Hong Kong Airport forced to close for a second day

first_imgHong Kong Airport has been forced to close for a second-day reports NBC.NBC said that “all check-in services at Hong Kong airport’s main terminal shut down for a second day on Tuesday after protesters blocked the entrance of the building.”Arriving flights are not impacted.“Terminal operations at Hong Kong International Airport have been seriously disrupted as a result of the public assembly at the airport today,” the airport announced in a statement sent to reporters it says.All check-in service for departure flights were suspended at 4:30 p.m. the airport authority added. Other departure and arrival flights for the rest of the day would continue, it said.It told members of the public not to come to the airport.The shut down will cause massive knock-on disruptions for days particularly for Cathay Pacific Airways which will have many aircraft and crews out of position.The disruptions will also have a significant impact on forward bookings with intending or booked passengers changing plans to avoid Hong Kong.Hubs such as Singapore and Seoul and their airlines will be major beneficiaries.last_img read more

Aligning Theft Prevention with Changes in Criminal Behavior and Business Needs

first_imgToday’s shoplifters are becoming more brazen than in the past, according to a recent survey by the National Retail Federation. This disturbing trend is putting enormous pressure on retailers that want to both prevent loss and keep associates safe. Additionally, some of the industry’s most enduring loss prevention strategies have now been rendered less effective.“Shoplifters are bolder and not afraid of setting off alarms at the door,” explained Robb Northrup at siffron, which manufactures retail merchandising fixtures and displays. “They know that if they can get to the exit, they are as good as gone.”Because trying to stop theft at the store’s door places employees at substantial risk of harm, retailers have largely resigned themselves to watching thieves—and their merchandise—run off. This feeling of powerlessness is reflected in the results of the 2019 National Retail Security Survey, which found that the average retailer made six times fewer shoplifting stops last year than in 2015. There has not been the same decline in losses from shoplifting, of course.- Sponsor – This problem has left stores searching for answers. “We’ve seen several retailers moving back to locking product away in high-theft stores to stop the flow of merchandise being stolen from those locations,” said Northrup. “But that isn’t progress.”According to Northrup, while locking away product may cut certain types of shrink, it also cuts into profit—up to 80 percent for some product categories. Limiting access to high-theft products discourages legitimate customers from accessing merchandise, driving lost sales, and frustrating customers.Understanding customers’ pain points and knowing current trends in store theft, siffron has been moving loss prevention away from the exit door and back into the store. siffron’s LM Tag™ combines a light sensor and a motion detector and alerts store personnel when the product is both in motion and concealed in a bag, under a coat, or in a pocket. Store personnel are directed to the point of concern inside the store, rather than after merchandise has been carried into the parking lot.siffron’s SONR loss prevention line alerts store staff of shoplifting at the point of theft. SONR includes a battery-operated hook with an anti-sweep design and an echo box that emits an “activity beep” each time the integrated label is lifted to remove items, one by one. Instead of notification at the door, the solution creates awareness of activity while there is still time—time for staff to address a potential offender safely with standard service practices and time for a potential shoplifter to feel pressure to change his or her mind.Don’t lock up your merchandise. Reduce shrink while increasing sales with intelligent loss prevention solutions from siffron!“The idea is to simplify the process and initiate notifications at the display level,” explained Northrup. “While offenders are more prone to dash once they reach the doors with existing solutions, they still are generally risk-averse. When attention is drawn to them at the display level inside the store, even with something as simple as a beep upon product removal like we have with the SONR system, offenders are more likely to leave that merchandise alone as attention is drawn to them and their activity.”But does it work? Northrup acknowledged that some LP practitioners are not immediately convinced that using audible cues can be an effective theft deterrent. However, the idea that environmental cues can be used to influence behavior is well documented.Research studies illustrate how subtle cues can push people toward honest behavior. In a ten-week study by the Evolution and Behavior Research Group (University of Newcastle), employees paid for cafeteria drinks on the honor system while a poster of a person’s eyes hung on a nearby wall; for an additional ten weeks, they paid for drinks under a poster of flowers. Astonishingly, people paid 2.8 times as much money for similar products when the poster of a person’s eyes watched over them, showing how subtle cues of authoritative observation can prevent adverse behavior. Studies of music and other auditory cues have similarly demonstrated a significant ability to influence moral decision-making and deter people from unethical and counterproductive behaviors.Many LP retailers are drawn to the simplicity of siffron’s effective approach. Northrup noted that some solutions in the market have gotten highly complicated, cumbersome, and difficult to use – such as requiring external power sources, specialized installation hardware, and complex wiring and electrical cables running through fixtures. Wireless and easy to install, siffron’s loss prevention solutions not only deter criminals, but they also adhere to today’s demanding business needs.“Retailers need solutions that are as plug-and-play as possible,” he explained. “With the ever-changing retail environment, retailers need to be nimble in their display approach and able to adjust their planograms on the fly as much as possible.” LP teams also need to target problem areas or SKUs, while some high-cost security solutions and equipment cannot differentiate between low- and high-value SKUs.Ultimately, LP professionals are convinced when they see concrete results from this new approach to security, said Northrup. “It’s when they see their shrink numbers decrease, sales increase and the ROI proves itself out in months, not years.”   Stay UpdatedGet critical information for loss prevention professionals, security and retail management delivered right to your inbox.  Sign up nowlast_img read more

The Movement to “Save Google Wave”

first_imgTags:#cloud#cloud computing#saas Why Tech Companies Need Simpler Terms of Servic… The news of Google Wave’s demise caught many of us by surprise. The service had been available for only about a year. It had just joined Google Apps. Google maintained that they had not seen strong adoption. This may be true but it did have a core community that is none too pleased about Google’s decision.So much so that a group has created “Save Google Wave,” a website dedicated to keeping Google Wave from being shuttered. The site provides different ways for people to express their support for Google Wave. As of this evening more than 19,400 people have given a “thumbs up,” for saving the service. The Twitter account has 360 followers. More than 250 people have retweeted the site and 70 have given it a Digg.Oh yes, and you can buy a t-shirt or a button. We’re not sure what that is for except perhaps to give the developers a bit for the work they are doing to raise awareness. It would help if they provided a disclaimer of some sort. These are not huge numbers. But more illuminating are the emails in support of Google Wave. These include those from a physicist, a student collaborating on a novel with his girlfriend and a software developer.“I am a technology student and have been working on a fiction novel for past few months. I collaborate with my girlfriend for the story who lives across the world. Google wave gives us a great way to Add, edit, argue, change, disagree and elaborate on the story all at once in real time. I see no other tool can provide that in present date. I love it. It’s a bit ahead of time product for sure, I think it should be worth waiting for people to come up with ways to use it in time. “Save Google Wave shows the effect that a large company like Google can have. To its credit, Google is releasing much of the technology to the open-source community. Unfortunately, many of the supporters may not be technically oriented to develop a service from open-source components. But perhaps their numbers will be strong enough to make Google at least think a bit more about the impact it has when a service is shuttered. alex williams Top Reasons to Go With Managed WordPress Hostingcenter_img 8 Best WordPress Hosting Solutions on the Market Related Posts A Web Developer’s New Best Friend is the AI Wai…last_img read more

How do you record audits against software?

first_imgIn the world of effective software inventory management there are audits. Those audits are done comparing the software to physical installations or against budget. There are audits performed when a HFE (Human Factors Engineer) analyzes your usability or those done to ensure that you have sufficient disaster recovery elements in place.This happens every day against dozens of software applications and I have to ask the question — where do you record this data? Does everyone have individual approaches and simply has a spreadsheet containing the data? Is it recorded anywhere?I have to wonder where the value is in gathering data that has no reuse or exposure to the owners of the software solutions.So I’ve been bouncing around an enhancement to allow certain groups to register (and report) on audits. Internally some people hate it and some love it.What do you do?Do you have yet another application for capturing software audits?Do you do them at all?Let me know.Previous topics include Application inventory, what do you capture?,  Application inventory starts with a definition, Application inventory as a cost savings initiative, Application Inventory, the start of data sustainability? and How do you measure data quality in your Application Inventory?.last_img read more

Three Chinese teams join race to build the world’s fastest supercomputer

first_img TIANJIN, CHINA—In a cavernous room just off the marble floored lobby of China’s National Supercomputer Center of Tianjin stand more than 100 wardrobe-size black and gray metal cabinets, arranged in ranks like a marching army. They contain the Tianhe-1A supercomputer, which 8 years ago became the first Chinese machine to reign, briefly, as the world’s fastest computer, running at 2.57 petaflops (or quadrillion floating point operations per second). But just upstairs from Tianhe-1A—and off-limits to visitors—is a small prototype machine that, if successfully scaled up, could push China to the top of the rankings again. The goal is a supercomputer capable of 1 exaflop—1000 petaflops, five times faster than the current champion, the Summit supercomputer at Oak Ridge National Laboratory in Tennessee.China is vying with the United States, Europe, and Japan to plant its flag in this rarefied realm, which will boost climate and weather modeling, human genetics studies, drug development, artificial intelligence, and other scientific uses. But its strategy is unique. Three teams are competing to build China’s machine; the Tianjin prototype has rivals at the National Supercomputing Center in Jinan and at Dawning Information Industry Co., a supercomputer manufacturer in Beijing. The Ministry of Science and Technology (MOST) will probably select two for expansion to exascale by the end of the year. The approach is a chance to spur innovation, says Bob Sorensen, a high-performance computing analyst at Hyperion Research in St. Paul. It “encourages vendors to experiment with a wide range of designs to distinguish themselves from their competitors,” he says.China may not be first to reach this computing milestone. Japan’s Post-K exascale computer could be running in 2020. The United States is aiming to deploy its first exascale system at Argonne National Laboratory in Lemont, Illinois, in 2021. The European Union is ramping up its own program. China is aiming for 2020, but the date may slip.Sign up for our daily newsletterGet more great content like this delivered right to you!Country *AfghanistanAland IslandsAlbaniaAlgeriaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBolivia, Plurinational State ofBonaire, Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarussalamBulgariaBurkina FasoBurundiCambodiaCameroonCanadaCape VerdeCayman IslandsCentral African RepublicChadChileChinaChristmas IslandCocos (Keeling) IslandsColombiaComorosCongoCongo, The Democratic Republic of theCook IslandsCosta RicaCote D’IvoireCroatiaCubaCuraçaoCyprusCzech RepublicDenmarkDjiboutiDominicaDominican RepublicEcuadorEgyptEl SalvadorEquatorial GuineaEritreaEstoniaEthiopiaFalkland Islands (Malvinas)Faroe IslandsFijiFinlandFranceFrench GuianaFrench PolynesiaFrench Southern TerritoriesGabonGambiaGeorgiaGermanyGhanaGibraltarGreeceGreenlandGrenadaGuadeloupeGuatemalaGuernseyGuineaGuinea-BissauGuyanaHaitiHeard Island and Mcdonald IslandsHoly See (Vatican City State)HondurasHong KongHungaryIcelandIndiaIndonesiaIran, Islamic Republic ofIraqIrelandIsle of ManIsraelItalyJamaicaJapanJerseyJordanKazakhstanKenyaKiribatiKorea, Democratic People’s Republic ofKorea, Republic ofKuwaitKyrgyzstanLao People’s Democratic RepublicLatviaLebanonLesothoLiberiaLibyan Arab JamahiriyaLiechtensteinLithuaniaLuxembourgMacaoMacedonia, The Former Yugoslav Republic ofMadagascarMalawiMalaysiaMaldivesMaliMaltaMartiniqueMauritaniaMauritiusMayotteMexicoMoldova, Republic ofMonacoMongoliaMontenegroMontserratMoroccoMozambiqueMyanmarNamibiaNauruNepalNetherlandsNew CaledoniaNew ZealandNicaraguaNigerNigeriaNiueNorfolk IslandNorwayOmanPakistanPalestinianPanamaPapua New GuineaParaguayPeruPhilippinesPitcairnPolandPortugalQatarReunionRomaniaRussian FederationRWANDASaint Barthélemy Saint Helena, Ascension and Tristan da CunhaSaint Kitts and NevisSaint LuciaSaint Martin (French part)Saint Pierre and MiquelonSaint Vincent and the GrenadinesSamoaSan MarinoSao Tome and PrincipeSaudi ArabiaSenegalSerbiaSeychellesSierra LeoneSingaporeSint Maarten (Dutch part)SlovakiaSloveniaSolomon IslandsSomaliaSouth AfricaSouth Georgia and the South Sandwich IslandsSouth SudanSpainSri LankaSudanSurinameSvalbard and Jan MayenSwazilandSwedenSwitzerlandSyrian Arab RepublicTaiwanTajikistanTanzania, United Republic ofThailandTimor-LesteTogoTokelauTongaTrinidad and TobagoTunisiaTurkeyTurkmenistanTurks and Caicos IslandsTuvaluUgandaUkraineUnited Arab EmiratesUnited KingdomUnited StatesUruguayUzbekistanVanuatuVenezuela, Bolivarian Republic ofVietnamVirgin Islands, BritishWallis and FutunaWestern SaharaYemenZambiaZimbabweI also wish to receive emails from AAAS/Science and Science advertisers, including information on products, services and special offers which may include but are not limited to news, careers information & upcoming events.Required fields are included by an asterisk(*)Being first is not China’s only goal, however. Having three competing teams will ensure broad-based technological advancement in computer chips, operating software, networking, and data storage technologies, says Meng Xiangfei, a physicist leading exascale application R&D for the center here. Building domestic capacity is particularly important for central processing units (CPUs) and specialized chips called accelerators, which boost a computer’s performance. China relied on U.S.-made Intel CPUs for several generations of supercomputers, says Jack Dongarra, a computer scientist at the University of Tennessee in Knoxville, but in 2015, the U.S. government barred the export of certain chips for security reasons. That move “provoked the Chinese government to make a heavy investment” in processors, he says. All three exascale prototypes use chips made in China.The three-team strategy also allowed MOST to share costs with regional governments, which hope that a leading edge supercomputer will spur technological development and lure institutes and businesses. Qian Depei, a computer scientist at Beihang University in Beijing who serves on MOST’s exascale evaluation team, says the prototypes cost about $9 million each; MOST put up half and the rest came from local sources.The prototypes have faced a battery of tests for speed, stability, and energy consumption plus trial runs of software from different application areas, but the results are “very secret,” Meng says. The final budget is also unclear, though at the outset a governmental advisory committee estimated one exascale computer would cost 2 billion to 3 billion yuan ($288 million to $432 million).Even after the two winners are announced, Qian says the third team will probably remain involved so the expertise they’ve acquired is not wasted. Scaling up the prototypes, which operate in the range of 3 petaflops, will mean interconnecting enough CPUs and accelerators to reach an exaflop, refining the liquid cooling systems needed to remove heat and improve efficiency, and perfecting the operating software needed for the massively parallel arrangement of processors to work together.China once lagged in developing application software needed to do interesting science with supercomputers, but it has been catching up, Meng says. For the past 2 years, Chinese groups have won the Gordon Bell Prize presented annually by the Association for Computing Machinery for innovations in applying high-performance computing to science, engineering, and large-scale data analytics. Chinese scientists are now working on new applications, says Yang Meihong, director of the Jinan center. For example, going to exascale will allow a dramatic improvement in the spatial resolution of global atmospheric models, “which will be greatly significant for a deeper understanding of the mechanisms of climate change,” she says.The United States still dominates among the truly powerful supercomputers used for research, with 21 systems in the top 50 to China’s two. But scientists play down the ranking’s importance. “Having the top 500 No. 1 supercomputer—that’s pretty good, but that’s not the goal,” Qian says. “The real measure should be what kind of new science we have as a result of these computers,” Dongarra says. VCG/GETTY IMAGES By Dennis NormileOct. 24, 2018 , 1:45 PM Tianhe-1A was the world’s fastest computer in 2010. Its successor is being developed in the same building. Three Chinese teams join race to build the world’s fastest supercomputer last_img read more

FIFA’s Chuck Blazer admitted taking bribes for World Cup votes

first_imgA former executive committee member of football’s global governing body FIFA told a US judge in November 2013 that he and other officials took bribes in connection with the 1998 and 2010 World Cups, among other major tournaments.Chuck Blazer, a US citizen, secretly pleaded guilty to 10 criminal counts in New York as part of an agreement with US prosecutors, according to a partially blacked out transcript of the hearing released on Wednesday.According to US officials, Blazer’s cooperation helped build a sprawling corruption case that has led to charges against top FIFA figures and prompted the resignation on Tuesday of longtime president Sepp Blatter.Blazer served as an executive committee member of FIFA from 1997 to 2013 and was the general secretary of CONCACAF, soccer’s governing body in North and Central America and the Caribbean, from 1990 to 2011.”Among other things, I agreed with other persons in or around 1992 to facilitate the acceptance of a bribe in conjunction with the selection of the host nation for the 1998 World Cup,” Blazer told US District Judge Raymond Dearie during a closed-door proceeding in Brooklyn federal court on the morning of November 25, 2013, according to the transcript.Though France won the bidding to host the tournament, separate court documents claim Morocco paid the bribe in connection with the 1998 World Cup.Blazer added that from 2004 to 2011, “I and others on the FIFA executive committee agreed to accept bribes in conjunction with the selection of South Africa as the host nation for the 2010 World Cup.”U.S. authorities have said South Africa paid a $10 million bribe while bidding to be the 2010 World Cup host. The country has confirmed the payment but said it was a donation to support soccer development in the Caribbean, not a bribe.advertisementBlazer also admitted to taking kickbacks related to five different editions of CONCACAF’s premier event, the Gold Cup, between 1996 and 2003.”I knew my actions were wrong at the time,” he said.A lawyer for Blazer declined to comment.Many of the details were revealed in documents released by US authorities last week, when they announced indictments for 14 people, including nine FIFA officials.Blazer, 70, is one of four defendants in the case who pleaded guilty in secret and agreed to assist US investigators.During his plea, he said he suffered from health problems. Friends of Blazer say he is currently hospitalized and unable to speak due to a breathing tube.last_img read more