Page 1,954«..1020..1,9531,9541,9551,956..1,9601,970..»

Megapersonals App Download: All About The App You Should Know! – Newsbreak

Through a regular online browser, Mega Personal Apk provides user-controlled encrypted cloud storage and specific mobile apps. Your data is solely encrypted and decrypted by your client device and never by us, in contrast to other cloud storage providers.

From any device, you can find, store, download, stream, view, share, rename, and delete the files you upload from your smartphone or tablet. Share folders with your connections so you can keep up with their updates. We are unable to access your password or reset it due to the encryption process. You must remember this, else you risk losing access to your saved files (unless you have a backup of your recovery key).

Complete anonymity is made possible with end-to-end, user-encrypted massive video chat, which has been made available through the browser since 2016. This has been expanded to our mobile app, enabling access to conversation history across a variety of platforms. Users can quickly upload files from their huge cloud drive to chat.

MegaPersonal Apk Download offers premium plans with bigger storage limits and a commendable 20 GB of free storage space with bonuses for all registered users:

The Mega Personal Dating App Apk is accessible to people of different nations and can also be found through a dating website.

Immediately after clicking Mega Personal App. If you are at least 19 years old, a pop-up will question you.

You will be prompted to select a region from Canada, the United States, Europe, or Oceania on the MegaPersonal Apk Dating App Apk.

Users will notice a notification declaring that the website is only for those who are at least 21 years old as soon as they enter it.

A website that offers classified services for those who want to meet right away is Megapersonals App Download. Ad responses can be made by users via phone, text, or email.

The Mega Personal Dating App can be downloaded from the Google Play Store and Apple App Store. To download the app from the Google Play Store for Android, do the following:

The massive personal dating app is also available on other international dating websites. As soon as you click on Megapersonals.EU, a pop-up stating that you are at least 19 years of age or older will appear. Mega Personal App also requests that you select a location from among those in Canada, the United States, Europe, and Oceania. Anyone above the age of 21 can see the sites news after installing it. A website called Mega Personal Ads provides a range of options for those looking to meet up right away. Ad responses might come from users via email, SMS, or phone.

This is one of the other things, as opposed to a lot of fantastic apps and what you can get right now. This is not your typical dating app because it offers much more than just a different dating-related advertising service.

ALSO READ: PixaMotion for PC Free Photo Editing on Windows 10 and Mac

You can use this to post advertisements targeted at particular demographics. Set it to be men, women, onlookers, etc. and respond here by advertisement, SMS, phone, or email!

By clicking the aforementioned button, you may begin the download of the App. The APK can be found in your browsers Downloads section once the download is finished. You must first ensure that third-party apps are permitted on your phone before you can install it.

The steps to accomplish this are mostly the same as those listed below. To allow your phone to install apps from sources other than the Google Play Store, open Menu> Settings> Security> and check for unknown sources.

After completing the aforementioned step, select Download on your browser and tap the file after it has finished downloading. You can finish the installation process after a prompt for permission during installation appears.

You can use the application normally after the installation is finished.

ALSO READ: How to Stop Echo and Ring Devices from Using Amazon Sidewalk

Pros:

Direct downloads of the application are available from the third-party website in any version. You can access the app archives for the majority of versions and download them based on your requirements.

Downloading is instantaneous, you dont have to wait for the review procedure, etc., unlike Play Store.

There is an APK file on your memory card or system memory after downloading. As a result, you can repeatedly delete and reinstall them without downloading.

Cons:

Google often does not audit app downloads from outside sources. Therefore, it can damage your phone.

APK files could be infected with malware that destroys or steals data from your phone.

Because they typically lack access to the Google Play Store, your apps wont automatically update.

Read more from the original source:
Megapersonals App Download: All About The App You Should Know! - Newsbreak

Read More..

NetApp adds Porsche race team to client list Blocks and Files – Blocks and Files

NetApp and the TAG Heuer Porsche Formula E race car team are forming a multi-year partnership in which NetApp will provide the sportscar maker with innovative hybrid cloud solutions that will help them continue to write car racing history.

NetApps hybrid cloud solutions enable TAG Heuer Porsche Formula E Team to access their data trackside to support driver and team performance. This helps them make data-driven decisions in real time. Our first thought was that this was just typical IT-supplier-getting-sports-team marketing guff. But then we realized it was actually about the mobile edge, ROBO (remote office: branch office), and public cloud data sharing.

The race car is literally a mobile edge device. It generates data from onboard system sensors and sends them wirelessly to the race teams remote office: its trackside base.

Real-time decisions have to be made at the trackside to help the car win the race and deal with situations such as overtakes. The driver cannot analyze the cars overall situation in detail, but the trackside people can if they have access to reference information in a database.

In the NetApp-Porsche setup this information is stored in a cloud NAS: Cloud Volumes ONTAP. The trackside base sees part of this in its local edge device: a Windows server running NetApps Global File Cache (GFS). This caches active data in distributed offices the trackside base in this example so it can be used in collaboration situations needing fast local access. It features a global namespace with real-time central file locking.

The software creates a Virtual File Share at the ROBO location which looks and feels like a traditional file share. This file share presents centrally provisioned file shares in real time, while data is centrally stored on one or more file shares in Cloud Volumes.

NetApp says that typically clients provision <1TB of storage in a smaller office (<50 users), while others may reserve up to 5TB for cache in the largest offices of heavy users with large file formats. Active files remain persistently cached in the GFS edge instance, which saves on data movement across the WAN to Cloud Volumes ONTAP. We dont envisage any data gravity problems with this setup.

Car-generated and other trackside data is encrypted and uploaded to Cloud Volumes ONTAP by GFS across a WAN link with compression, streaming and delta differencing (sending only changed data). We say Cloud Volumes ONTAP, but the central cloud silo could be Cloud Volumes Service or Azure NetApp Files, meaning AWS, Azure, and GCP are all supported. In Porsches case the Azure public cloud is used.

Data can be analyzed in the cloud and used to provide real-time (race time) decisions such as when to use the Formula E Attack Mode, which unlocks an additional 30 kilowatts of engine power. Attack Mode engagement rules are set by the FIA admin body an hour before every ePrix race. Drivers can use the extra speed this gives them for a few laps when they need an edge.

Data protection (backups and archive) is done in the cloud, relieving the trackside base from that burden. A Cloud Manager product delivers centralized orchestration across this hybrid cloud storage infrastructure and data management services so admin staff can manage, monitor, and automate their data software and hardware consumption.

Staff in Porsche Motorsport HQ at Weissach also access the central cloud NAS data for post-race analysis and their general electric vehicle research and development initiatives.

Setting aside the Porsche and e-car racing glamor, what we have here are transitory ROBO sites set up (at race circuits) with data generated from far edge systems (race cars) and commands sent to them. These ROBO sites link to a cloud datacenter in a global file system which is accessed by a head office site as well. In other words, one ROBO site access period every month or so and head office access all the time. No big deal really. Cloud NAS analytics are used to inform the trackside ROBO strategy but not to operate the actual mobile edge devices the race cars.Again, not that demanding.

Check out a Global File Cache FAQ here.

More:
NetApp adds Porsche race team to client list Blocks and Files - Blocks and Files

Read More..

Reap the Benefits of Data Classification & Tagging – Security Boulevard

Reading Time: 8 minutes

Data is the most valuable commodity in your business, so why arent you treating it like it is important? Every business runs on data. Bad actors and hackers target companies large and small, across industries and countries to gain access to it. Hackers skill-up to find misconfigurations and vulnerabilities just to try and access your data. The costs are high, so the protection and planning in place to mitigate risk must be too. But you may be missing a critical first step to protecting your companys data if you are not using data classification in your cloud.

As CISO, youre tasked with protecting, storing, and managing more information than ever before. Keeping this abundance of data private, secure, and in compliance requires a higher level of data management, visibility, and control than ever before. You must manage a range of tools and practices. One of the leading privacy tools and practices is data classification.

Data governance locating, identifying, organizing, and maintaining data is critical to your companys short and long-term success. Theres simply no other way to ensure that you can access it efficiently or protect it effectively unless you start with the basics. Our experts suggest starting with methodical and cloud-specific data classification.

Data classification is the process of separating and organizing data into relevant classes based on your organizations characteristics. Data classification examples include sensitivity level, risk presence, and relevant compliance regulations. To protect sensitive data, you must have visibility into it. Then enterprises must handle each class of data in ways that ensure only authorized identities, users, and pieces of compute can gain access, and that the data is always handled in full compliance with all relevant internal and external regulations.

When done right, data classification makes using and protecting data easier and more efficient. Yet, its often overlooked in cloud strategies.

Data tagging falls under the umbrella of classification. It allows you to clearly label your data so that you know exactly what it is and where it is. This is often broken down into something like a name tag and then a value tag. For example: DataClassification:Confidential, DataType:CustomerPII, DataOwner:DevOpsTeam1. These tags allow you to better manage your data as well as identify a risk such as sensitive data that is found in a Dev environment.

It is no longer sufficient to just classify data as sensitive or not, as there are gradations of data sensitivity. Additionally, there are different data formats, structures and storage. This is why custom classification is a must-have.

To know your data means having an understanding where all data is located across an enterprise. As CISO, you cannot effectively protect customer, employee, and corporate information if you dont know the following:

Data classification provides a consistent process that identifies and tags all information wherever it resides across the organization. It works by enabling the creation of attributes for data that prescribe how to handle and secure each group according to corporate and regulatory requirements. Standards organizations, such as the International Standards Organization (ISO) and the National Institute of Standards and Technology (NIST), recommend data classification schemes so information can be effectively managed and secured according to its relative risk and criticality, advising against practices that treat all data equally.

So you should ask yourself these critical questions when it comes to classifying your data:

Understanding what your data is by class can help you prioritize data when there is a risk, threat, or attack on your most critical assets. Youll want to place priority on specific data classes rather than treating all threats as if they are of equal risk.

To determine which assets are business critical, youll need to discover sensitive data and more risk-presenting assets, like assets with broad permission access and secrets exposure. Youll need to manage this process by automatically tagging and classifying critical assets themselves.

Common classifiers include PII, NIST, ISO, HIPAA, PCI, and GDPR. It sounds elementary, but no risk can be mitigated if it is not truly understood. So start simple, understand what your data is and classify it.

You cant protect what you cant find, which is why it is so critical that you know where your data lives, whether its in your on-prem configurations, your cloud, and multi-cloud deployments, or on your far-flung remote devices. While the question, where is my data? is simple, answering it is not always easy. A basic step in data security is first finding your data.

Discovery, as you know, is important. This process will be difficult to manually execute, as the ephemeral nature of the cloud makes keeping tabs on your data an ongoing challenge. This is why some organizations rely on cloud security tools that can automatically, visualize and map identity and data across your clouds. Tools, like Sonrai, can help classify data by leveraging machine learning to determine data type, importance, and risk to help detect and protect data classes.

Chances are, your organization is suffering from cloud data sprawl. You may store some of your data locally and the rest on one or more cloud storage platforms. Data sprawl can be a serious issue, particularly when it comes to sensitive data, because you cant protect what you cannot find.

Verify the security of your most important data with the right tooling. Youll want to be able to scan your entire cloud, or multiple clouds, to discover sensitive data that is not properly protected or has been compromised. If you are using the right tools, unreported data assets will be found, identified and monitored across cloud accounts and developer teams. If a risk is identified, youll need to immediately prioritize the identified risks based on context and severity.

You have people accessing data, but you also have non-person identities that may have access to your most sensitive data. AWS roles, Azure service principles, serverless functions and more are accessing your crown-jewel data.

When you have numerous developers running around in an environment, creating different roles and functions, chances are they will accumulate permissions across multiple groups, roles, services, and accounts.

The only way to close blindspot gaps and proactively manage identity and data security risks is to prioritize and conduct identity access reviews. By doing so, you can protect your data using the Least Access policy, and enforce the Principle of Least Privilege, ensuring only authorized identities access your data.

Implementing controls around who and what has access to data is fundamental to any data security program. Although each unique cloud provider delivers services to manage access to data for their stack, they are not standardized across all the stacks available (e.g., AWS, Google, and Microsoft Azure), do not address third-party data stores, and often require use of low-level tools and APIs. To resolve this problem, data needs to be normalized in views and controls.

Because the data is easy to find, organizations can apply protections that lower data exposure risks, reduce the data footprint, eliminate data protection redundancies, and focus security resources on the right actions. In this way, classification both streamlines and strengthens organizations security programs.

Massive volumes of data are stored, processed, and in transit across numerous organizations. This can pose significant challenges for enterprises that are responsible for managing and securing sensitive data. The ever increasing need to share information within and outside of your organization means it is even harder to control. This means your data may be scattered everywhere throughout your cloud. With lack of visibility and control, how are you preparing for when disaster strikes?

It is common for an organization to have at least some documentation on data classification standards, including access tiers, naming conventions, and so forth. But one critical effort to make sure you include is sufficient emphasis on the disastrous ramifications of exposure and what could result if that data ends up in the wrong hands.

Its important to remember that your blast radius is usually much larger and more significant in the cloud. If someone compromises an account with admin privileges or a root account, for example, they could easily cascade across an entire data center and cause catastrophic damage to the business.

While cloud providers often advertise strong security and compliance measures, security is almost always a shared responsibility. Unfortunately, many companies rush into cloud migrations and recklessly spin up servers, assuming that providers like AWS will manage and fortify their accounts. As a result, these companies are often exposed to a variety of threats.

Ideally, companies should plan ahead to limit the amount of damage that a bad actor could cause. As Murphys Law goes, anything that can go wrong will go wrong; its only a matter of time. That being a case, you should anticipate that your cloud environments will be compromised eventually. Dont wait until after you detect a breach to spring into action. By proactively reducing your attack surface, you can limit the impact.

Rewrite your data security policy based on the current location and impact of your data today. Establish clear guidelines that consider what would happen if this data was stolen or improperly exposed, and create a viable maintenance plan youll be happy when you need it.

Data breaches and the resulting negative press can irreparably tarnish a companys reputation. Reputation is a hard entity to measure, but a Forbes Insight report found that 46% of organizations who experienced a data breach also experienced reputational damage. Past reputational costs are obviously financial costs the IBM Cost of a Data Breach Report found the average breach to cost an organization $4.24M.

Sometimes the cost is not just towards rebuilding or remediating after a breach, but actually hefty fines paid towards laws like GDPR (General Data Protection Regulation.) To put a number on it, the largest fine paid to date was $887M.

Your company could be fined today or even years from now. Thats why it is extremely important to keep up with two practices:

Each of the cloud providers Google, Azure, AWS has tools that can help you implement new or modified categories and security levels to your data. Because of data and cloud sprawl, this means that youll have to manage your data across multiple clouds using multiple tools.

Similarly, if you change from one cloud provider to another, many of your lessons learned, controls, and processes wont be applicable.

Also, as tempting as it may seem, you cant take data from one cloud storage account and run an analytic to mix it with similar data from another cloud storage account. The data from both accounts may have been labeled as sensitive, for example, but the output is likely to be a combination of different tiers remember, there are gradations of sensitivity.

These challenges are why many businesses seek out third-party cloud security platforms to centralize their data security and reduce tool stacking. Sonrai Security has a data classification engine that works across all cloud providers. You can also use its out-of-the-box classifiers and rebuilt configurations to recognize PII, credit card numbers, and more, or build your own custom classifiers.

While youre at it, remain compliant with any industry standards with a continuous cloud footprint through Sonrais continuous monitoring and activity logs.

Remember, if you dont know exactly where your data is, what it is, how impactful it is to the business, and who can potentially access it, you cannot sufficiently protect it.

If youre interested in more education and strategy around data classification, watch our webinar: Data Classification Program for AWS and Azure: Deep Dive.

*** This is a Security Bloggers Network syndicated blog from Sonrai | Enterprise Cloud Security Platform authored by Eric Kedrosky. Read the original post at: https://sonraisecurity.com/blog/benefits-data-classification/

Go here to read the rest:
Reap the Benefits of Data Classification & Tagging - Security Boulevard

Read More..

Prep for a Career in the Cloud With a $39 Microsoft Azure Training Bundle – PCMag

There's a growing shift from physical infrastructure to cloud computing, which has boosted demand for cloud-certified professionals. So if you're looking for the next step in your IT career, chasing the cloud can provide job security and a handsome salary, with engineers averagingmore than $120,000 annually(Opens in a new window).

As with any IT career, you need toearn your credentials, and The Complete Microsoft Azure Certification Prep Bundle can help. This 10-course bundle of training is presented by instructors specializing in cloud technologies; lessons provide comprehensive prep material from beginner to advanced-level certification exams, allowing you to enter the cloud field without prior experience.

That said, if you're new to cloud computing, AZ-900: Microsoft Azure Fundamentals Exam Quick Prep may serve you well. It introduces topics such as Azure Cloud's different pricing and support options, making it an excellent primer if you hope to work in the industry in a non-technical role. From there, the bundle covers exams for the AZ-103, AZ-203, AZ-300, and AZ-301 certifications, which endorse skills in designing and implementing Azure infrastructure.

It also offers supplementary courses that don't necessarily focus on a certification exam, but cover valuable skills nonetheless. For example, Azure MasterClass: Analyze Data with Azure Stream Analytics illustrates how to create queries and data analysis pipelines, while Azure MasterClass: ManageStorage& Disks in the Cloud with Azure Storage covers concepts such as utilizing storage pools as an efficient and scalable disk management system.

PCMag readers can get more than 50 hours of training via the TheComplete Microsoft Azure Certification Prep Bundle, on sale for $3997% off the $1,839 MSRP.

Prices subject to change.

Sign up for our expertly curated Daily Deals newsletter for the best bargains youll find anywhere.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.

Continued here:
Prep for a Career in the Cloud With a $39 Microsoft Azure Training Bundle - PCMag

Read More..

Biobanking makes genetics a fundamental part of health care – UCHealth Today

The Biobank provides DNA specimens for personalized medicine treatments and research. Photo: Getty Images.

A fundamental financial concept is that banks should be well capitalized with diversified investment portfolios. These two elements are the foundation of their economic strength.

In genetics, a different kind of bank must adhere to a similar set of principles in its own unique way.

On the Anschutz Medical Campus, thats the Biobank, which is part of the Colorado Center for Personalized Medicine. The Biobank is a repository of DNA specimens from UCHealth and Childrens Hospital Colorado patients. Researchers use the samples for research, genetic analysis and clinical care. The bank is one key element in efforts to advance personalized or precision medicine that aims to tailor medical care to the specific genetic makeup of patients.

But as with the banks with teller windows and ATMs, the Biobank and other biorepositories like it need deposits and the more the better, says Dr. David Kao, medical director of the Colorado Center for Personalized Medicine. The deeper the biorepository, the greater the evidence on which to learn from and draw reliable conclusions about, for example, specific genetic mutations and the health conditions linked to them.

The fewer the people, the more generic the treatments, Kao said. The more people, the more targeted or personalized are the treatments.

In addition, Kao said, biobanks grow stronger as they diversify genetically. A repository that accurately reflects a communitys makeup is well positioned to assist clinicians and researchers in serving that community. Call it a well-diversified genetic portfolio.

For these reasons, Kao and his colleagues are working to reach out to UCHealth patients and the wider Colorado community to encourage people to participate in the Biobank. In an interview with UCHealth Today, Kao explained what the Biobank is, how it operates, and how it benefits both patients and providers. He also addressed questions about how the Biobank protects patient privacy.

The Biobank is essentially a large research study that aims to collect DNA specimens from a set of UCHealth and Childrens Hospital Colorado patients who voluntarily agree to participate.

The fundamental goal is to understand how genetics fits into everyday health, Kao said. We can learn how patients genes are associated with different facets of health, whether that is risk of developing certain conditions, or responses to treatment, or ways to prevent disease, Kao said.

To do that, biobanks strive to increase the number of specimens in the repository. Doing so enriches the genetic diversity of the specimens. That, in turn, helps researchers and clinicians learn more about the unique characteristics of patients in different racial and ethnic groups, for example.

A surprising amount of what we know about genes and diseases has come from a relatively narrow population of people white males, Kao explained. That is not the world, so we have discovered that the diversity that exists is important to study in order to know if the recommendations we are making are appropriate in different populations.

There are several reasons that it makes sense to have a local biobank, Kao said.

The first is that having a unique, local biobank helps with the practical goal of incorporating genetics into health care. The Biobank at the Colorado Center for Personalized Medicine contains samples and genetic information derived from UCHealth patients. That can enrich the knowledge their providers use to treat them.

We are able to assess how genetics are important to treating our patients here, Kao said. We can tell providers what the best things to do are, with confidence that it applies to the person in front of them.

For example, Kao said, Hispanics make up about 15% of UCHealths patient population. Genetic information from a biobank of patients from, say, the United Kingdom, with a much smaller Hispanic population, would not make an ideal match.

You know youre going to miss something, he said.

In addition, the Biobank specimen data links to a deep reservoir of clinical data stored in the Epic electronic health record (EHR), a capability many other institutions lack, Kao said.

Finally, the Biobank is set up to return certain clinical results from DNA specimens to patients. To our knowledge, we are the only biobank that does that, Kao said. Genetic research benefits everyone, but here you can get an individual benefit.

There are three main ways that the Biobank can help individual patients, Kao said.

First, there are a set of about 75 genes with significant health implications, most notably breast and other cancers and heart failure caused by organ deterioration that begins at a young age.

These are conditions that the genetics community has said, If you see this, you really need to tell the person, Kao said.

About 60 UCHealth patients with these genes have been identified, with about half so far contacted directly to notify them and help them make further decisions, he said.

Second, data about genes that affect how certain medications work or dont work go directly into a patients medical record in the EHR. If a provider tries to prescribe one of these medications, a message pops up with a warning about the patients genetic risk.

One example, Kao said, is statins, a frequently prescribed class of medications that protect against heart disease. In patients with a specific genetic abnormality, the drugs can cause muscle aches and soreness. Without understanding the genetic cause, the patient might stop taking the drug and increase their risk of heart problems. On the other hand, if the provider knows a specific drug has those side effects, theyll simply choose a different one.

We can make sure the person gets the medication they need without being misled by side effects, Kao said. He added that as of recently, the Biobank provides genetically driven advice for all statins because they are so commonly prescribed.

Third, genetic data has been used to flag other conditions, such as risk of hemochromatosis, or iron overload. The condition generally doesnt produce symptoms early, but over time, it can cause deposits of the mineral in the liver, heart and joints. A specific gene is usually present in people who have hemochromatosis, Kao said, although not everyone who has the gene will develop problems. But with knowledge of the gene, again embedded in the EHR, providers can advise patients to get screened early and, if necessary, get treatments, which are effective.

Without the genetic information, most patients wouldnt think to check about iron levels at an early age, Kao said.

Specimens are protected through the same protocols used to store other research specimens across the University of Colorado Anschutz Medical Campus, Kao said. They are placed in tubes with no patient identifying information and stored in deep freezers behind multiple locked doors, with access limited to very specific personnel, he added.

The data lives in a highly secured, cloud storage environment that is more secure than the electronic health record, Kao said. The specific genetic data is stored without patient identifying information attached to it.

It is true that for people with the specific genes discussed earlier (and others), the Biobank has a matching process used to regenerate the connection between them and their samples, Kao said. So we do have a path to trace genetic data back to an individual, because that is how we are able to put specific results back into the medical record. However, he added, that path involves several steps that are each secure in their own right. A hacker would have to breach all the systems involved and then know the protocols to rematch genetic data to an individual, and there are a number of safeguards to protect that from happening, Kao said.

Some researchers on campus use the results of the Biobanks analysis of DNA specimens, Kao said. Others may use samples for further testing in pursuit of their own research. But they have no access to patient-identifying information, he added.

Yes, some do. But, there is always rigorous protection of patient privacy, Kao said.

We collaborate with a number of national and international consortia of biobanks for research and innovation, he said. One purpose is to study conditions that might be seen infrequently in a place like Colorado or another state, region or country. With a much larger pool of biobank data, we can make some conclusions about relatively rare conditions, Kao said.

Dr. Chris Gignoux, director of research for the Colorado Center for Personalized Medicine, said the Biobank is part of consortia that include the Covid-19 Human Genetics Initiative, the Global Biobank Meta-analysis Initiative, and the Biobank Rare Variant Analysis consortium. Gignoux added that the Biobank works frequently with UCLA (ATLAS) and Mount Sinai (BioMe), and is now collaborating with those two biorepositories on three major grants. The Biobank also shares data with the Million Veteran Program and Vanderbilt University (BioVU), among others, he said.

The simplest way is to sign in to your My Health Connection account (or create one). Click the UCHealth Research Opportunities button on the main page to read more about the Biobank and view the consent form. After reading the form, you can sign it, decline to or elect to decide at a later time.

At your next clinic or hospital visit that requires a blood draw, a provider will draw at least one extra tube of blood. Kao said the Biobank has started more recently to use saliva-based collection, and mailed out 250 kits in early June. We may be ramping that up, he said.

Its important to be part of the research because the more different people that we have, both in terms of genes and their entire life course, the better we can understand how to customize, select and choose with each person how they want to treat disease or manage their health over time, Kao said.

Kao added that as medical director of the Biobank, he wants genetic medicine to become an accepted part of all medicine. I want more patients and providers to be aware of it and expect it, just like getting your blood sugar checked, he said. Part of that is empowering patients to learn about and figure out how to use the Biobank, how it matters to them and how they want to engage with it.

Read more:
Biobanking makes genetics a fundamental part of health care - UCHealth Today

Read More..

Saving the Artwork of Ukraine | Wilson Quarterly – The Wilson Quarterly

Systematic destruction of cultural heritage is an established weapon of war. As Theodore Rousseau, one of the World War II Monuments Men, so eloquently stated in a postwar lecture, Looting is as old as war and just as constant a form of human activity. The recent invasion of Ukraine is no exception. Ukrainian president Volodymyr Zelenskyy declared on May 7, 2022, that the Russian army had destroyed or damaged nearly 200 cultural heritage sites. While sharing the news that a missile strike destroyed the Hryhorii Skovoroda Museum in the Kharkiv region, Zelenskyy said, it seems that this is a terrible danger for modern Russiamuseums, the Christian attitude to life, and peoples self-knowledge. Taras Voznayak, director of the Lviv National Art Gallery in Ukraine, said, Putin knows that without art, without our history, Ukraine will have a weaker identity. That is the whole point of his warto erase us.

The systematic looting that occurred during World War II provided the impetus to create international protocols specifically written to address cultural property and its handling in war.

For those like me involved in the study of looted art, early reports evoked an undeniable parallel to World War II. Yet few have compared the protection of artistic heritage and looting between the two conflicts. Furthermore, while the looting of artwork during World War II has been well covered in the mainstream press, far less has been written about the efforts that were made to protect art in advance of the German invasion.

By comparing cultural heritage protection and looting between the two wars, we can identify a potential road map to the future as the war in Ukraine persists, and offer a framework for when the conflict concludes and the fallout is addressed, regardless of which side prevails.

In the 17th and 18th centuries, many European nations, finding themselves perpetually at war, developed military codes, which set forth the rules of warfare and behavior of soldiers. Looting and violence against civilians, including rape, were subject to the harshest punishment: the death penalty by hanging, firing squad, bludgeoning, or beheading.

The Hague Conventions of 1899 and 1907 were the first modern multilateral agreements on the rules of warfare and included the issues of pillaging and civilian property. But the widespread, systematic looting that occurred during World War II provided the impetus to create international protocols specifically written to address cultural property and its handling in war. The 1954 Convention for the Protection of Cultural Property in the Event of Armed Conflict at the Hague argued for the universal protection of cultural heritage, stating that damage to cultural property belonging to any people whatsoever means damage to the cultural heritage of all mankind. The convention empowered the United Nations and its entities to enforce it with arms. In response to the Balkan wars, a subsequent protocol concerning damage to cultural property was passed by the Hague in 1999, which narrowed the scope of what actions could be considered military necessity and expanded the definition of what constituted protected cultural heritage.

Despite its invasion of Ukraine, Russia continues to serve as the current chair of the UNESCO World Heritage Committee, a designation that Zelenskyy has decried. Russia is also a signatory to the International Council of Museums Code of Ethics. None of the international agreements, whether binding or nonbinding, seem to have influenced the countrys tactics in the current conflict.

In 1939, Jacques Jaujard, who was director of the French national museums, director of the Louvre, and a member of the French Resistance, coordinated the secret removal of the French national art collections to protect them from enemy fire. The Mona Lisa, the Venus de Milo, the Winged Victory of Samothrace, and sculptures by Michelangelo, among others, were moved to the Loire Valley and stored in the Chteau de Chambord and dozens of other castles. The evacuation occurred by any means necessary, which included transporting artworks by truck, ambulance, taxis, delivery vans, and private automobiles.

Jaujard was already experienced in this type of cultural protection. Earlier that year, Jaujard helped safeguard the artworks from the Museo Nacional del Prado and other Spanish museums during the Spanish Civil War, working with the already-beleaguered Republic of Spain and its foreign minister, Julio lvarez del Vayo. In total, 1,842 crates, which held 364 paintings and 180 drawingswith works by Titian, Ruben, El Greco, Velzquez, Goya, and morewere moved to the League of Nations headquarters in Geneva.

A far slower war timeline gave France a clear advantage in World War II compared with Ukraine in 2022. France had watched from afar as Germany annexed Austria, ceded Sudetenland, and invaded Czechoslovakia. While the packing of art in the French national museums took only three days and nights in August 1939with the Louvre ostensibly closed for repair workthe action was months in the making. The museums used the period of inaction after the meeting of the Heads of State in Bavaria in 1938 to plan for an eventual escalation of war:

During this time, the evacuation plans established for each museum were carefully reviewed and finalized. Packing materials were accumulated in basements and storerooms.

In Lyiv, local volunteers worked rapidly to protect historical monuments in the old town, one of seven UNESCO World Heritage sites in Ukraine.

France had already instituted wartime art evacuation plans, put in place starting in 1932. Museum curators made priority lists of important artworks and identified potential hiding places. During World War I, the countrys museum leaders were given a tough lesson, when art evacuation started only after the German invasion of France began in 1914. At the Louvre, steel-wall rooms were constructed, sandbags were installed, and underground bunkers were used to protect the art. Important works that could be moved were shipped by truck to Toulouse. By World War II, France had know-how from both World War I and the War of 1870, and eagerly planned as much as possible in advance of war.

France declared war on Germany on September 3, 1939, but no action took place for nearly a year within the country. This period was known as the drle de guerre, the funny war or the phony war. As the Germans advanced further into France in 1940, Jaujard instituted a secondary wave of art evacuation to hiding places that were further south. The last art convoys crossed the Loire River only half a day before the bridges were closed to traffic or blown up by the Germans. The French were also communicating with London, and coded phrases were transmitted over BBC radio to let the Resistance know that its messages about the hidden locations of the art were received, with the radio announcer saying The Mona Lisa has a smile, Van Dyck thanks Fragonard, and similar communications.

In contrast, efforts to safeguard cultural sitesand the digital heritage relevant todayin Ukraine began predominantly after the Russian invasion commenced. The military buildup along the Russo-Ukrainian border began in March 2021, but Russia repeatedly denied that it planned to attack Ukraine. As late as February 21, 2022, Putin was using euphemisms, calling the Russian troops deployed to the Donbas as a peacekeeping mission. Ihor Poshyvailo, the founder of the Heritage Emergency Response Initiative and the director of the Maidan Museum in Kyiv, said that urging museums to protect their works in advance of a Russian assault could have caused panic, and the general political message was we should prepare only on a military level. On February 24, Putin officially announced a special military action against Ukraine in a surprise televised speech, with reports of explosions and flares coming minutes afterward in Ukraineincluding in Kyiv, the Ukrainian capital, leaving only minutes between the official declaration of war and the first strike against Ukraine.

There has been a deliberate policy decision to keep art inside Ukraine instead of shipping it to safe countries.

TheWashington Post reported that the effort to remove and hide the countrys art collections was done desperately but carefully by museum directors, gallerists, curators, and artists. Works of art were evacuated to museum bunkers, while artists and gallery directors were using whatever places they could for storage sites, including an underground caf in Ivano-Frankivsk, a city in western Ukraine. Statues, stained-glass windows, and monuments are being covered with shrapnel-proof material. Basement bunkers are crammed with paintings, the articles writers described. In Odesa, a crew of volunteers stacked hundreds of sandbags around the Duke of Richelieu statue. Razor wire was put around the Odesa Fine Arts Museum.

In Lyiv, local volunteers worked rapidly to protect historical monuments in the old town, one of seven UNESCO World Heritage sites in Ukraine. The effort, according to Lilia Onyshchenko, who serves as the head of historical preservation for the city and spoke to the Los Angeles Times, involved using whatever materials they could findideally fireproof. She told them, They built scaffolding around iconic structures, hoisted cranes to affix plywood to protect delicate stained-glass windows, stowed away gold-lacquered panels from the churches in basements and hallways and cached foam-wrapped artwork in bunkers.

Marc Young, an experienced disaster relief operator, who assisted in bringing in vehicles for rescue efforts in Ukraine says, "Almost all cultural heritage sites, churches, and government buildings had some level of protection initially. Obviously it took some time after the bombing started to fortify them [with] sandbagging around foundations and boarding or corrugated metal covering of windows. This lasted for a short term at some sites in the West and Kyiv, as some had been removed during my three months. The 'protection' for the most part would have been from incidental contact. In my opinion a missile strike in close proximity would have rendered most of the efforts worthless. In Bucha and Irpin I did see indiscriminate damage that included churches and sites of historical importance."

Cities in eastern Ukraine did not have as much time as the ones further west. Kyiv and Kharkiv were hard hit, and artworks there could not be moved in time. The Washington Post reported that the windows of Kharkivs main art museum have been blown out, subjecting the 25,000 artworks inside to freezing temperatures and snow for weeks. . . . Twenty-five works by one of Ukraines most celebrated painters, Maria Prymachenko, famed for her colorful representation of Ukrainian folklore and rural life, were burned when Russians bombed the museum housing them in a town outside Kyiv. Other museums in the capital are boarded up, their works still inside because those who would have evacuated them have fled.

A new challenge in this conflict is the need to protect digital culture.

There has been a deliberate policy decision to keep art inside Ukraine instead of shipping it to safe countries. Tom Seymour, museums and heritage editor for The Art Newspaper who accompanied the International Council of Museums on a supply mission to the border of Poland and Ukraine says that the Ukrainian government made the very conscious decision at the start of the war, and actually in the lead up to the war, that they were going to attempt to keep artifacts in Ukraine and even protect them in museums or if needs be, hide them in different parts of Ukraine, but not to evacuate them from the country as a whole. Sophie Dellepiere, the head of heritage protection at the International Council of Museums, which is based in France, reiterated this in anArt Newspaper podcast, saying that her colleagues in Ukraine were very, very, clear. Such evacuation, if there is one, will be the decision of the Ukraine Ministry of Culture.

Nonetheless, organizations around the world have rallied to support Ukraines cultural organizations. At first, support came in the form of teaching materials and know-how. For example, conservators at the Metropolitan Museum of Art in New York recorded smartphone videos teaching Ukraines museum workers how to pack artworks or protect them in place. Museums outside Ukraine offered museum-quality storage locations if Ukraine decides to move its collections outside the country in the future. The International Council of Museums is assisting with transporting materials for the packing and protection of artworkssuch as bubble wrap, wood crates, and casingcollected by museums in France, Spain, Italy, and other countries.

Corine Wegener, director of the Smithsonian Cultural Rescue Initiative, an umbrella organization for more than 30 organizations worldwide, says that they are about to launch an on-the-ground effort to get equipment and supplies to cultural heritage organizations in Ukraine. It is a key area of need, says Wegener, especially with the collections that have been evacuated and are being stored in areas more in the center of the country, and even as far west as Lviv. They need special treatment because theyre being stored in conditions that are not the normal. The Cultural Rescue Initiative, with support from the US State Department, has also brokered a deal with the ride-sharing company Uber to provide vehicles for art conservators to travel between the different storage facilities around the country.

Ukraines decision to keep its artwork within the country is likely more than a matter of national pride. Time was certainly a factor, which includes the ability to assess who to trust. Sebastian Majstorovic, one of the founders of Saving Ukrainian Cultural Heritage Online, or SUCHO, spoke of weird inquiries the organization has received from people at the border volunteering to protect artworks. You really dont know who the bad actors are, he says. But more important was likely the optics of such a move. Ian Brzezinski, former Deputy Assistant Secretary of Defense during the George W. Bush administration says, that Ukraine wouldn't want to signal to their own people or to the Russians, or for that matter to the international community, if they were unsure of their ability to defend themselves, or send a message that would undercut their effort to demonstrate commitment to defend themselves.

A new challenge in this conflict is the need to protect digital culture. Majstorovic says, in the last 20 years or so, an amazing amount of materials has been digitized and backing them up is essential. But the landscape of online materials is complexa website with a Ukrainian domain may not be hosted in Ukraine, whereas another one with a .org or .com address might be, and therefore more at risk. Majstorovic says, Websites are run by people. And if people cannot take care of them, or the institutions where people work are destroyed, this is the danger.

Brendan Ciecko, who runs a digital engagement company for museums and who has been volunteering for SUCHO, contends that culture exists in many forms: tangible and intangible, and along with the threat of losing irreplaceable cultural heritage in its physical form, the same risk exists for digital culture: libraries, archives, online collections, manuscripts. If the original is destroyed and so is the digital reproduction, that cultural creation is lost forever.

A truly multinational effort has emerged to preserve Ukraines digital culture, involving ordinary citizens from around the world. Four hundred people signed up to volunteer on the first day SUCHO announced its efforts in early March. Now, it has more than 1,300 volunteers backing up Ukraines online cultural presence using tools like Browsertrix, which archives a full site, and WebRecorder, which archives while a website is being navigated. So far, they have captured more than 50TB of data from 4,500+ websites, and have created duplicate backups. Volunteers are also uploading links to the Internet Archive Wayback Machine.

SUCHO has also been organizing deliveries of digitization equipment to organizations in Ukraine and working with partners that are uploading cultural organizations hard drives full of terabytes worth of art, cultural data, images, and digital exhibits onto the secure cloud, acquiring cloud storage and support from Amazon Web Services, Wasabi, and others.

Ciecko says there is a need to update international policies and protocols. There is an opportunity to appeal and contribute to the refinement of NATOs Tallinn Manual (2.0), Rule 142, which pertains to digital cultural property, which in some way picks up where the 1954 Hague Cultural Property Convention left off, as digital, as we know it today, didnt really exist in the 50s. Especially based on Russias deliberate attempts to attack and destroy Ukrainian cultural heritage both physically and digitally.

Quinn Dombrowski, another cofounder of SUCHO, says additional time would have been useful and that a more concerted global effort to preserve digital culture is necessary. Weve certainly thought sometimes about how much easier this work would have been if we had started in January and could have been in touch with the people on the ground there. One of our ongoing challenges is staying in touch with people in Ukraine. Doing this reactively is a terrible model but also inspiring, . . . heartwarming, she said about the outpouring of crowdsourced assistance. And it also suggests a massive failure of infrastructure. To that end, SUCHO has been talking with UNESCO and pretty much anyone else who will listen about setting up a global network to proactively archive websites in case of natural disasters and wars.

It is impossible to fully assess the extent of the looting taking place in Ukraine, but it is clear that systematic pillage is under way by Russian forces, along with deliberate attacks on cultural sites like museums, churches, and theaters. An investigation into Russian cross-border shipping by the independent Russian news site Mediazona from May 26, 2022, has already concluded that 58 tons of looted goods have been sent from Ukraine to Russia by Russian soldiers since the beginning of the invasion. Concrete anecdotes are also available. On April 28, 2022, the Mariupol City Council posted on Telegram that the Russians had looted more than 2,000 unique exhibits from the museums of Mariupol. Among works the council said were taken include original works by Arkhip Kuindzhi and Ivan Aivazovsky, ancient icons, and a unique handwritten Torah scroll made by the Venetian printing house for the Greeks of Mariupol, the Gospel of 1811, and more than 200 medals from the Museum of Medallion Art.

Additional looting was reported in Melitopol, where an expert in a white coat arrived with Russian soldiers and intelligence officers to remove numerous gold artifacts from a museum, the beginning of what has become a clear pattern targeting Scythian gold. Curiously, art experts wearing white coats arrived on the first day when the Eisensztab Reichsleiter Rosenberg took over the Jeu de Paume museum in Paris. In both instances, the appearance of expertise was used to obscure the base nature of the looting activities.

The lawyer Nicholas ODonnell, who specializes in claims concerning Nazi-looted works of art, says, The Soviets and the Russians have always been quite candid that they view [looting] as a small token of what theyre entitled to for what they suffered, which is not in line with the international law on armed conflict or cultural property, but they dont ask for anybodys opinion.

Although UNESCO condemned the attacks on Ukraines cultural heritage in a March 3, 2022 statement, expressing that the organization was gravely concerned with cultural and civilian damages incurred in the war thus far, it declined to cancel or relocate the World Heritage meeting scheduled for June in Russia even after criticism from its member nations. Russia itself finally proposed postponing the meeting indefinitely.

The German looting of art during World War II occurred in a very bureaucratic way, commencing from official directives and meticulously documented. All the art looted by the Eisensztab Reichsleiter Rosenberg was taken through the Jeu de Paume museum, where the works were inventoried. A photograph was taken of each artwork and a preformatted index card was filled out with the name of the artist, title of the work of art, when it was taken and from where, the size of the artwork, and other details. This documentation, later found by the Allied forces along with reports and eyewitness accounts of civil servants, served as evidence in military tribunals and for the restitution of artworks, which continues to this day.

Little to no progress has been made in Russia on restituting looted works of art from World War II.

Although it is unclear what documentation, if any, exists regarding art looting in Ukraine, some efforts are under way from a distance. The Cultural Heritage Monitoring Lab, located inside the Virginia Museum of Natural History, is tracking cultural sites throughout Ukraine. The lab was founded in 2021 in partnership with the Smithsonian Institution Cultural Rescue Initiative, and has been described as the museum worlds version of a war room, with computers, phones, and satellite feeds set up to monitor roughly 26,000 sites in Ukraine. Using the most cutting-edge technology, including infrared sensors, the lab is comparing military action against a map of the countrys cultural heritage inventory. Fortunately, these efforts began in 2021, long before the invasion began. Damian Koropeckyj, who is the team lead for Ukraine at the Cultural Heritage Monitoring Lab, said theyve been focusing on eastern Ukraine and Crimea from the beginning, explaining that we wanted to look there first to see if cultural heritage was being impacted during what I would describe as a warm conflict.

Koropeckyjs early research showed that monuments destroyed in military action were already being replaced by monuments in support of Russia. This discovery was the impetus to make an inventory of cultural heritage for the entire country, not just in eastern Ukraine, in anticipation of future escalation. When action appears to be close to a heritage site, the lab will either pull existing satellite images or direct a satellite to get new images. The lab alerts officials in Ukraine to damage as it happens, especially when action can be taken to protect the site from further destruction. The labs efforts also serve another purpose: documenting damage to Ukraines cultural sites can be used in the future to prove that war crimes were committed. Corine Wegener says, the long-term goal is to keep a record of and documentation of this monitoring. So that 10 years from now, even, if theres a determination that there will be a war crimes tribunal, that evidence is available to the prosecution. Its available to all the parties to say heres the evidence of what happened [and] its been kept with the strict chain of custody.

It is believed that more than 100,000 pieces of Nazi-confiscated artworks have yet to be recovered. In the immediate postWorld War II period, when asked to return works of art stolen from France, the official Russian response would invariably be that the works had been destroyed due to military activity. Little to no progress has been made in Russia on restituting looted works of art from World War II, despite policies created under Boris Yeltsins administration. Enforcement of legal judgments has generally failed. A 2009 report from the Holocaust Era Assets Conference concluded: There are artworks that were looted from Jews and that remain in Russias museums, but there is no known case of restitution of such artwork. Nicholas ODonnell concurs, I dont know of anything since reunification, since the fall of the Soviet Union, thats been returned to anybody. Quite the opposite, when its come up.

Russia has actively fought restitution claims in US and European courts. It owes $180 million in a monetary judgment in New York for failing to return a library that belonged to the grand rabbi of the Chabad-Lubavitch organization. The district court has been sanctioning and fining the Russian defendants for 10 years, fining Russia $50,000 a day until they complied. They havent. That order has been reduced to a monetary judgment, but theres nowhere to collect it, says ODonnell.

A comparison from World War II to the present day suggests that despite numerous international agreements governing cultural property in war, Russia has not shown any intention to abide by them. Documentation of pillage and war crimes will be essential in any postwar tribunal or legal actions, but there are few recourses that can be leveraged to compel Russia to give back any loot. As history has shown, getting artwork back after it has been lost in war is a slow, bureaucratic process, even when the parties are willingand Russia has already proven itself to be a most unwilling partner.

Michelle Young is an adjunct professor of architecture at Columbia University Graduate School of Architecture, Planning, and Preservation, where she received her master of science in urban planning. She is the author of a forthcoming book about art looted during World War II. Young is also a cum laude graduate of Harvard College with a degree in the history of art and architecture. She is the founder of the publication Untapped New York and the author of Secret Brooklyn, New York Hidden Bars & Restaurants, and Broadway.

Cover photo: Kyiv, Ukraine, March 29, 2022, volunteers cover the monument to Princess Olga, St. Andrew the Apostle, educators Cyril and Methodius with sandbags to protect it from Russian rocket shelling. Shutterstock/Mny-Jhee.

Link:
Saving the Artwork of Ukraine | Wilson Quarterly - The Wilson Quarterly

Read More..

Google Cloud introduces its first Arm-based VMs – ZDNet

Google

Google Cloud on Wednesday announced its first VM family based on the Arm architecture, the Tau T2A.

Arm-based chips are already ubiquitous in mobile phones, but organizations have started adopting them to run scale-out, cloud-native workloads -- like web servers, containerized microservices, data-logging processing, media transcoding or large-scale Java applications. Amazon Web Services has been building its own Arm-based processors for years, while earlier this year,Microsoft announced Azure VMs with Ampere Altra Arm-based processors.

Powered by Ampere Altra Arm-based processors, T2A VMs come in multiple predefined VM shapes, with up to 48 vCPUs per VM and 4GB of memory per vCPU. They offer up to 32 Gbps networking bandwidth and a range of network-attached storage options.

The new VM family follows last year's launch of Tau VMs to Google Cloud Compute Engine. Those chips target customers looking for a price-performance improvement without redesigning their Arm architecture applications.

"We are excited to extend the rich choices we already offered with Intel and AMD and enter the Arm ecosystem to provide our customers with even more choice and flexibility," Google Cloud VP of infrastructure Sachin Gupta said to reporters this week.

Also:What is cloud computing? Everything you need to know about the cloud explained

Customers can now preview these VMs in select regions in North America, Europe and Asia.

Google Cloud is also offering in preview a new fully managed service called Google Cloud Batch, which provisions, schedules and executes batch jobs. The service should benefit major use cases for throughput-oriented computing, such as weather forecasting and electronic design automation.

"We are dedicated to making the cloud easier for our customers to operate at scale," Gupta said.

View original post here:
Google Cloud introduces its first Arm-based VMs - ZDNet

Read More..

Pikmin Bloom International Chess Day Event: Everything You Need to Know – SuperParent

Players can collect Chess Piece Decor Pikmin.

International Chess Day is July 20, and Pikmin Bloomis celebrating with an International Chess Day event that will give players the chance to collect Chess Piece Decor Pikmin.

The International Chess Day event will run from July 18, 2022 at midnight local time until July 31, 2022 at 11:59 p.m. local time.

During this event, players will receive a Golden Seedling at the end of each Weekly Challenge they participate in. Once players plant this Golden Seedling in their planter pack, it will grow into a Chess Piece Decor Pikmin after walking 100 steps.

On the Pikmin Bloom website,Niantic, the developer of Pikmin Bloom, said players wont receive one of these Golden Seedlings if they leave a Weekly Challenge before time runs out.

Players will also have the chance to find Huge Seedlings that have a Special Event icon during this event. These Huge Seedlings will also grow into Chess Piece Decor Pikmin.

There will be four kinds of Chess Piece Decor Pikmin available to collect: Blue, Yellow, White, and Purple. Players will only be able to collect Chess Piece Decor Pikmin from the Special Event Huge Seedlings and the Golden Seedlings. They wont be able to collect Chess Piece Decor Pikmin by increasing their friendship level with any of the Pikmin that are already in their collection.

Finally, Niantic said players can have one Special Event and one Golden Seedling in their inventory at the same time. However, players cant have more than one Special Event seedling in their inventory at once. Niantic also said, "Golden Seedlings and Huge seedlings marked with a Special event icon will grow into Chess Piece Decor Pikmin even after the event ends."

What do you think about this International Chess Day event in Pikmin Bloom? Let us know on Twitter at @superparenthq.

Follow this link:
Pikmin Bloom International Chess Day Event: Everything You Need to Know - SuperParent

Read More..

Napier Bridge in Chennai painted like chess board; looks like a work of art – Times of India

Chennai, also known as the Chess Capital of India, is soon going to host the 44th edition of Fdration Internationale des checs (FIDE) Chess Olympiad. Ahead of the event, the Napier Bridge in the capital city has been painted like a chess board, and the site has left netizens in awe! The painting on the bridge looks no less than a work of art.

A video of the black-white painted bridge has been shared on social media, and has gone viral in time. The video of the iconic bridge was shared by Supriya Sahu, Additional Chief Secretary Environment Climate Change & Forests, Govt of Tamil Nadu.

This year, the very famous and the worlds biggest chess event, FIDE Chess Olympiad 2022, is being hosted by India in Mahabalipuram, Tamil Nadu. For those who dont know, its a very prestigious and important event, where more than 2000 Chess players will participate in the Olympiad. Also, it is for the first time in 100 years that India is hosting the Chess Olympiad.

Chennai, the capital city of Tamil Nadu, is giving its 100% to make the event a success. The teaser and the chess board painting on the bridge here are an effort to attract people from all over.

Go here to read the rest:
Napier Bridge in Chennai painted like chess board; looks like a work of art - Times of India

Read More..

The ultimate prize: 65-year-old chess player takes aim at becoming a grandmaster – The Globe and Mail

After a successful career in business and consulting, Brian Hartman has one major piece of unfinished business: becoming a chess grandmaster.

Once a top-ranked Canadian player, Hartman ran a successful consulting company for 15 years before selling it a few months ago. Though hes still busy working with the new owners, he also wants to satisfy his long-time chess ambition.

Its the ultimate prize, really, says the 65-year-old Parry Sound resident. But its an achievement thats very difficult to get.

His plan is to compete in this months Canadian Seniors Championship in Halifax, and then play in the World Seniors where the winner automatically earns the grandmaster title.

Growing up in Hamilton, Hartman was inspired by Paul Vaitonis, who was a champion of both Lithuania and Canada. That inspiration led him to a spot on Canadas Olympiad team and eventually an international master title.

But when offered the chance to take a run at becoming a grandmaster in the 1980s, he chose education over full-time competition, and doesnt regret the decision.

Hartman knows that most players are at their peak in their twenties, but he is assessing his chances strategically. He is going to rely on his judgment and maturity to take the next step on his life-long journey of chess achievement.

After 35. Nxf7 Nxf7 36. Rxf7 Kxf7 37. Qh8. Black resigned shortly afterwards.

Read the rest here:
The ultimate prize: 65-year-old chess player takes aim at becoming a grandmaster - The Globe and Mail

Read More..