’s the firmware updates making all the headlines. Phantom 3 Advanced owners will receive an upgrade that supports 2.7K video recording.Intelligent Flight ModesImage via DJIDJI has just introduced Intelligent Flight Modes, a series of flight paths that can easily be set by pilots. These features are available for the Phantom 3 series and Inspire 1.These aren’t revolutionary updates, as other drones like the 3DR Solo Smart Drone already featured some of these abilities. It is a much needed update to DJI’s line of aerial cameras. Matt Carlson shared his initial review with us. Here you can see the Intelligent Flight Mode in action with Carlson’s DJI Phantom 3 Professional.Over 700 FAA Section 333 Exeptions Issued for DJI Phantom PilotsImage via DJIIn other DJI news, the company has announced that 742 total exemptions have been issued to companies using DJI products. In January of 2015, the U.S. Federal Aviation Administration (FAA) issued its first Section 333 exemption for a DJI Phantom.This made the Phantom eligible for commercial use within the United States – with a Section 333 exemption. A Section 333 exemption and a Certificate of Waiver or Authorization (COA) is needed for commercial drone use within the U.S. until a new set of regulations is created.Excited about these updates? Do you use drones in your productions? Are you filing for a Section 333 exemption? Let us know in the comments below.last_img read more

Continue Reading

ghcvwpph

Shooting for the Edit: Essential Tips You Need to Know

By on

first_imgContinuity is vital to your story. By shooting with the edit in mind, you’ll save yourself countless headaches.Top image Mission: Impossible – Rogue Nation via Paramount PicturesShooting for the edit is a technique used to aid you in post production. As a filmmaker and videographer, you will need to keep the editing process in mind while shooting footage. By doing this, you are enabling yourself to make the editing process that much easier.CoverageShooting a scene begins with the A camera, which captures the master footage. In addition to the A camera, you may have a B or even C camera as well. Those secondary cameras capture the same scene from multiple angles. This supplemental footage along with the master take constitutes coverage. With all these various angles, you allow the editor multiple options when splicing the film.You can see this technique play out well in this scene from Se7en. We start with the slow dolly shot introducing John Doe to the scene, then we cut to a panning shot, opposite of the last, placing John Doe in the space with Mills and Somerset. From here we move to a series of shots as the scene moves forward.Video Courtesy of Movieclips.NOTE: When shooting coverage, don’t forget to capture B-Roll to give the audience visual context of the larger environment, the local space, or small actions of the characters.MovementCharacter movement is another key component of shooting continuous footage. When a characters exits frame, the audience must seem them return to view in the next logical place. The action must match between shots.You can see this clearly in this scene from Captain America: Civil War. Tony Stark crosses the frame and exits camera right. The very next shot reverses the camera angle, and Stark now enters back into frame from camera left.Video Courtesy of FabianPohl Trailers.Finite DetailsHave you ever watched a film where a character holds an object in one hand, but in the very next clip the object is in the other hand? That is an example of what happens when continuity is not taken into account. There may be days between shots, so be sure to take excellent notes on set. You’ll want to know everything from a character’s clothing, and even the type of makeup they have applied. Every little detail counts.In this scene from Mission: Impossible – Rogue Nation we see Tom Cruise and Simon Pegg in the middle of a car chase sequence. During this sequence a gunman’s bullet hits the rear-view mirror, knocking it from the windshield. As filming the chase takes place over a series of days, the crew had to make note of every little scratch – making sure damage was replicated on all the stunt vehicles. Damage like remembering to remove the rear-view mirror on any shots that occur after the mirror falls.Video via of Movieclips Coming Soon.Blockbuster films aren’t immune to these little mistakes, as they appear numerous times every year. While on the topic of damage to cars, notice how the damaged drive side door in Commando miraculously repairs itself as the car drives away.Video via ashfan12Line of SightAs characters converse, or stare off into space, make sure to keep the same line of sight. If a character looks off screen at impending doom, you may want to cut to a shot of what the character sees. Before doing so, make sure that the camera angle matches up to what the character would actually be looking at.A perfect example comes from Alfred Hitchcock’s Rear Window. As Jimmy Stewart sits bound to his wheelchair, he looks out the window at the world around him. When we get the views of that world – Hitchcock always makes sure that the cameras framing matched the line of sight of the protagonist.Video Courtesy of Movieclips.Are these editing tips helpful to you? Do you practice shooting for the edit? What are some techniques that you keep in mind? Share your thoughts with your fellow filmmakers in the comments below.last_img read more

Continue Reading

tohjfpsr

The Leadership Playbook: What Only the Leader Can Do

By on December 9, 2019

first_imgAs a leader, it is easy to get bogged down in the little stuff.Many of the people you lead will bring you small problems because they haven’t worked for a leader who has required them to act independently (mostly because that leader didn’t trust them to act independently).Much of what reaches your desk are tiny fires. The nature of the problem requires urgency, and the people who work for you want to make sure that you know what’s going on and weigh in on the decision.Urgent work gives you a sense of accomplishment. Nothing makes you feel like you’re working more than making decisions and handling the things that need attention. Many people in leadership roles thrive on this work because it feeds their need for significance. But “small fires” isn’t where a leader should spend much of their time.For many leaders, these “small fires,” keep them from having to do the real heavy lifting of leadership.It is easier to be frustrated and focused on small stuff than it is to fix the big stuff.Strategic Threats: Dealing with urgent issues keeps you busy and prevents you from dealing with the strategic threat facing your business. That threat is so great that there is no easy answer available. But strategic threats left unaddressed makes the future more uncertain and creates additional risks.Developing Leaders: Small, urgent issues with relatively easy answers can keep you from spending time developing the next generation of leaders, the important work that is never urgent enough to get a leader’s full attention.Biggest Initiatives: There is some work that only a leader can do. There is more work that competent, trusted people can easily do when empowered to take action independently. The small urgent issues still need to be taken care of, but the leader’s job is to ensure that she has the team necessary to handle them so that she can focus on what only the leader can do.The most dangerous thing a leader can do is to allow small issues to prevent them from pursuing their two or three biggest initiatives. The reason these important initiatives die is because they are neglected when a leader’s time is being devoted to smaller, less important issues.Where do you spend your time?last_img read more

Continue Reading

tohjfpsr

Why You Should Start with Why Change, Not Why Us

By on

first_imgThe reason many salespeople are happy to start a presentation with their company’s history, their locations, their board of directors, their investors, and the logos of clients they’ve won is because they believe, mistakenly, that this establishes their credibility. They believe that they can borrow the success of the company to make them credible. This, however, tends to have the very opposite effect.Instead of recognizing you as someone with business acumen, situational knowledge, and a point of view about their business and their future, you show yourself to be someone who believes that the value you create is found in sharing the same information that they might find in a brochure your company produces. Instead of sharing your ideas about at the intersection of your industry and your client’s industry, you start the conversation with who you are and why other people have bought from you in the past—none of which has anything to do with why you are sitting in front of your prospective client.I don’t know who originally offered this advice to writers, but it goes like this: “Someone needs to bleed in the first line.” If you are introducing yourself and your company to your client, you are doing discovery work, and discovery work is now about helping a client discover something about themselves, namely, why they should do something different. The more time it takes you to start that conversation, the less interested your client will be in what you have to say.One decision-maker entered a room and said, “Tell me about you and your company.” I told him that would be the least interesting conversation we could have. He pushed back, saying, “I want to hear about you and your company.” I parried, replying, “Okay, let me tell you what we are thinking about right now as it pertains to what you’re doing and what we think will need to change.” I shared my insights, and he was engaged with me for the next hour and fifteen minutes. When he left the room, his peers said, “He’s never lasted more than ten minutes in a meeting with a salesperson.Here again is a gentle but firm reminder, you need to possess the advice that would make one a trusted advisor, should that be your goal. Get you some chops! Essential Reading! Get my 3rd book: Eat Their Lunch “The first ever playbook for B2B salespeople on how to win clients and customers who are already being serviced by your competition.” Buy Nowlast_img read more

Continue Reading

gnbzurst

Facing the Two Types of Fears

By on

first_imgNothing can hold you back from your full potential and achieving your goals quite like fear. Fear can limit your success, stunt your progress and keep all your talents, hopes and dreams so far from reach that you end up taking them to the grave. Whether it is the fear of public speaking, fear of going after something you want, fear of making a fool of yourself, or something else you are afraid of, it can be enough to attack you from all different angles and leave you completely paralyzed. Many of us walk around with fear as the main driver of our destinies! It can dominate every thought, action, and belief that you have at any given time.The good news is that you don’t have to give in to fear and let it run your life. But in order to overcome it, you need to understand what it is, where it comes from and what it takes to face it. Read on to learn about the different types of fears that exist in our lives and how to never let them hold you back again.Innate FearsThe first type of fears are universal, innate fears. Everybody has them on some level because they are born into us – in fact, most of them serve some kind of survival purpose. Innate fears are often around avoiding physical pain or death. Humans are born with a fear of spiders and snakes because we are wired to avoid objects that can harm us, in these cases by biting us and injecting venom into our bodies. No one ever taught you not to fear these creatures. The same goes for being afraid of flying, heights, pitch black darkness or scary dogs. We are wired to understand that these things pose an inherent danger and aren’t safe. As we evolve as a species, some of the fears evolve with us, mostly to protect us from real danger.However, we can also adapt to these fears and even ignore them if we choose. That’s why we’re able to climb mountains, fly planes and train dogs. And at the same time, these innate fears aren’t likely to keep you from success. You aren’t likely to cripple your career with your fear of spiders. So, instead of confronting these fears, you can continue adapting or avoiding, as most humans do.Identity FearsThe second set of fears have also developed with us as we have evolved. These are fears that have to do with your identity. Primarily, they manifest as fears of being judged by others. The fear of public speaking is a great example. At the root of it, you are worried you are going to mess up and embarrass yourself. Other people will see how incompetent you are and you will lose their respect. The fear of being wrong or being rejected stem from the same place. You are embarrassed when you make a mistake because your ego feels shame, which is hard for anyone to accept.The fears around your identity aren’t about physical pain or death, like our innate fears. But you can certainly feel the physical effects of identity fears. Imagining that you will lose the respect of your peers can actually hurt. It can raise your blood pressure, make you feel hot and agitated, make you cry, etc. The emotional and psychological pain that identity fears cause is real – but it doesn’t actually put you in any grave danger.What identity fears all have in common is that they pose a threat to our standing in the community. We live, survive and thrive in tribes. We want to have a firmly established place in our peer group and society because we need to depend on others for companionship, support, survival, etc. Identity fears come from the real danger that you could be ostracized from the tribe. In the past, no one could survive alone in the jungle – so these fears feel like they pose a real threat to our survival.Love and Connection FearsThe final class of fears are those related to love and connection. Although they serve a different purpose, they are really a subset of identity fears. You might fear being alone, being abandoned, or being rejected. Trust issues show up in this category, too. You can fear commitment, which is often a way to protect yourself from ever having to experience rejection or feeling the pain of disappointment. You might also fear intimacy because you fear being hurt. The fears around identity and fears around love and connection can combine and become even more complex, like when a person doesn’t believe they are worthy of love.Stop Fear From Holding You BackThe first step to stopping fear from holding you back is understanding what you are afraid of. Anything you fear falls into one of these categories. If you fear taking an action that you know you need to take, start by asking yourself what it is you really fear.The fears around your identity and love are generally the ones that prevent you from succeeding and being happy.You might say, “I don’t want to publish this blog post because it’s not ready.” But what is the actual fear behind that? You say, “Someone might not like it; it might not be good enough; it might be full of errors, etc.” And what if you’re right? What then? “Someone might share it with other people and point out my errors. They might judge my mistakes. They might think less of me.” They might. So what? Are those mistakes definitely going to keep you from succeeding? Absolutely not. What WILL absolutely keep you from succeeding is not ever publishing anything at all and letting your peers surpass you in your career.Fear will hold you back from all significant accomplishments and victories. There is nothing worth doing that doesn’t strike a little bit of fear in your heart – and this applies to everything, including work, art, love, and simply being alive. There is nothing more satisfying in life than knowing that you tried your hardest and gave your all. Don’t let fear stop you from doing that.Fear is your servant. It is here to prevent you from being harmed by real dangers. You cannot allow it to become your master and prevent you from taking the actions you need to take, lest it keeps you from success and happiness. Fear is the number one obstacle you will face in life. It is the most difficult challenge you will ever be put to and the most important one to overcome. Good thing you were born with everything it takes to do this. Essential Reading! Get my first book: The Only Sale Guide You’ll Ever Need “The USA Today bestseller by the star sales speaker and author of The Sales Blog that reveals how all salespeople can attain huge sales success through strategies backed by extensive research and experience.” Buy Nowlast_img read more

Continue Reading

ygddzgga

The Unparalleled Hypocrisy Of Ghosting Your Dream Client

By on

first_imgOf all the many things that bother salespeople, one that seems to dominate their attention (and emotions) is when their prospect goes dark after what they believed was an excellent first meeting. The Lost Art of Closing will surely help you string together the commitments you need to prevent your client from going dark and your need to chase them. It might also be worth taking a look look in the mirror to understand the unparalleled hypocrisy of ghosting your dream client.Before You Accuse Me Take a Look At YourselfIt’s hard to tell who ghosted who first. Did salespeople go dark on clients first, or was it the other way around? Either way, salespeople are as guilty of going dark as their prospective clients. Perhaps it makes sense to work on not ghosting your clients, something that is wholly in your control. Here are some of the ways you ghost the very prospects about whom you sometimes complain.When You Stop Pursuing Your Dream ClientYou have called your dream client for years. They have never agreed to a meeting, and your competitor has them locked down tight. Occasionally, however, they take your phone call, and you sense they aren’t one hundred percent satisfied (and it’s not just your natural salesperson’s optimism). As the conversation goes on, your dream client again refuses your request for a meeting, even though you can tell you were close. And then, “poof!” You disappear without a trace for months or years. If you don’t continue the communication and the pursuit with a patient, professional, persistence, you have gone dark.Every salesperson has the experience of calling on a prospect for a long time, giving up and going away for an equally long period, only to call and discover their dream client removed their partner and replaced them—without even considering the salesperson who gave up (i.e., went dark).When You Fail to Follow Up with a ClientYou had an excellent first client meeting. You took outstanding notes, capturing all of the questions your dream client asked you in that meeting, along with some notes about what you owe them. You get back to your office, open your inbox (a place where you spend too much time), and become distracted by this thing or that. The next day, you have deadlines and meetings, and you forget all about the promise you made, a promise your client remembers.Because you don’t have a disciplined process to manage your goals, projects, and tasks, it is two weeks before you provide your dream client with what you promised them. Or maybe you promised to call your dream client to follow up on a question or concern and become overwhelmed and forgot.Whatever the cause or circumstance, you went dark on your client. What’s worse is you gave them a preview of working with you, were they to ink a contract with you and your company.When You Win the Deal and DisappearYou energetically pursued your dream client, finally acquiring a meeting. You worked very hard to distinguish yourself, showering them with attention, and wooing them to win their business. You are an excellent salesperson, creating massive value for them, and all the stakeholders are excited to work with you and your company. Everyone is happy about signing the contract and moving forward.And then, the dream client you worked so hard to obtain doesn’t see or hear from you again until it is sixty days from the expiration date of your contract. It feels awkward to show up after going dark for so long. Your client has a different opinion, now believing you are self-oriented, and you are only there to get a deal, not to help them solve their intractable problems like you did when you were courting them.What does your dream client believe will happen after they renew the contract? The last time they signed a contract, you provided disappearing ink. As soon as they signed the contract, you disappeared.Hiding From Problems You CreatedIn The Only Sales Guide You’ll Ever Need, there is a chapter at the end of the first half of the book on accountability. Accountability is your willingness to deliver the outcomes you sold and promised. It is also one of the characteristics that distinguish true professionals from the poseurs.Shortly after winning your dream client’s business, they run into trouble executing, and they struggle to produce the outcome you promised. This failure is not your fault. It is your operations team who is dropping the ball. You take an angry call from one of your contacts, and you make a call to someone on your side, handing off the problem to people who own the resolution. Having given that problem to your team, you wash your hands of it, and you move on.Your client continues to struggle over the next three or four weeks without you being present or available to help them. One day, you are greeted by an email telling you that your dream client is canceling your contract.Instead of owning the outcome, following up, and making sure your team had direction and resources, you went dark on your client. Worse still, you went dark on the group that you want to have your back.When You Become Apathetic, Complacent or EntitledYears have passed since you won your dream client’s business. Everything is working, and there isn’t any real reason to have a meeting. If there were a problem, you’d have heard about it. As time drifts by, you and your dream client both become apathetic, complacent. Neither you or they are compelled to do something different.While you are sleeping, your aggressive competitor starts to make inroads. They found a couple of people lower in the organization who are compelled to change, and your competitor is arming them with the ideas and insights they need to make a change. You know you, competitor, well enough to know that there is nothing they can do that you can’t also do. However, the problem is that they are doing working to create new value, and you feel entitled to the business by the nature of your long relationship.The best retention strategy is the creation of new value, something you haven’t even tried to do for some number of years. Now your client has given a piece of your business to your competitor, and you are unhappy with the decision, a decision that was the result of your going dark.If you don’t like it when your dream client goes dark, don’t go dark on them. You may not be able to control when your prospect or dream client goes dark, but it is within your control not you ghost them.last_img read more

Continue Reading

gnbzurst

Jammu and Kashmir Governor perturbed over protests

By on December 3, 2019

first_imgJammu and Kashmir Governor N.N. Vohra said on Wednesday that he was “deeply disturbed” by incidents involving students leading to public disorder and called for measures to protect their career.At a meeting with top officials here, he asked Chief Minister Mehbooba Mufti to take steps to make sure that the students do not get involved in any law and order situation. He also held discussions with Vijay Dhar, president of the D.P. Dhar Memorial Trust, and Khurshid Andrabi, Vice-Chancellor of the University of Kashmir. Education Minister Altaf Bukhari briefed him.Appeals to studentsMr. Bukhari called for “parental counselling to prevent the youth from going astray and missing out on education”. He appealed to the students to return to classes.“The students should have been busy and involved in academic and co-curricular activities rather being chased by law enforcing agencies on the roads. This is really a dismaying and disturbing situation which needs to be addressed through coordinated and vigilant efforts of teachers, parents and the society,” said Mr. Bukhari. He said the government acted against trespass in Pulwama Degree College on April 15, when 50 students were injured. “We ordered an inquiry and completed it in eight days. We followed it up with tangible action. I fail to understand why the students are still on the streets,” he asked. Sri Pratap Higher Secondary School and Government Women’s College, M.A. Road, will remain closed on Thursday. The students of these institutions clashed with security forces on Tuesday, bringing Lal Chowk to a standstill.Students have been protesting for over three weeks.last_img read more

Continue Reading

ghcvwpph

Punjab Police nab 4 pro-Khalistan youths

By on

first_imgThe Punjab Police on Tuesday said it has arrested four youths, including a woman, who were planning to carry out targeted killings under the banner of ‘Khalistan Zindabad’ to fan communal violence in the State.“Jagdish Tytler and Sajjan Kumar [both Congress leaders] were on the radar of these highly radicalised youths, as well as those who they considered responsible for incidents of sacrilege of holy books,” said a police spokesperson in a statement released from the office of the Chief Minister.The arrests have come close on the heels of the capture of five other members of the group, nabbed on May 26 from Bathinda district.Police said the youths had come together to form ‘Khalistan Zindabad’ after being radicalised over the social media platforms by certain individuals based in Pakistan, various Middle Eastern countries and the United Kingdom.The statement said the youths “working in close collaboration with their handlers and associates based within the country and abroad” were in the “process of mobilisation of funds, procurement of weapons, and arranging training for group members” when the Mohali police nabbed them in an operation from May 29 to 30.The four, Harbarinder Singh, Jarnail Singh, Randeep Singh and Amritpal Kaur, have been booked under different sections of the Unlawful Activities Prevention Act, Arms Act, and IPC. They have been remanded in 7-day police custody.last_img read more

Continue Reading

ifpruubs

As CBI searches Lalu’s residence, all eyes on Nitish Kumar

By on

first_imgA raid on the residence of Rashtriya Janata Dal chief Lalu Prasad in Patna was confirmed by party State president Ram Chandra Purve. He said that “under a well-planned conspiracy, a raid has been conducted at the instruction of the Central government”.Speaking to journalists outside Mr. Prasad’s residence, Mr. Purve said that ever since the RJD chief called for a “BJP bhagao, Desh bachao  (kick out BJP, save the country)” rally in Patna on August 27 in which all non-BJP parties would participate, the BJP-led Central government was after him and wanted to send him to jail.“But even if our party leader is sent to jail, the rally will be held and the whole Patna would be covered by it”, he said.Amid the developments, all eyes are on Chief Minister Nitish Kumar, who is recuperating at Rajgir, 110 km away from Patna in Nalanda district, as what action he would take after the CBI registered a case against his Deputy in the Cabinet, Tejaswi Yadav, younger son of Mr. Prasad, and Health Minister Tej Pratap Yadav, the older son, in alleged financial irregularities and raided their residence on Friday morning.Mr. Kumar has called all top officials of the government to Rajgir to mull over the emerged situation.The BJP, on its part, has thanked Mr. Kumar for exposing the tender scam of two hotels first in 2008. “It was Nitish Kumar and his government which first exposed these financial irregularities in awarding two BNR hotels to the railways in 2008 and two of its party leaders had submitted the related papers to the Prime Minister’s Office for action against Mr Prasad..I’m thankful to Nitish Kumar for this on which the NDA government has taken action”, said senior State BJP leader Sushil Kumar Modi.Mr Modi, of late, has come out with charges of alleged dubious financial irregularities and land deals done by Mr. Prasad and his family members.“Now, it is to be seen what action Nitish Kumar takes against Lalu’s two sons who are ministers in his cabinet…after the CBI registered a case against them and raided their premises, Mr. Kumar should immediately sack them from his Cabinet”, Mr. Modi told journalists.Sources from inside Mr. Prasad’s residence told The Hindu that over two dozen CBI officials are searching each and every corner of the residence, looking for documents. From bathroom to the bedroom, they were searching even as some family members started performing religious discourses, said a source.last_img read more

Continue Reading

tohjfpsr

Non-bailable warrant issued against Hardik Patel

By on

first_imgA court in Gujarat issued a non-bailable warrant against Patidar quota agitation leader Hardik Patel after he failed to appear before it in a case related to vandalising BJP legislator Rushikesh Patel’s office in Visnagar from where the quota agitation was launched in 2015.Cases were registered against 17 others too for the incident that took place during a protest rally in 2015.’Patidar leaders targeted’Another warrant was issued against another Patidar leader, Lalji Patel, who had contended that at a time when an anti-BJP atmosphere was prevailing ahead of the Assembly polls, Patidar leaders were being targeted by the authorities.“I have attended all hearings in the court regularly,” Mr. Patel, who heads the Sardar Patel Group, told reporters in Mehsana district.Dinesh Bambhania, a close aide of Mr. Hardik Patel and a key member of the Patidar Anamat Andolan Samiti (PAAS), also slammed the State government for ”making attempts to put Mr. Hardik Patel behind the bars before the Assembly polls.” He said, “This shows the BJP’s nervousness. On the one hand, the entire State machinery is snooping and spying on Hardik, leaking video footage of his meetings and on the other, such arrest warrants are issued.”Mr. Hardik Patel on Wednesday held a roadshow in Botad district in Saurashtra and addressed a rally attended by thousands of the community members.last_img read more

Continue Reading

elarrezf

Northern States come together to fight drug menace

By on

first_imgIn an attempt to jointly tackle the drug menace in the country’s northern region, six States — Haryana, Himachal Pradesh, Punjab, Rajasthan, Uttarakhand and Delhi — and the Union Territory of Chandigarh on Monday decided to set up a centralised secretariat at Panchkula (Haryana) where nodal officers from each State will be deputed for sharing intelligence and information.The decision was taken at the regional conference of the Chief Ministers organised here by the Haryana government on the issue of “Drug menace, challenges and strategies”.A joint statement, released after the conference, said that it was agreed that there was a need for more proactive and quick information exchange on drug trends, cases registered and persons named, wanted or arrested.Video conferencingThe meeting was attended by Haryana CM Manohar Lal Khattar, Uttarakhand CM Trivendra Singh Rawat, Punjab CM Amarinder Singh while their Himachal Pradesh counterpart Jairam Thakur joined them through videoconferencing. Senior officials representing Rajasthan, Delhi and Chandigarh also participated.“We hope to ‘deliver as one’ with the full might of the law in a crusade-like manner to break and demolish the supply chains. We agreed on setting up of a permanent secretariat for this in Panchkula. That there would be monthly meeting of our special task forces and quarterly meetings at the level of Home Secretaries to build inter-agency trust,” said the statement.It was also decided to invite the Uttar Pradesh Chief Minister and senior officers from Jammu and Kashmir in future and involve them in the anti-drug strategy implementation.Mr. Thakur said that the Himachal government was contemplating evolving a mechanism for regular medical check-ups in schools to detect early signs of drug abuse. “Long-term strategy should also be chalked out to engage youth in constructive activities. Besides, parents should also keep an eye on abnormal behaviour of their teenage children,” he said.Mr. Rawat stressed on strengthening the intelligence network, saying that information and data sharing was critical to making this fight a success.Capt. Amarinder called for effective sealing and surveillance along the international and the State borders. He suggested strengthening of Border Security Force presence and intensification of its patrolling by making use of technical gadgets to make its surveillance effective, especially during night hours and the foggy season.last_img read more

Continue Reading