Kolkata: CPI(M) leader Sujan Chakraborty has further fuelled the ongoing demonstration at Calcutta Medical College and Hospital (CMCH) by extending moral support to the agitating students on Thursday.Some of the MBBS students from second and third year started protest a demonstration inside the hospital campus with a demand of a new hostel. Around six students have started a hunger strike to mount pressure on the CMCH authorities to fulfill their demands. Also Read – Rain batters Kolkata, cripples normal lifeAround 20 interns have joined the movement on Thursday, while six students continue their hunger strike. The students have threatened to continue the agitation till their demands are met.Meanwhile, the Principal of the CMCH, Uchhal Bhadra, has been under treatment in SSKM Hospital after he was heckled by the agitating students on last Tuesday.The incident had drawn sharp criticism from a section of doctors. Many have, however, termed it as a politically motivated incident to hurt the principal with mala-fide intentions.
In a fresh bid to empower its over 300 million users, the micro-blogging website Twitter on Wednesday made it easier for them to report cyberbullying.Twitter has expanded its “mute” feature which enables users to mute accounts they don’t want to see Tweets from.“Now we’re expanding mute to where people need it the most: in notifications. We’re enabling you to mute keywords, phrases, and even entire conversations you don’t want to see notifications about, rolling out to everyone in the coming days,” Twitter said in statement. Also Read – Add new books to your shelfTwitter’s hateful conduct policy prohibits specific conduct that targets people on the basis of race, ethnicity, national origin, sexual orientation, gender, gender identity, religious affiliation, age, disability, or disease.“We’re giving you a more direct way to report this type of conduct for yourself, or for others, whenever you see it happening. This will improve our ability to process these reports, which helps reduce the burden on the person experiencing the abuse,” the statement read.“We’ve also improved our internal tools and systems in order to deal more effectively with this conduct when it’s reported to us. Our goal is a faster and more transparent process,” Twitter said.
Social media and internet reports can be used to reliably forecast infectious disease outbreaks, especially when data is scarce, a new study has found.”Our study offers proof of concept that publicly available online reports released in real-time by ministries of health, local surveillance systems, the World Health Organisation (WHO) and authoritative media outlets are useful to identify key information on exposure and transmission patterns during epidemic emergencies,” researchers said. Also Read – Add new books to your shelf”Our Internet-based findings on exposure patterns are in good agreement with those derived from traditional epidemiological surveillance data, which can be available after considerable delays,” they said.Mathematical models forecasting disease transmission are often used to guide public health control strategies, but they can be difficult to formulate during the early stages of an outbreak when accurate data are scarce, according to the researchers from the Georgia State University in the US. Also Read – Over 2 hours screen time daily will make your kids impulsive”In the absence of detailed epidemiological information rapidly available from traditional surveillance systems, alternative data streams are worth exploring to gain a reliable understanding of disease dynamics in the early stages of an outbreak,” they said.To test the reliability of alternative data streams, researchers tracked and analysed reports from public health authorities and reputable media outlets posted via social media or their websites during the 2014-2015 Ebola epidemic in West Africa and the 2015 Middle East Respiratory Syndrome outbreak in South Korea. Researchers used the reports to collect data on the viruses’ exposure patterns and transmission chains.They also noted the West African Ebola outbreak was a particularly interesting case study because early data were limited to basic weekly case counts at the country level.They were able to use internet reports describing Ebola cases in the three hardest hit countries – Guinea, Sierra Leone and Liberia – to glean detailed stories about cases arising in clusters within families or through funerals or hospital exposure.”Our analysis of the temporal variation in exposure patterns provides useful information to assess the impact of control measures and behaviour changes during epidemics,” they said.The findings are published in the Journal of Infectious Diseases.
4 min read Fraudulent or annoying content on your company’s social network can undermine customer trust and ultimately hurt your business.Such content runs the gamut from automatically generated mass emails trying to sell something to carefully crafted cons intended to swindle users out of money. To prevent spam and scams from infecting your social network and harming your reputation, consider these five tips to help keep your users safe:1. Require extra verification from users. When spammers attempt to reach as many people as possible, they often develop programs that create multiple fake users on social networks. But if there’s an extra level of verification in the process to create a user profile or to log in, a spammer’s program will fail, says Kevin Cardwell, master trainer for the International Council of E-Commerce Consultants. For example, a user might see an image of a house and have to identify it to log in. Another popular type of verification, which is called CAPTCHA, requires users to type the letters and numbers shown in a graphic script. Individuals can easily complete these verification tests, Cardwell says, but it is “harder to write automatic tools to do that.”Your IT team should be sure to insert these extra layers of verification. Alternatively, if an entrepreneur is purchasing an application to develop a website, security features should be included, Cardwell says. Some Internet security companies, such as DeepnetSecurity, also can help business owners add additional layers of verification to the login process. Prices for such software vary, but DeepnetSecurity offers price quotes on its site.Related: Why You Should Consider Outsourcing Computer Security2. Install a web application firewall. A firewall protects users by preventing hackers from compromising the site. While there is virtually no way to completely eliminate problems, a firewall “is going to mitigate the risk and make it harder” for a hacker to get into your site, says Cardwell. “Usually, they will go to someone who is not protected by a web application firewall” in the same way that a burglar alarm deters thieves. Cardwell recommends ModSecurity and WebKnight, which are free, as well as Profense, which costs $2,995 and includes one year of technical support and upgrades.3. Identify risky devices. Every digital device has a unique Internet Protocol address, or IP. If you find hundreds of posts or profiles from the same IP address within a short period of time, that’s a good sign the user is fraudulent. Spammers often rely on quantity: If they send out enough emails or set up enough fake profiles, they figure somebody will bite. David Evans, the online editor of Online Dating Insider, a blog covering the business of online dating, recommends monitoring what device users are logging in with using a company called iovation. Iovation has a database of more than 800 million unique devices and can identify those that have been involved in risky activity. The cost to use iovation depends on the industry and transaction volume.Two other online security companies that Evans recommends are MaxMind and Subuno. MaxMind charges a product license fee that runs $15 to $370, plus a monthly update fee that ranges from $3 to $90, depending on the type of database. Subuno charges between $19 and $249 a month, based on the number of transactions.Related: Three Tips for Using Public Wi-Fi Safely4. Scan your site for links. Hackers or spammers will post responses to online conversations by directing customers to another site. An entrepreneur should be wary of a comment along the lines of, “Oh, what you said here is very interesting, take a look at this link that says something that is similar,” says Jules Polonetsky, director and co-chair of the Future of Privacy Forum, a Washington, D.C.-based think tank, and former chief privacy officer at AOL. Typically, the link will take a user either to a site where a spammer is selling something or to an infected site that will compromise the user’s computer or steal personal information.5. Empower your customers. “An owner of a small business can’t be everywhere,” says Polonetsky. “It is the other posters [to your website] who are there day-to-day who can be the best eyes and ears.” So you want to give your users a way to flag inappropriate behavior. Popular sites like Facebook and YouTube have clickable icons for reporting spam or other inappropriate content, Polonetsky says. “Responding to your active members and making it very clear that you want to hear and that you will react to what they raise helps deputize every one of them.”Corrections & Amplifications: The name of the online security company Subuno was incorrectly spelled in an earlier version of this article. Register Now » February 23, 2012 Growing a business sometimes requires thinking outside the box. Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global
Free Webinar | Sept 5: Tips and Tools for Making Progress Toward Important Goals April 27, 2015 Attend this free webinar and learn how you can maximize efficiency while getting the most critical things done right. Register Now » 2 min read If you knew a person that could scale a wall carrying an elephant or drag a blue whale with ease, they would be a real-life superhero, right? Well, some mechanical engineers at Stanford University have made tiny robots that have some Incredible Hulk-style strength of their own.The robots are called µTug or MicroTugs, and the miniature innovations can pull off some impressive feats. For example, a 9-gram robot climbing up glass can carry 100 times its own weight, and a 12-gram robot can sustain something 2,000 times its own weight.Related: These Giant Robotic Ants Could One Day Replace Factory WorkersThat blue whale analogy is pretty apt given the natural world inspiration behind the robot’s movements. Ants and geckos can climb as well as lift and drag things much bigger than them thanks to adhesives on their feet.The adorable robots were designed with flexible rubber spikes with a strong grip at the bottom of their “feet,” and they also move the way that an inch worm does, with one part of the “body” exerting effort while the other stays still to conserve energy.Related: The World Is Embracing Robots But America Keeps Them at Arms LengthWhile the tiny tech is currently relegated to the lab (and the big screen this summer, sort of), the engineers are also looking ahead to how it could be applied on a larger scale, like on a building site, or in an emergency situation to help save the day.