Page 2,952«..1020..2,9512,9522,9532,954..2,9602,970..»

Data Encryption Service Market 2021 COVID-19 Impact Analysis by Industry Challenges, CAGR, Business Overview And Forecast Research Study 2027 KSU |…

Report Covers the Detailed Pre and Post COVID-19 Impact Analysis on Data Encryption Service Market

This report contains market size and forecasts of Data Encryption Service in Global, including the following market information:, Global Data Encryption Service Market Revenue, 2016-2021, 2022-2027, ($ millions), Global top five companies in 2020 (%)

The global Data Encryption Service market was valued at xx million in 2020 and is projected to reach US$ xx million by 2027, at a CAGR of xx% during the forecast period., Research has surveyed the Data Encryption Service companies, and industry experts on this industry, involving the revenue, demand, product type, recent developments and plans, industry trends, drivers, challenges, obstacles, and potential risks.

Download PDF Sample@ https://www.themarketinsights.com/request-sample/125083

Total Market by Segment:, Global Data Encryption Service Market, By Type, 2016-2021, 2022-2027 ($ millions), Global Data Encryption Service Market Segment Percentages, By Type, 2020 (%), Symmetric, Asymmetric Encryption

China Data Encryption Service Market, By Application, 2016-2021, 2022-2027 ($ millions), China Data Encryption Service Market Segment Percentages, By Application, 2020 (%), SMEs, Large Enterprise

Global Data Encryption Service Market, By Region and Country, 2016-2021, 2022-2027 ($ Millions), Global Data Encryption Service Market Segment Percentages, By Region and Country, 2020 (%), North America, US, Canada, Mexico, Europe, Germany, France, U.K., Italy, Russia, Nordic Countries, Benelux, Rest of Europe, Asia, China, Japan, South Korea, Southeast Asia, India, Rest of Asia, South America, Brazil, Argentina, Rest of South America, Middle East & Africa, Turkey, Israel, Saudi Arabia, UAE, Rest of Middle East & Africa,

Request Customization@ https://www.themarketinsights.com/request-customization/125083

Competitor Analysis, The report also provides analysis of leading market participants including:, Total Data Encryption Service Market Competitors Revenues in Global, by Players 2016-2021 (Estimated), ($ millions), Total Data Encryption Service Market Competitors Revenues Share in Global, by Players 2020 (%)

Further, the report presents profiles of competitors in the market, including the following:, Microsoft, IBM, OneNeck, Flexential, Gemalto, Amazon Web Services (AWS), Digital Guardian,

Request Discount@ https://www.themarketinsights.com/check-discount/125083

Some Point of Table of Content:

Chapter One: Introduction to Research & Analysis Reports

Chapter Two: Global Data Encryption Service Overall Market Size

Chapter Three: Company Landscape

Chapter Four: Market Sights by Product

Chapter Five: Sights by Application

Chapter Six: Sights by Region

Chapter Seven: Players Profiles

Chapter Eight: Conclusion

Chapter Nine: Appendix

9.1 Note

9.2 Examples of Clients

9.3 Disclaimer

Access Complete TOC @ https://www.themarketinsights.com/report/data-encryption-service-market-125083

List of Table and FigureTable 1. Data Encryption Service Market Opportunities & Trends in Global Market

Table 2. Data Encryption Service Market Drivers in Global Market

Table 3. Data Encryption Service Market Restraints in Global Market

Table 4. Key Players of Data Encryption Service in Global Market

Table 5. Top Data Encryption Service Players in Global Market, Ranking by Revenue (2019)

Table 6. Global Data Encryption Service Revenue by Companies, (US$, Mn), 2016-2021

Table 7. Global Data Encryption Service Revenue Share by Companies, 2016-2021

Table 8. Global Companies Data Encryption Service Product Type

Table 9. List of Global Tier 1 Data Encryption Service Companies, Revenue (US$, Mn) in 2020 and Market Share

Table 10. List of Global Tier 2 and Tier 3 Data Encryption Service Companies, Revenue (US$, Mn) in 2020 and Market Share

Table 11. By Type Global Data Encryption Service Revenue, (US$, Mn), 2021 VS 2027

Table 12. By Type Data Encryption Service Revenue in Global (US$, Mn), 2016-2021

Table 13. By Type Data Encryption Service Revenue in Global (US$, Mn), 2022-2027

Table 14. By Application Global Data Encryption Service Revenue, (US$, Mn), 2021 VS 2027

Table 15. By Application Data Encryption Service Revenue in Global (US$, Mn), 2016-2021

Table 16. By Application Data Encryption Service Revenue in Global (US$, Mn), 2022-2027

Table 17. By Region Global Data Encryption Service Revenue, (US$, Mn), 2021 VS 2027

Table 18. By Region Global Data Encryption Service Revenue (US$, Mn), 2016-2021

Table 19. By Region Global Data Encryption Service Revenue (US$, Mn), 2022-2027

Table 20. By Country North America Data Encryption Service Revenue, (US$, Mn), 2016-2021

Table 21. By Country North America Data Encryption Service Revenue, (US$, Mn), 2022-2027

Table 22. By Country Europe Data Encryption Service Revenue, (US$, Mn), 2016-2021

Table 23. By Country Europe Data Encryption Service Revenue, (US$, Mn), 2022-2027

Table 24. By Region Asia Data Encryption Service Revenue, (US$, Mn), 2016-2021 continued

About us.The Market Insights is a sister company to SI Market research and The Market Insights is into reselling. The Market Insights is a company that is creating cutting edge, futuristic and informative reports in many different areas. Some of the most common areas where we generate reports are industry reports, country reports, company reports and everything in between. At The Market Insights, we give our clients the best reports that can be made in the market. Our reports are not only about market statistics, but they also contain a lot of information about new and niche company profiles. The companies that feature in our reports are pre-eminent. The database of the reports on market research is constantly updated by us. This database contains a broad variety of reports from the cardinal industries. Our clients have direct access online to our databases. This is done to ensure that the client is always provided with what they need. Based on these needs, we at The Market Insights also include insights from experts about the global industries, market trends as well as the products in the market. These resources that we prepare are also available on our database for our esteemed clients to use. It is our duty at The Market Insights to ensure that our clients find success in their endeavors and we do everything that we can to help make that possible.

Direct ContactJessica Joyal+91-9284395731 | +91 9175986728sales@themarketinsights.com

Read the original here:
Data Encryption Service Market 2021 COVID-19 Impact Analysis by Industry Challenges, CAGR, Business Overview And Forecast Research Study 2027 KSU |...

Read More..

#NAMA: The traceability mandate and what it means for end-to-end encryption – MediaNama.com

Key Takeaways

The new Information Technology (IT) Rules, 2021 mandate significant social media intermediaries (intermediaries with over 5 million users) that provide services primarily in the nature of messaging to enable the identification of the first originator of a message if issued an order by a court or relevant government authority. Although the rules state that less intrusive methods will be used available, experts argue that this provision will require the breaking of end-to-end encryption offered by platforms like WhatsApp and Signal.

In a panel discussion held by MediaNama on Impact of IT Rules 2021 on Intermediaries, experts shared their views on the traceability mandate and what it means in the context of end-to-end encryption.Debayan Gupta, Assistant Professor of Computer Science,Ashoka University; Priyadarshi Banerjee, Lawyer at Banerjee & Grewall; Yash Kadakia, Founder and CTO of Security Brigade;Rakesh Maheshwari, Ministry of Electronics & Information Technology (MeitY), participated in this discussion. This discussion was supported by Google. All quotes have been edited for clarity and brevity.

The provision stumbles upon its first hurdle in defining who an originator of a message is and what information about the originator it expects.

Is it someone with a +91 number:Debayan Gupta argued that if the law is targeting only originators within India, does it mean it wants the originator with a +91 number, and in that case, what if someone with a +91 number moves to a different country? Will the laws of the country where the person has moved to allow sharing the details of said person? There is also the opposite case where a person with a non-Indian WhatsApp number might be residing in India, will they fall under this search for originator?

How does this work for a non-forwarded message:While tracking a forwarded message might be possible by breaking encryption, how will a platform trace a message that has been copied and pasted, Gupta asked. Wont the metadata of the message originator be lost in this case and wouldnt it be an easy way for bad actors to get away by doing this?Adding on to this point, Yash Kakadia asks what if a person saves a photo or video and reuploads it from his phone. This breaks the forward chain but it is still the same content. Will this person be considered the originator, although someone else was the actual originator? The image could also very easily be from a different messaging platform and there will be no way to go back to the actual originator in this case.

What about slightly modified messages: Gupta asks if forwarded messages that are slightly modified and then forwarded again be considered the same as the original message or as a different message? The same question applies to images and videos that are given a caption.

The broad consensus among the panellists was that enabling traceability without breaking end-to-end encryption is not possible, but they still offered scenarios where it is possible and what problems can this lead to.

Maybe for photos and videos:Yash Kakadia argues that in limited scenarios such as images and videos, tracking the originator without breaking encryption might be possible. If you take an image and I send it to you, you send it to 400 different people and it goes on from there, right? If you go into WhatsApp Web or something of that sort, the URL for the image is exactly the same. And its a cached image that theyre just sending forward. So fundamentally, WhatsApp will be able to say, the first person to upload this image was x and that I can see reasonably possible without breaking into encryption, he added. But this cannot be done for texts, which is the more universal case, Kakadia conceded.

Yes, but anyone can be made to look like the originator: One of the ways platforms can enable traceability is by hashing the sender information and including it as metadata when a message is sent. This could potentially work when everyone is using the official version of WhatsApp, for example, instead of a doctored version. But there is no guarantee that this is the case, especially when considering bad actors, and an unofficial version of the app gives users the ability to make anyone like the originator.

Lets say Im sending a message to Yash. And Im supposed to be attaching something at the bottom of that message that looks like garbage to you, but somehow encapsulates my ID in some fashion or the other. Whats preventing me from lying? Well, I can put Nikhils number in there, for example. And whats preventing Yash from changing that to something else when he forwards it the next time. How do you make sure that nobody lies during the process? Gupta argued.

You can take Narendra Modis phone numbers should you know it, attach that number on top of the message call him the originator and attach Narendra Modis hash at the bottom of it because you can compute it too. And thats that. So look, when I send you a message, either that hash is computable and verifiable by you in which case you can replace my number and my hash with Narendra Modis number and Narendra Modis hash or it isnt, in which case, I could have given you garbage and you wouldnt know, Gupta added.

Technology behind forwarded many times cannot be used for traceability:In response to a question on why the same technology used to label messages as forwarded many times cannot be used to keep track of originator, Gupta explained that WhatsApp, in fact, cannot see the number of times a message is forwarded and the entire system behind this is not really secure. If I ran a fake version of WhatsApps app, I could mess around with that and change that counter to whatever I wanted.The reason that this forwarded many times thing ends up working is because of WhatsApps assumption that if a message spreads like a wildfire, then presumably most of the users doing it are legitimate users using legitimate versions of the app Gupta said.

Less intrusive means for identification is a legal artifice:The government has added a clause that if there are less intrusive means for identification of the originator those can be used instead, but Priyadarshi Banerjee said that this is just a legal artifice that will help the government in court. I mean without breaking the end-to-end encryption traceability is just not possible. Then in that circumstance, its a meaningless proviso that has been put in, just to garnish the legislation for the benefit of the judiciary at a future date, he said.

FISA-like warrants for tapping:One solution Gupta proposed, but conceded wont be very effective, is for the government to implement a provision where a court allows law enforcement agencies to tap a persons chat for a legitimate reason similar to the FISA warrant system in the US. Platforms like WhatsApp can maintain end-to-end encryption for most users and disable it only for users who have a warrant issued against them. The two pitfalls to this are that everyone who the targeted person converses with will also be compromised and bad actors will not use the platform once they know law enforcement agencies can pursue them through this method.

Law should not mandate technology to do a particular thing:When a law instructs a company to do a particular thing, then the law is, in fact,dictating how technological innovation happens and at the pace there off, which is not in the realm of law at all, argues Priyadarshi Banerjee. Its impossible for either lawyers or judges or policymakers to determine what is actually in the domain of engineers, he added.

Government giving solutions rather than the problems to solve:Giving an apt metaphor, Debayan Gupta said Think about aeroplanes, the government is asking to have roll-down windows on aeroplanes. And all the aeronautical engineers are like, are you mad, you cant have roll-down windows on aeroplanes, people will die. This doesnt work. Until the government tells us, hold on, theres this thing called COVID. And we need some way to get fresh air on aeroplanes. Now, the aeronautical engineers say, oh, okay, now that makes sense. Your reasoning has been you have a real reason why youre asking us for this, we can put in these special filters weve created for this occasion. The problem is the government is telling us all this stuff about originator information, hashing and we cant expect the government to have expertise on everything. The problem is theyre giving us implementations or solutions. What they need to do is they need to show us the data, they need to tell us here are the problems.

Is there a right to anonymously exist or communicate online:While the law cannot give a positive mandate and tell companies what they should do, they can tell them not to deploy a particular kind of technology because anegative injunction is something that can be legally enforced according to Banerjee. But such injunctions must also satisfy certain other conditions of legality, he added.

In the present circumstance with regard to end-to-end encryption, I believe this dovetails into the primordial query that whether there is a right to anonymously exist or communicate online. If it can be determined that there is no such right then the law can surely injunct, said Banerjee.

Only affects law-abiding citizens:Debayan Gupta argued that whenever the government wants to pass new rules they use child porn and terrorism as a pretext but the rules dont actually solve those problems. If Im running a child porn ring, and I know if I use WhatsApp I can get tracked, I wouldnt use WhatsApp, Im going to use something else that I can find elsewhere on the internet, he said. He further adds that only the security of law-abiding citizens will be affected.

Bad guys move to harder to reach platforms: Every time you break one level of encryption, or one level of security, youre essentially going to have the bad guys move to a different, harder to reach, platform and then again its going to keep cycling on from there, Kadakia added. Technology evolution is always going to take place, and the bad guys are always going to find safe-havens. If we talk about child pornography right now, whether its moving to the dark web where it becomes even harder now for the government to sort of track that right. And the next request is going to be lets decentralize and lets monitor the dark web, he added.

Tiny corner case of badness:While conceding that the government might have a legitimate reason for the traceability mandate, Gupta said that there should be evidence that shows that enabling traceability will indeed help the government because otherwise, it applies broadly. All too often we are told that there is a legitimate reason for doing X. So were talking over Zoom right, were getting all of these benefits and youre suddenly saying, I dont want this tiny corner case of badness to happen, it doesnt work that way, Gupta said.

What youre doing is, youre taking a good system that works across the world, and youre creating a separate point of failure for it. And that point of failure is going to become a prime target for hackers, Debayan Gupta said.

Government has a number of security issues:Stating that government agencies face a number of security issues, Priydarshi Banerjee and Debayan Gupta argue that creating a backdoor for the government to identify the originator of a message will inevitably allow criminals in as well. So the question is also that is the price of potentially putting all our communications, every single one at risk worth the value that theyre sort of asking for in this context, Banerjee asked.

People in the middle of a message chain will be compromised:Even if the government is only trying to track down the originator of a message, all the others in the message chain will also be compromised because there is no way to only identify the originator without maintaining records throughout the chain. Giving an analogy to the postal system, Gupta said This idea of shortcutting everything is like would you do that to the postal system? How would you require the postal system to look inside every envelope, and keep track of every message that was sent? So that if a threatening message was received by the president of India, you could immediately track it back to the first person who wrote that message, rather than the 15 intermediaries that went through. Is that what were saying, that we now require the postal system to do that because that is the exact equivalent of what has been proposed.

Representing the government, Rakesh Maheshwari, Senior Director and Group Co-ordinator, Cyber Law & Security, MeitY, conveyed the governments intent regarding various subrules. He also fielded questions from MediaNama on traceability, compliance, timelines, clarifications of definitions, and more. Here are his views on traceability and encryption:

Not looking at the encryption aspect: We are not at all looking at the way the encryption has been done, the way decryption is being done. We are not at all looking at it, we are only looking that at the end-user device, the message does remain unencrypted. And if it is being simply being forwarded, then before it is being forwarded, it is the same message, and hence the hash should remain the same. Now, how exactly it is to be done, which technical architecture to be deployed, is best for the platform [to decide], Rakesh Maheswari noted.

Platforms cannot take shelter using end-to-end encryption:There are certain expectations that users shall not be engaged in certain activities. Platforms cannot just put that in the terms of conditions and use end-to-end as a shelter when users do engage in them, Maheswari noted. Our intent is that if there is trouble being created in the system, the system cannot just take the shelter of it being end-to-end encrypted and therefore be completely unaware and hence completely escape out of the problem. We want platforms to be accountable, we want people to also be accountable, he added.

More than three months given:In response to MediaNamas question on whether the government thinks it has given sufficient time for implementation of this mandate and Debayan Guptas argument that there is no way to know if three months is enough,Maheswari responded that the government has in fact given more than three months because this mandate has been in the public draft for the last two years and platforms knew it was coming. He also added that if three months is not enough to implement a certain rule or subrule, the government will be practical and accommodate extension requests.

Lots of checks and balances in place:Maheswari argued that the government has put lots of checks and balances in place to prevent the misuse of the traceability provision but does not give examples of any such measures. The rules also do not provide any details regarding the safeguards in place.

No cost-benefit analysis done:In response to an audience question on whether the government has done a cost-benefit analysis of the traceability mandate, Maheshwari responded that it isnot for government to do the cost-benefit analysis and that the government has the right to know the root cause of a problem.

There is always a bypass:Maheswari did concede that despite all the measures the government takes, criminals will find a way to bypass the law. But he argues that the rules are meant to suffice for the general case and not these extreme situations. The rule should by and large be able to meet the expectations of the government, as well as, I hope the users, he added.

Also Read

See original here:
#NAMA: The traceability mandate and what it means for end-to-end encryption - MediaNama.com

Read More..

Global Cloud Encryption Market To Experience Scalable Growth Heights By 2026 ZMR KSU | The Sentinel Newspaper – KSU | The Sentinel Newspaper

The business report released by Zion Market Research onGlobal Cloud Encryption Market To Experience Scalable Growth Heights By 2026 ZMRis focused to facilitate a deep understanding of the market definition, potential, and scope. The report is curate after deep research and analysis by experts. It consists of an organized and methodical explanation of current market trends to assist the users to entail in-depth market analysis. The report encompasses a comprehensive assessment of different strategies like mergers & acquisitions, product developments, and research & developments adopted by prominent market leaders to stay at the forefront in the global market.

FREE | Request Sample is Available @https://www.zionmarketresearch.com/sample/cloud-encryption-market

The major players in the globalCloud Encryption MarketareGemalto N.V., Ciphercloud, Inc, International Business, Machines Corporation, Hytrust, Netskope, Inc, Skyhigh Networks, Symantec Corporation, Thales E-Security, Secomba GmbH, Trend Micro Incorporated, VaultiveInc., Sophos Group PLC, TWD Industries AG, Parablu Inc. and many others.

Along with contributing significant value to the users, the report by Zion Market Research has focused on Porters Five Forces analysis to put forward the wide scope of the market in terms of opportunities, threats, and challenges. The information extracted through different business models like SWOT and PESTEL is represented in the form of pie charts, diagrams, and other pictorial representations for a better and faster understanding of facts. The report can be divided into following main parts.

Growth drivers:

The report provides an accurate and professional study of global Cloud Encryption Market business scenarios. The complex analysis of opportunities, growth drivers, and the future forecast is presented in simple and easily understandable formats. The report comprehends the Cloud Encryption Market by elaborating the technology dynamics, financial position, growth strategy, product portfolio during the forecast period.

Download Free PDF Report Brochure @https://www.zionmarketresearch.com/requestbrochure/cloud-encryption-market

Segmentation:

The report is curate on the basis of segmentation and sub-segmentation that are aggregated from primary and secondary research. Segmentation and sub-segmentation is a consolidation of industry segment, type segment, channel segment, and many more. Further, the report is expanded to provide you thorough insights on each segment.

Regional analysis:

The report covers all the regions in the world showing regional developmental status, the market volume, size, and value. It facilitates users valuable regional insights that will provide a complete competitive landscape of the regional market. Further, different regional markets along with their size and value are illustrated thoroughly in the report for precise insights.

Inquire more about this report @https://www.zionmarketresearch.com/inquiry/cloud-encryption-market

Competitive analysis:

The report is curate after a SWOT analysis of major market leaders. It contains detailed and strategic inputs from global leaders to help users understand the strength and weaknesses of the key leaders. Expert analysts in the field are following players who are profiled as prominent leaders in the Cloud Encryption Market. The report also contains the competitive strategy adopted by these market leaders to the market value. Their research and development process was explained well enough by experts in the global Cloud Encryption Market to help users understand their working process.

Key Details of the Existing Report Study:

Frequently Asked Questions

Thanks for reading this article;you can also get individual chapter wise section or region wise report version like North America, Europe or Asia.

About Us:

Zion Market Research is an obligated company. We create futuristic, cutting-edge, informative reports ranging from industry reports, the company reports to country reports. We provide our clients not only with market statistics unveiled by avowed private publishers and public organizations but also with vogue and newest industry reports along with pre-eminent and niche company profiles. Our database of market research reports comprises a wide variety of reports from cardinal industries. Our database is been updated constantly in order to fulfill our clients with prompt and direct online access to our database. Keeping in mind the clients needs, we have included expert insights on global industries, products, and market trends in this database. Last but not the least, we make it our duty to ensure the success of clients connected to usafter allif you do well, a little of the light shines on us.

Contact Us:

Zion Market Research244 Fifth Avenue, Suite N202New York, 10001, United StatesTel: +49-322 210 92714USA/Canada Toll-Free No.1-855-465-4651Email:sales@zionmarketresearch.comWebsite:https://www.zionmarketresearch.com

Read the rest here:
Global Cloud Encryption Market To Experience Scalable Growth Heights By 2026 ZMR KSU | The Sentinel Newspaper - KSU | The Sentinel Newspaper

Read More..

The Deep-Sea Podcast review: The mind-boggling mysteries of the deep – New Scientist

By Sandrine Ceurstemont

Wolf eels can be found more than 200 metres below the ocean surface

Franco Banfi/naturepl.com

The Deep-Sea Podcast

Armatus Oceanic

Advertisement

IT IS hard to imagine what the deep sea actually looks like. There is practically no light in this lowest layer of the ocean, which starts at a depth of 1800 metres and reaches almost 11,000 metres at its deepest-known point within the Mariana trench in the western Pacific Ocean. Hence nobody has actually seen the deep sea close up, meaning we typically rely on colourful depth maps created with acoustic techniques to visualise it.

Furthermore, it is hard to make sense of the sheer scale of what lies underwater. The Pacific Ocean covers almost half the planet, for example. Due to its intangible nature, inaccurate analogies are often used to describe the deep sea.

Alan Jamieson at the University of Newcastle, UK, is renowned for his journeys to the deepest parts of the ocean. He has teamed up with Thomas Linley, a deep-sea fish expert, to co-host a podcast that portrays the deep sea as it really is, but without removing any of the wonder. Every episode of The Deep-Sea Podcast delves into both important issues, such as whether deep-sea mining should be allowed to happen, and more light-hearted angles, such as a Halloween special on why humans seem to intrinsically fear the deep sea.

The first instalment kicks off with one of Jamiesons biggest bugbears: comparing the deep sea with the moon. It is often said that we know more about the moons surface than the deep sea, which he says is just plain wrong. What other scientific discipline would start by saying how little they know about it?

Jamieson thinks the analogy is unfair, firstly because the moon isnt that big. The surface area of the Atlantic Ocean, for example, is almost three times larger than that of the moon. And while crewed missions to the moon have pretty much stopped, those to the deep sea have never ceased and have even ramped up. We know so much more about the deep sea now than we did five years ago or 10 years ago, says Jamieson.

Each episode features an interview with a guest. Recent examples include director and producer James Cameron, who chatted about deep-sea tech and delved into the secrets of underwater lighting he learned while filming Titanic, as well as discussing ideas like walking on the seafloor by embedding consciousness in a robot.

The guests provide unique perspectives. For example, Alexandra Gould, a UK-based artist who accompanied scientists on a deep-sea expedition in 2019, sketched almost all the crew, as well as sea life and moments that represented her interaction with the vessel when she was onboard. While marine biologists typically aim to analyse deep-sea creatures in detail, she says she prefers not to know too much about their biology as it can take away from the awe they inspire.

The Deep-Sea Podcast has many compelling moments, and the hosts provide expertise on aspects of the field. However, episodes are quite long, often lasting more than hour, and try to cover too much. They incorporate deep-sea news, for instance, which seems like it could merit its own podcast.

All in all, the show suggests that our relationship with the deep sea is becoming more complex. So far, it has been relatively untouched, apart from during scientific research. However, new ventures like deep-sea mining and tourism could soon change that, with the first leisure trips taking place last year. Vast amounts of the deep ocean havent even been looked at, says Cameron. It would be nice if we understood it before we destroy it.

Fix the Planet newsletterFind out how technology is tackling climate change newscientist.com/fix

More on these topics:

Read the rest here:
The Deep-Sea Podcast review: The mind-boggling mysteries of the deep - New Scientist

Read More..

Three Books: Zena Hitz *05 on a Life of the Mind – Princeton Alumni Weekly

Courtesy of Zena Hitz *05

As a tutor at the liberal-arts bastion St. Johns College, Annapolis, Zena Hitz *05 guides students through the great books. She also lectures about the necessity of leisure through the Thomistic Institute, and recently publishedLost in Thought: The Hidden Pleasures of an Intellectual Life, in which she argues that a deep interest in the humanities can lead to a rich inner life. PAW asked her to recommend books about lives enriched through thought, and she suggested these:

The Peregrine

By J.A. Baker

Baker was a clerk at the Automobile Association in Essex, England, who studied the peregrine falcons in his spare time. He condensed 10 years of study into this short literary masterpiece. Bakers seemingly small habit of birdwatching opens him out into reflection on the fundamentals of nature, natural world, and animal and human violence.

Confessions

By Saint Augustine

Augustines memoir of his spiritual transformation through philosophical study has transfixed readers for centuries. His story is gripping in its broad outlines, but it is so intricately crafted that I continue to learn from the book by reflecting on even its tiniest details.

The Autobiography of Malcolm X

As told to Alex Haley

Malcolm X is famous as a speaker and an activist for Black liberation. His autobiography gives an account of the inner workings of that life, how his work was sustained by intense inward reflection, and a vast appetite for reading classics of all ages and cultures.

Read the rest here:
Three Books: Zena Hitz *05 on a Life of the Mind - Princeton Alumni Weekly

Read More..

Flavor 1st has Georgia on its mind | Produce News – TheProduceNews.com

Flavor 1st Growers & Packers, which supplies customers up and down the East Coast and east of the Mississippi, has deep roots in the produce industry.

Mountain Bean Growers Inc., one of the largest production operations in Western North Carolina, heads up the companys farming operations in North Carolina, South Carolina, Florida and Georgia.

Were growing tomatoes and vegetables in Georgia and North Florida, which bridges the gap, said Mike Porter, sales representative for the Mills River, NC-based company. Were doing all the dry-veg items beans, squash, Bell peppers, cucumbers in Georgia, and also doing grape tomatoes and round tomatoes.

The companys Georgia deal is with Dan King Farms, and Flavor 1st has two guys on site that do the actual sales out of the building Wayne Mertens and Donnie Dulevich.

Were one of the few that can say we have Georgia Grown produce from May 15 until Oct. 15, Porter said. In addition to Dan King Farms, we have another grower in Osage Farms, in Dillard GA, that farms all summer with beans squash, cabbage and tomatoes. This helps us for a longer season.

Flavor 1st has a great local deal with retailers in the state throughout the summer months. For the upcoming season, on cucumbers and peppers, it was wet early and there was a hard time getting plastic laid, so both are a little bit behind schedule. Porter expects them to be a little tight during the first week of the Georgia deal.

I think squash and beans will also be a little tight, but not because of rainy weather at the beginning, but more from the recent cooler weather, he said. We had a little bit of a frost, so we had some burns on the top of the bush, with the beans and squash plants getting a little frostbite on the top, so that will slow them down.

That will most likely mean both commodities will be tight at the beginning, but then should be really good the rest of the season.

With things opening back up, Flavor 1st expects chain stores will not need as much product as people start eating out again, but Porter doesnt anticipate doing much different in 2021. One difference is returning to a former crop.

Last year we did not grow grape tomatoes or round tomatoes at Dan Kings place, but we did it a couple of years ago and took a couple of years off, but now were back so thats kind of our reboot in Georgia, Porter said.

Porter recently returned from the Southeast Produce Councils Southern Exposure show, which he described as good but different but he was just happy to be face-to-face with people for the first time in a long time.

Things have been a little tough with all the Zoom meetings and you cant go visit customers, and they cant come to the farm level like they used to, so its been somewhat difficult to have those personal connections that we used to have, Porter said. With SEPC, it was kind of great to get back out and maybe start moving in the direction of maybe visiting key customers and other growers.

See more here:
Flavor 1st has Georgia on its mind | Produce News - TheProduceNews.com

Read More..

Young attorney digs deep to make a genuine mark in the profession – Loop News Jamaica

Attorney-at-Law, Cecile Black, through her Northeastern Legal Aid Society (NELAS), is busy seeking to ensure that poor and vulnerable persons in her native parish of Portland and surrounding areas can access justice, by providing them with quality legal representation.

The entity, established in 2020, offers subsidised legal services for criminal cases, family court matters, especially those related to children and custody issues; and contracts.

Our clients are assigned through the Kingston Legal Aid Clinic or directly through our office where we conduct a means and needs assessment to determine the fees to be paid, Black told JIS News in an interview.

Targeted are persons involved in criminal or civil matters who are in danger of having their civil rights infringed upon, or their claims go unheard, because of their inability to pay.

The establishment of the society was the fulfilment of a promise Black made to herself, to dedicate part of her lifes work to providing legal aid services to those who cannot afford to pay regular fees for a lawyer.

The idea took flight when she worked on cases coming out of the Kington Legal Aid Clinic at a time when she could not find employment as a practising attorney.

She said the society is committed to ensuring that every individual in the parish is able to access proper and affordable legal representation.

She further said it is her desire to help all her clients feel like they have a million-dollar lawyer despite the financial hardships.

The symbols used for the logo are the commonly known legal scales of justice with the inclusion of a sword to signify that the NELAS team members are legal warriors fighting for justice, she pointed out.

The young attorney, in outlining her journey in the legal profession, told JIS News that she knew that she wanted to be a lawyer from she was six years old.

I was inspired by the judge on the television show, Matlock, but my mom told me that I would have to become a lawyer before becoming a judge. That is where I made up my mind to practise law and I have never swayed from that desire. My eyes have always been on the prize, despite setbacks, she said.

She had her first case back in primary school, where she helped to settle an incident involving stolen money.

An indigent student was wrongly accused of stealing another students lunch money. I advocated and asked the relevant questions to the point where the actual perpetrator confessed, she recalled.

Over the years, she worked diligently in school in pursuit of her dream, attending Titchfield High School in Portland and graduating in 2006, them moving on to Browns Town Community College in St Ann, where she completed her Caribbean Advanced Proficiency Examinations (CAPE) in 2008.

She then applied and was accepted to study law at the University of the West Indies (UWI), but could not take up the offer at the time, as her parents had dedicated all their finances to rebuilding the family home, which had been destroyed by fire in 2005.

Without the funds to study law, Black decided to pursue a bachelors degree in history, which she did from 2008 to 2011, after which she entered the Faculty of Law, completing the Bachelor of Laws degree in 2014.

Shortly after, I began my journey at the Norman Manley Law School, and stayed for two years, where I eventually passed the Bar to become an attorney-at-law, said Black.

She elaborated that the journey into the real world of practising law and being an adult outside of school was a rude awakening for me. I expected to be gainfully employed shortly after being called to the Bar, but my story was destined to be riddled with some amount of trials.

She shared that she struggled to find a job, noting that she was without an income for over a year.

However, she used the period as an opportunity to sit in some court sessions and learn by observing. She eventually crossed paths with attorney-at-law Jacqueline Asher, who took her on as an unpaid intern.

Their working relationship blossomed, and Black sat as second chair on criminal cases and handled legal aid matters that came to Ashers firm.

While she was gaining real-world law experience, Black was still without a salary.

It got to the point where I had no food in my cupboard and walked to and from work. There was a time period in which I had to choose which utilities to keep afloat, and which to cut off, she shared.

But the lessons learnt at that time led her to establish NELAS, as she saw first-hand the impact of persons not being able to afford legal representation.

In preparing for cases and understanding my clients, it dawned on me that some people are heavily impacted by their circumstance and, unfortunately, that may mean coming face to-face with the law without help from friends or family. I wanted to help and I promised myself to dedicate part of my time to offering legal aid assistance when I branched out on my own, said Black.

Regardless of her personal struggles, she said she did her best on every matter she handled, and for every client whom she represented, and before long, she had her first paying client.

Black was assigned a case that was transferred to Ashers firm from another company, and the young lawyer managed to settle the matter within a week. The client was so pleased that he hired her on retainer basis.

That was the moment my life and career took a turn for the better. I was able to pay my bills, stock my cupboards, and be comfortable again. I even began to invest in stocks and sought life insurance, she said.

As her career took flight, Black said she never forgot her pledge to help the less fortunate, and soon began to formulate the plan to develop NELAS.

I wrote out the entire structure of my office, the services to be offered, the dcor, and where it would be located. I had the plan in my head, and I put it all on paper.

With no clue how to properly finance it, I went ahead and took steps to formalise my idea. Before I knew it, NELAS was formed, she said.

Blacks vision for NELAS, where she is the Chief Executive Officer and Founder, is to open an office in all northeastern parishes of Jamaica to better enable the entitys ability to serve clients in general in that region of the island. For now, she is the only lawyer there, but she has a strong support staff.

Unfortunately, not everyone can afford to pay for proper (legal) representation, and their inability to pay should not dictate what type of representation they have, she contended, noting that innocent persons can end up in jail without proper legal representation.

Black urged more lawyers to take legal aid cases.

Consider it as giving back to your community and the nation at large, she said.

Original post:
Young attorney digs deep to make a genuine mark in the profession - Loop News Jamaica

Read More..

Figures of Speech: 40 Ways to Improve your Writing – Visual Capitalist

View the high resolution of this infographic by clicking here.

Figurative speech plays an important role in our ability to communicate with one another. It helps create compelling narratives, and evoke emotion in readers.

With this in mind, this periodic table graphic by Visual Communication Guy groups the 40 different figures of speech into two distinct categoriesschemes and tropes.

Whats the difference between the two, and how can they help improve your writing?

In linguistics, a scheme is language that plays with sentence structure to make a sentence smoother, or even more persuasive, using syntax, word order, or sounds.

Here are four different ways that schemes fiddle with sentence structure.

This is especially important when trying to make a sentence smoother. A good example of balance is parallelism, which is when you use the same grammatical form in at least two parts of a sentence.

Changing the position of words can have an impact on the way a sentence is understood. For instance, anastrophe is the deliberate reordering of words in a sentence to either emphasize a certain point, or distinguish a character as different.

Omissions and inclusions are useful in order to build suspense or add emotional expression to text. For example, an ellipsis is a form of punctuation that uses three dots () to either replace a word in a sentence or indicate a break in speech or an incomplete thought.

Similar to the other types of schemes, repetition allows you to emphasize a certain point you want the reader to pay attention to, but its also used to create rhymes and poetry.

A well-known literary device, alliteration uses the same consonant sound at the start of each word in a sentence. It doesnt necessarily have to be the same letter, so long as the sound is the same.

While schemes play around with the mechanics of a sentence, tropes stray from the literal or typical meanings to evoke emotion, and keep a reader engaged and interested.

Tropes help create an alternative sense of reality, using these five strategies.

These are literary devices that help paint a deeper picture of a concept, using a reference to something related, but different.

Metaphors and similes are common examples of references, but a lesser-known type of reference is a synecdoche, which is when a small part of something is used in reference to the thing as a whole.

This type of literary device plays with sounds or meaning to add depth to a sentence. For instance, a syllepsis uses one word to create parallels between two separate thoughts, while an onomatopoeia is a figure of speech that uses words (either real or made-up) or even letters to describe a sound.

This is when someone replaces a word or thought with something else. For instance, anthimeria is the use of a word in a grammatical form its not generally used in, while periphrasis is when someone intentionally elaborates on a point, instead of expressing it succinctly.

These are intentionally exaggerated, or downplayed situations that arent meant to be taken literally. A hyperbole is an example of an overstatement, while litotes are the oppositedeliberate understatements.

This type of literary technique uses contradictory ideas and indirect questions for dramatic effect, or to emphasize a point. For instance, an oxymoron is when two contradictory words are used back-to-back.

First, lets just address itYes, I did use alliteration in the above header, and yes, now Im using an ellipsis in this sentence.

Because lets face itin the age of information overload, writing articles that are interesting and compelling to readers is a top priority for online content creators. And using figurative language is a good way to keep readers attention.

So, if youre a content creator yourself (or simply looking to beef up your knowledge on linguistics), hopefully this graphic has helped you on that journey.

Thank you!

Given email address is already subscribed, thank you!

Please provide a valid email address.

Please complete the CAPTCHA.

Oops. Something went wrong. Please try again later.

Read the original post:
Figures of Speech: 40 Ways to Improve your Writing - Visual Capitalist

Read More..

Tony Bailie’s Take on Nature: Bear in mind the simple principles of Leave No Trace – The Irish News

A PIECE of orange peel lying at the foot of a tree in a forest, or a banana skin on the side of a mountain sure they'll just rot and fertilise the landscape. It's recycling.

But these will not decay at the same rate as a leaf from an indigenous tree or fruit such as a blackberry or bilberry.

Bananas and oranges are non-native to Ireland and the microbes in our soil and air do not act on them as efficiently and so they biodegrade much more slowly, taking up to two years to be fully absorbed.

And rather than fertilising, banana skins have a lot of potassium which will actually change the composition of Irish soil. There is also a danger that the scraps of foods that may be nourishing or enjoyed by humans when left in wild places will be eaten by birds and mammals and even insects which cannot digest them properly and which could harm them.

We have all seen the monster gulls which swoop around the streets of towns and cities, scavenging on the great tasting' or finger licking good' scraps lying around the place.

And in more rural areas, scavengers such as magpies and crows will be attracted to edible rubbish, scaring off and displacing smaller and more endangered birds.

It can also attract invasive species which threaten our indigenous flora and fauna, presenting even further challenges to our already fragile ecosystems.

Plastics, polystyrene, tin cans, cardboard cartons, batteries and, more recently, surgical masks, are being strewn throughout our countryside and, as well as the eyesore factor, present dangers to wildlife and our biodiversity.

The outdoors has become a much more appreciated asset in the past year and the numbers of people enjoying outdoor activities has increased significantly. Unfortunately, this has also brought more litter.

An island-wide initiative, with international links, has been developed to promote outdoor ethics and encourage responsible recreation through education, research and partnership. Leave No Trace has been adopted by key players north and south and has been founded on seven key principles. Some of them are so obvious that it is a wonder that they have to be even included.

Minimise the effects of fire'. Surely no-one would think of lighting a fire in a fragile outdoor environment after a period of dry weather when the vegetation had dried out and had become hugely flammable?

While the principles are aimed primarily at walkers, they could be usefully shared with other key stakeholders in our countryside, including farmers, commercial premises and industries working in or close to environmentally sensitive areas.

Another of the Leave No Trace principles addresses one of the great unspokens of outdoor enthusiasts where to go when you need to go and there is nowhere to go.

For the record, the advice is to use proper facilities when you can, but if that is not possible, find a bush or a tree at least 70 steps from water, campsites and trails. And if it involves solids, dig a hole 10-12cm deep and cover it over, making sure any used toilet paper or hygiene products are removed in an impermeable bag and disposed of appropriately.

I think I can now justifiably be accused of talking crap in this column.

Another principle is to leave what you find avoid picking wildflowers or disturbing natural habitats and historic sites. Look but don't touch.

The other principles are to plan ahead and prepare, be considerate of others, respect farm animals and wildlife (always keep dogs on leads and if an animal moves in response to your presence you are too close). And stick to paths when you can and only camp on durable ground.

More details on the principles and the initiative can be found at leavenotraceireland.org

Read the rest here:
Tony Bailie's Take on Nature: Bear in mind the simple principles of Leave No Trace - The Irish News

Read More..

Food & Wine names 10 best pizza states in America and New York isnt in the top spot – KXAN.com

(NEXSTAR) New Yorkers might not be thrilled with Food & Wines opinion of its pizza.

The editors at Food & Wine recently published their own list of the best pizza states in America, and New York while still earning a favorable review didnt finish in first place. Instead, the top honors went to New Yorks neighbors in the Tri-State Area, with New Jersey and Connecticut coming in first and second, respectively.

Long before the pandemic, New Yorks aggressive self-belief in its own pizza had started to seem a little dated, wrote Food & Wine senior editor David Landsel in his lengthy ranking, published Tuesday.

Thats not to say that Landsel a native New Yorker who compiled the list with only a certain amount of collaboration from Food & Wines other editors doesnt still enjoy New York pizza. New Yorks overwhelming availability of a decent-to-exceptional slices set the state well apart from the rest, he says. But, specifically in New York City, he argues that some of the most recognizable names in New York pizza have become undependable.

New Jersey, meanwhile, is currently the best pizza state in the country, according to the Food & Wine editor, who made special note of Jersey Citys Razza and Bread & Salt restaurants, for their glorious showcase of pizza.

The state is one in an elite group remaining true to their heritage, through long periods of time when others were too busy crashing ahead into the future to care about theirs.

Also ahead of New York on Food & Wines list is Connecticut, with Landsel giving a nod to the concentrated pool of pizza-making talent in New Haven, demonstrated at mainstays such as Frank Pepe Pizzeria Napoletana and Sallys Apizza.

Illinois followed New York in fourth place, earning its ranking not only for deep-dish pizza but also its thin-crust varieties, and Michigan, the home of thick, square Detroit-style pies, ranked fifth.

California, Pennsylvania, Massachusetts, Ohio and Missouri rounded out Food & Wines top ten list of best pizza states.

The rest of the county, however, wasnt completely left out of the fun. As somewhat of a consolation prize, Food & Wine included its editors assessment of the best pizza options in every other state, for folks who dont mind eating 11th-rate (or lower) pizza.

Continued here:
Food & Wine names 10 best pizza states in America and New York isnt in the top spot - KXAN.com

Read More..