Tags Tech Industry 15 Comments Tuesday is Equal Pay Day. Getty Images While Equal Pay Day might sound like some kind of holiday, it’s actually a stark reminder that men and women don’t always get paid equal money for equal work.In fact, when looking at part-time and full-time workers in the US, women earned about 85 percent of what men did in 2018, according to data released in March from the Pew Research Center.The annual marker, which falls on Tuesday this year, symbolizes how far into this year women would have to work in order to have earned as much as men did in the previous year. Usually around Equal Pay Day, there’s a new offering of research from various sources shedding light on how and why that is. In the tech industry— which regularly grapples with numbers that show it’s predominantly made up of white men— disparity in pay is shrinking, but slowly. Glassdoor, a site that corrals employment information on companies, looked at more than a half million salary reports and found that at the pace we’re going, it’s going to take 51 years to close the pay gap. In its March report, called Progress on the Gender Pay Gap: 2019, Glassdoor found the adjusted pay gap in tech is 5.4 percent, above the national average of 4.9 percent. The adjusted pay gap incorporates factors such as experience and education when comparing the earnings of men and women. While it’s improving, the gap has closed just 0.5 percentage point since 2016.”It’s not a surprise that there’s still a fairly large gap when you consider the fact that most of the highest paying jobs are still predominantly male,” said Daniel Zhao, a senior economist who worked on the report.Tech recruiting platform Hired also put out a report last week called The State of Wage Inequality in the Workplace, and found that when men are offered the same job role women, they’re offered higher salaries 60 percent of the time. The report also found that in the tech industry, white and Asian women made 97 cents for every dollar white and Asian men made. The amount dropped for black (89 cents) and and Hispanic women (91 cents).Meanwhile, not all tech workers are convinced there’s a problem. The reported stated that “64% of female survey respondents believe a racial wage gap exists due to racial identity, while 54% of men believe it exists.”Over the years, some companies have set goals to close their pay gaps. Tech companies like Salesforce, Intel and PayPal have all said they’ve closed their pay gaps. “There’s a cultural phenomenon where women are paid less,” Salesforce CEO Marc Benioff told 60 Minutes in April 2018, when recounting how the company conducted an audit to correct its pay imbalance. (Editor’s note: 60 Minutes is owned by CNET’s parent company, CBS.)One reason progress in tech might be slow, Zhao said, is because there are so few women in the field to start with. He said that industries making quicker progress, like the nonprofit world, tend to be already more gender-balanced.It isn’t just money that women are missing out on. “People spend a third of their lives at their jobs,” Zhao said, “a lot of their overall happiness and satisfaction with life is tied up into how they feel about their job… reducing the amount of discrimination and stress is really important.” Share your voice
Baba BhaskarTwitter/StarMaaBigg Boss is all about controversies between 15 people who live together in a house for 100 days. Of course, one contestant gets eliminated every week. But each contestant competes with the other and that is something we all are interested in seeing.The Telugu Bigg Boss season 3 has been in the middle of controversies since its beginning. In the third week of the show, with 2 contestants have been eliminated and a wild card entry, the total count stands at 14 people now.While all the contestants are involved in some argument, fight and controversy, there are three contestants in this house who are least bothered about what is happening around them. Wondering who they are? Let us tell you that it is none other than Baba master, Himaja and Ashu Reddy.The three contestants have been playing the game really well. Well, Baba master is in fact the hero of the house for being a really good person. He takes care of everyone in the house and does all the possible house chores. In fact, he even cooks for everybody.Himaja and Ashu Reddy have both been courteous with the contestants and are making sure that they don’t get into unnecessary arguments and fights. Himaja ReddyTwitter/StarMaaThough contestants call Himaja an aggressive person, she has explanations for being so and is pretty much clear about what she wants, what she bears and what she doesn’t.Ashu Reddy also looks plain hearted and is not getting into any unnecessary fights. She is completing her tasks, doing the assigned work and is genuine with everyone without grudges for her fellow contestants.These people, especially in Bigg Boss house, are pretty rare to find. This is why these people have a special place in the audience’s heart.
Germany’s domestic security chief warned Sunday that the country’s radical Islamist scene is not only growing, but becoming more decentralised, posing greater challenges to surveillance operations.In an interview with national news agency DPA, Hans-Georg Maassen also defended security officials under fire after it emerged that Berlin truck attack suspect Anis Amri had slipped through their net, saying they had done everything they could.Overall, the number of Salafists—or fundamentalist Sunni Muslims—in Germany has risen to more than 9,700, sharply up from 3,800 people in 2011, said Maassen.“It’s of great concern to us that this scene is not only growing, but it is also very diversified. There is not just one, two, three or four people who have a say,” he warned.“Rather, there are many people who dominate this Salafist scene. And all these people have to be watched.”While in the past, there were a few people who wielded influence, today, there are many small clusters formed by individuals.“So you can no longer talk about a Salafist scene as a whole, but you have to deal with many hotspots. That makes things more difficult for us, because we can no longer just watch a few people. We have to monitor many groups,” he said.In a defence of security officials under pressure for failing to stop Amri, Maassen said that although officers had watched the Tunisian over a long period of time, they found no evidence to arrest him.“I believe that the security forces, in particular the police, have done everything in their power to assess the danger posed by Amri. But it is also clear that we live under the rule of law, and the legal framework must be respected,” he said.Amri, 24, who was shot dead by Italian police days after ramming a truck into a crowded Christmas market, had been under surveillance since March. But German police dropped their watch in September thinking he was a small-time drug dealer.Public anger also mounted as the rejected asylum seeker and known radical Islamist should have been deported long ago.In the wake of the attack, Chancellor Angela Merkel admitted that “the Amri case raises questions” and ordered a sweeping review of Germany’s security apparatus.
PausePlay% buffered00:0000:00UnmuteMuteDisable captionsEnable captionsSettingsCaptionsDisabledQuality0SpeedNormalCaptionsGo back to previous menuQualityGo back to previous menuSpeedGo back to previous menu0.5×0.75×Normal1.25×1.5×1.75×2×Exit fullscreenEnter fullscreen Play A movie of the trajectory of power output vs. wind speed signals for a wind turbine reveals very turbulent fluctuations. Credit: Patrick Milan, et al. ©2013 American Physical Society “Looking at an operating wind turbine, one may get the impression that the turbine turns smoothly, but looking at the power output, which is the consequence of the forces and torques inside the machinery, we see that the fluctuations are very turbulent,” Peinke told Phys.org. “Changes of MW (more than one thousand horsepower) in seconds become obvious. Thus one may compare a wind turbine with an airplane in the landing phase during a very windy situation. From outside, the airplane may look it’s going quite smoothly, but inside there is another impression caused by turbulent dynamics. One should also note that a wind turbine has to operate permanently in this ‘turbulent landing’ condition.” Citation: Wind turbines operate under great turbulence, with consequences for grid stability (2013, April 19) retrieved 18 August 2019 from https://phys.org/news/2013-04-turbines-great-turbulence-consequences-grid.html Journal information: Physical Review Letters Copyright 2013 Phys.org All rights reserved. This material may not be published, broadcast, rewritten or redistributed in whole or part without the express written permission of Phys.org. The model also reveals that moderately intermittent wind power is converted to highly intermittent power output. In other words, wind turbines do not only transfer wind intermittency to the grid, but they also amplify it. For instance, the researchers observed that changes in wind speed of about 11 m/s within 8 seconds may cause nearby wind turbines to change their power output by about 80%. The researchers attribute this amplification to the nonlinear conversion process and fast reaction time of the output to changes in wind speed.”The features of small-scale turbulence are mapped by the wind turbines directly into the electric grid,” Peinke said. “As turbulence and in particular the statistics of small-scale wind fluctuations are still considered to be an unresolved problem, this lack of knowledge may become important in the power grids, especially if such power grid are dominated by wind power. As these phenomena take place in the range of seconds, the dynamics of the power grid in these time scales have to be investigated in detail. One has clearly to state that the first step to solve a problem is to be aware of it and to understand it.”The data also shows that wind power intermittency does not only affect the output of individual turbines, as previous research has shown, but it also extends to entire wind farms, which has not been observed before. The researchers explain that wind farm intermittency is somewhat counterintuitive, since it might be expected that summing the output of wind turbines will average out their turbulent fluctuations. However, wind farm intermittency may be explained by long-range correlations observed in winds. While the wind farm the scientists observed covered an area of about 4 km2, wind correlations have previously been observed to extend to lengths of hundreds of kilometers. Based on these observations, the researchers expect that wind farm intermittency effects may persist up to these large scales.Overall, the physicists conclude that their results stress the importance of accounting for the intermittent and multifractal nature of wind power when designing components for wind power, including energy storage technologies. They note that the situation is similar to the findings from many years ago of the intermittent and multifractal nature of the stock market. In both areas, frequent occurrences of fluctuations must be understood and accounted for in order to maintain stability and avoid widespread disruption.In the future, the researchers plan to further investigate the consequence of wind turbulence on grid stability and develop methods to minimize the negative effects. New turbulence models may help lead to new concepts that reduce the power and load fluctuations on the grid.”For all of these topics, a deep and comprehensive understanding of the complexity of turbulence is indispensable,” Peinke said. Explore further Using fluctuating wind power (Phys.org) —While previous research has shown that wind turbulence causes the power output of wind turbines to be intermittent, a new study has found that wind turbulence may have an even greater impact on power output than previously thought. The researchers modeled the conversion of wind speed to power output using data from a rural wind farm. The results showed that the intermittent properties of wind persist on the scale of an entire wind farm, and that wind turbines do not only transfer wind intermittency to the grid, but also increase it. The findings highlight the importance of fully understanding the physics of wind turbulence in order to ensure future grid stability. The researchers, Patrick Milan, Matthias Wachter, and Joachim Peinke, at the ForWind—Center for Wind Energy Research at the University of Oldenburg in Germany, have published their study “Turbulent Character of Wind Energy” in a recent issue of Physical Review Letters.In their paper, the researchers address the challenges that large-scale wind energy production may bring to future power grids. They explain that today’s grids are powered mainly by a few large generators with controllable input (mostly gas, coal, hydraulic, and nuclear power plants). Power generation from these sources can be modified automatically in order to balance power generation and consumption, and thus ensure grid stability. But while today’s power sources are largely controllable, wind power is uncontrollable and highly intermittent. For time scales larger than several minutes, the conversion of wind speed into electrical power can be modeled by a standard average power curve. But at smaller time scales, the researchers found that the conversion process diverges from this curve. Instead, short-scale conversion follows a more complex pattern involving multifractal scaling that is reminiscent of a 1962 theory of turbulence developed by mathematician Andrey Kolmogorov. Screenshot of a movie (see below) showing the power output vs. wind speed signals for a wind turbine. Credit: Patrick Milan, et al. ©2013 American Physical Society More information: Patrick Milan, et al. “Turbulent Character of Wind Energy.” PRL 110, 138701 (2013). DOI: 10.1103/PhysRevLett.110.138701 This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.
Two treasure hunters claim to have found a mysterious Nazi train which disappeared on its way to Germany from Hungary in 1945 carrying guns, gems and other valuable items, including paintings estimated to be worth up to USD 200 million.A Pole and a German claim to have located the train and are seeking 10
In an initiative to strengthen tourism and to promote the culture of Jammu and Kashmir, Tourism Department organised a massive road show at Lalit Hotel in the national Capital. North India’s prominent travel trade representatives were invited to witness the impressive presentation from the department which showcased Jammu and Kashmir as one of the best destinations for its natural beauty, landscapes, gushing water streams, adventure tourism, crafts and cuisine, history and heritage, adventure tourism, lake tourism, MiCE and golf tourism. Also Read – ‘Playing Jojo was emotionally exhausting’Farooq Ahmed Shah, Secretary, Tourism briefed the gathering about the 5500 year old history of Kashmir, the heritage and hospitality of the state for which Jammu and Kashmir is famous all over the world. He assured to provide best and upgraded services to visitors in 2016.RK Verma, Director, Tourism, Jammu; Mahmood A Shah, Director, Tourism, Kashmir and other officials of Tourism, JKTDC and SKICC were present at the road show.
December 19, 2017 Free Workshop | August 28: Get Better Engagement and Build Trust With Customers Now Enroll Now for Free Opinions expressed by Entrepreneur contributors are their own. 6 min read This hands-on workshop will give you the tools to authentically connect with an increasingly skeptical online audience. As holiday shoppers attempt to “wow” their friends, families and coworkers with the top presents of the season — think Amazon Echos, smart TVs and internet-enabled toys — they could be inadvertently exposing their giftees to a world of cybersecurity pain. Unfortunately, hackers looking to expand their attacks beyond networks and emails have set their sights on devices that are connected to our home networks.Despite the recent security issues with IoT devices (i.e. smart teddy bear flaw), a recent survey found that 65 percent of millennials are unaware of IoT risks and the same percentage don’t take this type of security seriously. However, with stockings already being hung by the chimney with care, it’s important to raise awareness about the types of threats plaguing these devices. Before making those final purchases, let’s explore which popular items are most at-risk and ways in which owners can secure their new toys.Related: Government Agencies and Hospitals Face Increasing Risk of IoT-Powered CyberattacksHo-Ho-Hold the Phone — Consider These Potential RisksThe newest, hottest devices are obviously high on holiday wish lists, and for good reason! Many of them are not only fun additions to the home, but also add a significant convenience factor when it comes to day-to-day activities like switching lights on and off, controlling music, locking doors and entertaining children. However, before bringing these items into the home, it’s important for consumers to weigh the pros and cons.One of the biggest risks associated with installing IoT devices revolves around the loss of privacy. As IoT evolves, devices that have video cameras in them should be avoided at all costs. We’ve seen vulnerabilities appear within connected cameras time and time again — see examples here and here. While using IoT cameras externally for security purposes makes sense, bringing them into the home can be, and has been, an issue.Besides security cameras, we are seeing video capabilities in TVs, toys and even appliances such as vacuum cleaners. Before purchasing and gifting these items, shoppers need to think long and hard about the potential implications.Related: 3 Reasons Why IT Security Must Be a Top Concern for Tech StartupsSo, Which Devices are on Santa’s Naughty List?Over the last year, there have been a number of toys designed for children that pose serious risks — the Cayla doll is a prime example. Unfortunately, as manufacturers continue to develop and release connected toys, security is not always top of mind when installing components like remote audio and/or video capabilities. Combined with the fact that children can easily be preyed-upon, shoppers should take great caution when selecting any internet-embedded technology device for a child.From a connected home perspective, smart speakers are a perfect example of a risky addition to the household. While these items will be all the rage this year, it’s important to evaluate the security implications. We saw just last month the BlueBorne vulnerability that left prominent devices within this category vulnerable to hackers via just a Bluetooth connection — through this, malicious actors could feed smart speaker owners false information (i.e. traffic reports and inaccurate schedules) and even spy on victims. And the scariest part? If a hacker gained control of the connected device, they could potentially spread to other networked devices or eavesdrop on network traffic communication.Additionally, smart systems that are used to control door locks and garage-door openers are being exposed by hackers. Apple’s HomeKit is the most recent example. As usual though, Apple was able to fix the issue quickly via a server-side patch.Related: Why Millennials Don’t Worry That Much About Online SecurityDoes This Mean IoT Devices Should be Taken Off Our Wish Lists?Let’s be realistic — the entire holiday shopping population isn’t going to abandon purchasing IoT devices as gifts due to the chance that they might be hacked. And, to be honest, a number of items still make great gifts — for example, ones that add convenience and entertainment like automation for lighting and switched outlets.With that said, consumers still need to do their due diligence for securing these items and be especially cautious with devices that contain video cameras. A few questions to ask before purchasing an IoT device include:Who is the manufacturer? Is it someone reputable, or a suspicious knock-off that may save you a few bucks? Look for products issued by companies like Amazon, Apple, Bose and Google this holiday season. Many of these companies — like Amazon and Google — have patching solutions already in place, so in the event that a vulnerability does arise, they can quickly mitigate the issue. It may cost more up-front, but the savings from a potential security breach are greater by leaps and bounds.What are the known vulnerabilities? Before completing your purchase, do a quick search to see if any security vulnerabilities have been discovered previously in your gift. Is the first Google search result on that product you’ve been eyeing a vulnerability exploit/issue? If so, you might want to stay away from that one and consider another gift.Will the device update automatically? Ensuring that the latest firmware is installed on any internet-connected device is of utmost important. Old firmware equals new entry points for malicious actors. One of the easiest ways to ensure this is the case is to buy devices that update automatically and don’t require manual firmware installations.IoT is Coming to TownWhether we like it or not, these devices are in our homes. Fear not, though, if you’ve already purchased and wrapped these gifts for your loved ones and coworkers. Give the gift of security this year and pass along these helpful tips with your connected purchase:Use the tech as it was intended: Make sure the device is deployed properly and used the way it was designed. Follow installation directions completely and double check that the latest firmware is installed.Change default password: Never stick with what’s given! Also, when selecting a new password, follow the same procedures you would when selecting one for your online bank account. Don’t use any of your personal information — that includes Fido’s name — and avoid passwords that contain words/phrases that can be associated with you, your business and/or personal life. In addition, don’t reuse passwords across multiple devices/accounts.We have enough to worry about this holiday season with 10s of family members running around the house fueled by eggnog and candy. Don’t let cybersecurity add yet another thing to your checklist. Follow these simple IoT security tips to ensure a carefree holiday for you and your loved ones.