Mysterious power failure takes down Wikipedia, Wikinews

This article mentions the Wikimedia Foundation, one of its projects, or people related to it. Wikinews is a project of the Wikimedia Foundation.

Wednesday, February 23, 2005

On Monday, at 10.14 pm UTC, the Wikimedia server cluster experienced a total power failure, taking down Wikipedia, Wikinews, and all other Wikimedia websites.

The servers are housed in a colocation facility (colo) in Tampa, Florida, USA. They occupy two racks, with each rack receiving electricity from two independent supplies. However, both supplies have circuit-breakers in them, and both opened at the same time, leading to a total power failure. All computers immediately went down. It’s normal for fire safety regulations to prohibit uninterruptible power supplies in colos, with the colo providing its own UPS and generator instead. The circuit breakers were on the computer side of this emergency power system, so none of the computers continued to receive power to survive the breaker trip or shut down safely.

The actual reason why the circuit breakers tripped is currently unknown.

When power was restored, it was discovered that most of the MySQL databases that store the data which makes up Wikipedia et al had been corrupted. The main database and the four slaves had all damaged the data on their hard disk drives beyond the ability of the auto-correction to repair. Only one copy survived safely, on a machine that is used for report generation and maintenance tasks, which remained 31 hours backlogged while catching up after an unusually heavy update load during the previous week.

Volunteer Wikimedia engineers worked through the night rebuilding the databases from the sole good copy onto the other servers. The Wikipedia database is over 180Gb in size, making the copying process last 1.5 – 2 hours for every server it was performed upon.

Regular back-ups of the database of Wikipedia projects are maintained – the encyclopedia in its entirety was not at risk. The last database download was made on February 9; all edits since then could only have been laboriously rebuilt from logs and recovered from the damaged database requiring much more time and effort.

Limited read-only service was established late Tuesday afternoon, with editing becoming possible 24 hours after the power failure. Final repairs continue now, as well as upgrades to prevent similar issues in the future. Server-intensive features, such as categories and ‘watchlists’ that display recent changes to selected articles to registered users, remain disabled to ease the load on the recovering systems.

The process which led to the damage originated with the operating system, disk controllers, or hard drives failing to flush the data correctly.

If the power to a database server is cut mid-write, the database may be corrupted and unreadable, however the operating system, hardware, and software are designed to make this very unlikely. In a previous incident in 2004 power was also lost to a server but the database was undamaged.

To avoid such damage, each database server saves a copy of an edit to be applied to the database on a separate storage system before making the actual update to the database itself. This so-called ‘write-ahead logging’ should ensure that in the event of a system crash, the database can be rebuilt from a ‘last-good’ state by replaying the edits saved in the log.

Earlier this year popular blogging site LiveJournal suffered a similar power failure when another customer at their colocation facility pressed an Emergency Power Off button, intended for use only by firefighters. The company suffered database corruption similar to that seen at Wikimedia.

LiveJournal are now fitting UPS to their servers to ensure that they have time to shut down safely in the event of a power failure. Wikimedia was said to be investigating the possibility of fitting similar equipment at the time of this failure.

Several pundits have suggested that the use of another database, such as the proprietary database Oracle or the free PostgreSQL, would have avoided the database corruption seen at the server cluster. A post-mortem of the incident show the failure was in the operating system, or the hardware, or some combination of the two. LiveJournal, which also uses MySQL, reported similar database corruption after their power cut.

The Wikimedia foundation only allows the use of free software on its systems, and future versions of the Mediawiki software will support the PostgreSQL database.

Users are reminded that during times of system failure or excessive demand, they can still search Wikipedia using Google. The articles may be viewed using Google’s cache.

Retrieved from “https://en.wikinews.org/w/index.php?title=Mysterious_power_failure_takes_down_Wikipedia,_Wikinews&oldid=4550382”

What Are The Causes And Treatment Of Autism?

People with autism hear, see and feel differently from others. If you are autistic, you will have autism all your life. This is not a disease and cannot be cured. Even autistic people face some difficulties but it affects everyone in different ways. Some autistic people have learning disabilities, mental health problems, or other conditions, which means that people need a variety of support. When assisted properly, an autistic person can be of great help.

How many types of Autism?

There are three types of autism spectrum disorder

Autistic disorder

Most people think of this type of autism as soon as they hear the word autism. People with autistic disorder usually speak late and face social and communication challenges and also have unusual behaviors and interests. Many people with autistic disorder also have intellectual problems.

Asperger Syndrome

People with Asperger’s syndrome usually have some symptoms of autistic disorder. They may face social challenges and may also have unusual behaviors and interests. However, they do not usually have language-related or intellectual problems.

Peripheral developmental disorder

People who have some symptoms of autistic disorder or Asperger’s syndrome may have a perversive developmental disorder. Such people usually have fewer symptoms or have a lower intensity than people with autistic disorder. Symptoms can only cause social and communication challenges.

GoMedii has an online pharmacy that provides you the facility to buy genuine medicine online through the phone. You can free the delivery of medicine within 4 hours.

Symptoms of Autism

What are the symptoms of autism?

Social communication and contact problems

  • Failing to respond to your name.
  • Resist hugging or holding and like to play alone.
  • Avoiding eye contact and no face guardians.
  • Not speaking or delaying speaking or not being able to speak the words or sentences that were previously spoken properly.
  • Unable to initiate or continue the conversation or to initiate a conversation only for request.
  • Speaking with an unusual rhythm, using the sound of a song or a robot-like voice.
  • Repeating words or phrases but not understanding their use.
  • Inability to understand simple questions or directions.
  • Not expressing your feelings and being ignorant of others’ feelings.
  • Avoiding social contact by being passive, aggressive or disruptive.

Behavioral characteristics

  • Repeating certain activities, such as shaking, walking or flapping hands, or self-inflicted sings (such as head banging).
  • Developing specific routines or rituals and getting annoyed with just a few changes.
  • To move continuously
  • Behave uncooperatively or be resistant to change.
  • Coordination problems or performing strange activities (such as walking on toes).
  • Being unusually sensitive to light, sound, and touch and not feeling pain.
  • Non-participation in artificial sports.
  • Keep doing any work or activity with unusual intensity or focus.
  • Having a strange choice of food, such as eating only certain foods or consuming only certain foods.

Order medicine online, Apply coupon code SMILE20 and get a flat 20% discount on 100 % genuine medicine and get the fastest delivery within 4 hours.

Causes and Risk Factors of Autism

Why does autism occur?

There is no known cause of autism spectrum disorder. The complexity and intensity of the disorder vary from person to person and that is why there are many reasons. Both genetic and environmental factors play an important role in autism.

Genetic problems

Autism spectrum disorder involves many different genes. In some children, autism may be related to a genetic disorder. For others, genetic changes can make a child susceptible to autism or create environmental risk factors. Some genetic problems are family, while others occur on their own.

Environmental factors

Researchers are currently exploring whether viral infections, pregnancy complications, or air pollution cause autism spectrum disorder.

Gomedii provides you the best online Pharmacy delivery app. Where you can order medicine and get a flat 25% discount by using coupon code SMILE20 and get the fastest delivery within 4 hours.

What are the risk factors for Autism?

Autism spectrum disorder affects children of all races and nationalities, but some factors increase their risk. like –

Gender – Boys are four times more likely to have autism than girls.

Family History – If a child in a family suffers from autism, the other child is also at greater risk of suffering from it.

Other disorders – Children with certain medical problems are at higher risk of autism.

Buy Medicines online from the most trusted Best Online Pharmacy in Faridabad. You can get both household and OTC medication.

Neanderthals ‘knew what they were doing’: Archæologist Dr Naomi Martisius discusses her findings about Neanderthals’ behaviour with Wikinews

Sunday, June 28, 2020

Last month, a study conducted by archæologist Dr. Naomi Martisius and other researchers concluded Neanderthals living in Europe tens of thousands of years ago were more sophisticated than previously thought. The now-extinct species used to carefully select bones from a particular animal species to manufacture their bone tools, the research showed. The research was published on May 8 in Nature’s Scientific Reports journal.

Dr Martisius and her team used five bone tools discovered from Neanderthals’ sites in southwest France for this research. Four of these bone tools were found in a site called Abri Peyrony and the other one was from Pech-de-l’Azé I. These tools were just a few centimetres in size and were about 50 thousand years old, Dr Martisius told Wikinews. Microscopy analysis of these bone tools called lissoirs (smoothers) suggested Neanderthals used these tools for working animal skin to leathers.

The study stated the fauna of the sites were primarily medium-sized ungulates such as reindeer, in one layer nearly 90%. Despite the overabundance of medium-sized ungulates, Neanderthals used ribs of large bovids for making lissoirs. Dr Martisius told Wikinews this was likely due to the physical characteristics of the bovid ribs, which were “thicker” and “stronger” as compared to the “thin and flimsy ribs” of reindeers. In order to check the origins of the bone tools, the researchers used a technology called non-destructive Zooarchæology by Mass Spectrometry (ZooMS).

Instead of damaging the bone artefacts in order to discover its origins, the researchers collected collagen from the plastic containers in which these artefacts were kept. Collagen is a type of protein. These bone artefacts were kept in plastic containers: some were kept for about five years, some for just a few months. During this time, the collagen proteins from bone tools were stuck to the walls of its plastic containers. The collagen samples collected from the walls of the containers are broken into smaller molecules called peptides by using a chemical enzyme called trypsin.

After the trypsin has broken collagen fibres into peptides, it is analysed using a technology called Matrix-assisted laser desorption/ionization (MALDI) Time-of-Flight mass spectrometer (ToF MS). The assisting matrix is a coloured compound. The acidic peptide is combined with the matrix, vapourised, and peptides are released. Some of them are positively-charged particles which travel across a vacuum tube in an electric field. Depending on the weight of the peptides, these molecules reach the end of the vacuum tube at different instances of time, forming a spectrum. These graphs are like unique fingerprints of a species: they are different for different species of animals. Looking at the database of such graphs, taxonomic identifications of the collagen proteins came be made.

All four bone tools from Abri Peyrony gave positive results and showed that the bones were made from large bovids, even though reindeer were more abundant during that time. One of the advantages of using bovid ribs over reindeer’s thin ribs was the bovid ribs would be more resistant to breaking during flexion, Dr Martisius said.

Dr Martisius said such non-destructive ZooMS analysis was previously conducted, but for tools no older than a few centuries. She said such an analysis had never been previously conducted for artefacts so ancient.

Wikinews caught up with Dr Martisius to discuss this research in-depth.

Retrieved from “https://en.wikinews.org/w/index.php?title=Neanderthals_%27knew_what_they_were_doing%27:_Archæologist_Dr_Naomi_Martisius_discusses_her_findings_about_Neanderthals%27_behaviour_with_Wikinews&oldid=4678768”

NZ Finance Minister introduces 2006 budget

Thursday, May 18, 2006

Today the New Zealand Finance Minister, Hon. Dr Michael Cullen, presented the 2006 New Zealand Budget to the House of Representatives. There is a NZ$8.5 billion OBERAC surplus and a NZ$1.5 billion cash surplus.

It has been labelled as the “Bondi Budget” by National leader Don Brash, “Helen Clark and Michael Cullen believe there is a place for tax cuts – it’s called Australia” he said.

The budget allocates new operating spending of $9.6 billion and capital of $2.7 billion over the next four years.

Key issues in the budget includes:

  • The Telecom New Zealand local loop unbundling (released earlier due to leak).
  • $1.3 billion extra for transport.
  • $3 billion extra for health care, over the next four years.
  • $361 million extra for schooling
  • $166 million extra for tertiary education and skill training
  • $162 million extra for early childhood education
Retrieved from “https://en.wikinews.org/w/index.php?title=NZ_Finance_Minister_introduces_2006_budget&oldid=565592”

Race to save Chilean miners trapped underground from spiralling into depression continues

Thursday, September 2, 2010

It has emerged that the 33 Chilean miners trapped underground after the mine they were working in collapsed could be brought to the surface in a shorter time than was initially feared. While officials publicly announced that the men would not be brought to the surface until Christmas, sources inside technical meetings have revealed that they could in fact be on the surface by early November. The news comes as families were allowed to speak by radio-telephone to their trapped loved ones on Sunday. Over the weekend, video images filmed by the miners emerged showing the miners playing dominoes at a table and singing the Chilean national anthem. The miners also used the camera to send video messages to their families on the surface, saying that they regularly broke into tears, but were feeling better having received food and water.

The grainy nightvision images, filmed on a high definition camcorder that was sent down a small shaft to the mine, show the men in good spirits, chanting “long live Chile, and long live the miners.” They are unshaven and stripped to the waist because of the heat underground, and are seen wearing white clinical trousers that have been designed to keep them dry. Giving a guided tour of the area they are occupying, Mario Sepúlveda, one of the miners, explains they have a “little cup to brush our teeth”, and a place where they pray each day. “We have everything organized,” he tells the camera. Gesturing to the table in the center of the room, he says that “we meet here every day. We plan, we have assemblies here every day so that all the decisions we make are based on the thoughts of all 33.” Another unidentified miner asks to rescuers, “get us out of here soon, please.” A thermometer is shown in the video, reading 29.5C (85F).

As the film continues, it becomes evident that the miners have stuck a poster of a topless woman on the wall. The miners appear shy, and one man puts his hand to his face, presumably dazzled by the light mounted on the cameraman’s helmet. One miner sent a message to his family. “Be calm”, he says. “We’re going to get out of here. And we thank you from the bottom of our hearts for your efforts.” Another said that the miners are “sure that there are people here in Chile that are big people, that are powerful people, that are intelligent people, and they have the technology and they will all work together to get us out of here.” Speaking to the camera, one says: “we have had the great fortune that trapped in this mine there are good, professional people. We have electricians, we have mechanics, we have machine operators and we will let you know that while you are working to rescue us on the surface, we are down here ready to help you too.” It has been reported that Mario Gómez, 63, has become the group’s “spiritual leader”, having worked in the mines for over fifty years. He has requested that materials to build a shrine be sent down to the cavern.

Upon seeing the video in a private screening, family members, who are living in a small village of tents at the entrance to the San José copper-gold mine—which they have named Camp Hope—were elated. “He’s skinny, bearded and it was painful to see him with his head hanging down, but I am so happy to see him alive”, said Ruth Contreras, the mother of Carlos Bravo, who is trapped in the mine. The video, of which only a small portion has been released to the public, shows the miners, many of them wearing helmets, cracking jokes and thanking the rescuers for their continued efforts. The supplies are being sent to the men through a small shaft only twelve centimeters wide, and a laboratory has been set up with the purpose of designing collapsible cots and miniature sandwiches, which can be sent down such a narrow space.

CNN reported on Friday that “officials are splitting the men into two shifts so one group sleeps while the other works or has leisure time .. On average, each man has lost 22 pounds (10 kilograms) since they became trapped three weeks ago, and dehydration remains a threat. But a survey of the men indicates that at least nine miners are still too overweight to fit through the proposed rescue shaft. Initially, the miners survived by draining water from a water-cooled piece of equipment. To stay hydrated in the 90-degree mine, each miner must drink eight or nine pints of water per day.”

But while there are jubilant celebrations on the surface that the miners are alive, officials are now nervous that the miners could become depressed, trapped in a dark room the size of a small apartment. Chilean health minister Jaime Mañalich said that, on the video, he saw the telltale signs of depression. “They are more isolated, they don’t want to be on the screen, they are not eating well”, he said. “I would say depression is the correct word.” He said that doctors who had watched the video had observed the men suffering from “severe dermatological problems.” Dr. Rodrigo Figueroa, head of the trauma, stress and disaster unit at the Catholic University in Santiago, Chile, explained that “following the euphoria of being discovered, the normal psychological reaction would be for the men to collapse in a combination of fatigue and stress … People who are trained for emergencies – like these miners – tend to minimize their own needs or to ignore them. When it is time to ask for help, they don’t.” NASA has advised emergency workers that entertaining the miners would be a good idea. They are to be sent a television system complete with taped football matches. Another dilemma facing Mañalich is whether the miners should be permitted to smoke underground. While nicotine gum has been delivered to the miners, sending down cigarettes is a plan that has not been ruled out.

With the news that drilling of the main rescue tunnel was expected to begin on Monday, officials have informed the media that they hope to have the miners out of the mine by Christmas—but sources with access to technical meetings have suggested that the miners could actually be rescued by the first week of November. A news report described the rescue plan—”the main focus is a machine that bores straight down to 688m and creates a chimney-type duct that could be used to haul the miners out one by one in a rescue basket. A second drilling operation will attempt to intercept a mining tunnel at a depth of roughly 350m. The miners would then have to make their way through several miles of dark, muddy tunnels and meet the rescue drill at roughly the halfway point of their current depth of 688m.” Iván Viveros Aranas, a Chilean policeman working at Camp Hope, told reporters that Chile “has shown a unity regardless of religion or social class. You see people arriving here just to volunteer, they have no relation at all to these families.”

But over the weekend, The New York Times reported that the “miners who have astonished the world with their discipline a half-mile underground will have to aid their own escape — clearing 3,000 to 4,000 tons of rock that will fall as the rescue hole is drilled, the engineer in charge of drilling said Sunday … The work will require about a half-dozen men working in shifts 24 hours a day.” Andrés Sougarret, a senior engineer involved in operating the drill said that “the miners are going to have to take out all that material as it falls.”

The families of those trapped were allowed to speak to them by radio-telephone on Sunday—a possibility that brought reassurance both the miners and those on the surface. The Intendant of the Atacama Region, Ximena Matas, said that there had been “moments of great emotion.” She continued to say that the families “listened with great interest and they both felt and realized that the men are well. This has been a very important moment, which no doubt strengthens their [the miners’] morale.” The phone line is thought to be quite temperamental, but it is hoped that soon, those in the mine and those in Camp Hope will be able to talk every day. “To hear his voice was a balm to my heart … He is aware that the rescue is not going to happen today, that it will take some time. He asked us to stay calm as everything is going to be OK … He sounded relaxed and since it was so short I didn’t manage to ask anything. Twenty seconds was nothing”, said said Jessica Cortés, who spoke to her husband Víctor Zamora, who was not even a miner, but a vehicle mechanic. “He went in that day because a vehicle had broken down inside the mine … At first they told us he had been crushed [to death].”

Esteban Rojas sent up a letter from inside the mine, proposing to his long-time partner Jessica Yáñez, 43. While they have officially been married for 25 years, their wedding was a civil service—but Rojas has now promised to have a church ceremony which is customary in Chile. “Please keep praying that we get out of this alive. And when I do get out, we will buy a dress and get married,” the letter read. Yáñez told a newspaper that she thought he was never going to ask her. “We have talked about it before, but he never asked me … He knows that however long it takes, I’ll wait for him, because with him I’ve been through good and bad.”

Retrieved from “https://en.wikinews.org/w/index.php?title=Race_to_save_Chilean_miners_trapped_underground_from_spiralling_into_depression_continues&oldid=4377226”

What Are Survivable Computer Systems

Submitted by: Darren Miller

Definition Of A Survivable Computer System

A computer system, which may be made up of multiple individual systems and components, designed to provide mission critical services must be able to perform in a consistent and timely manner under various operating conditions. It must be able to meet its goals and objectives whether it is in a state of normal operation or under some sort of stress or in a hostile environment. A discussion on survivable computer systems can be a very complex and far reaching one. However, in this article we will touch on just a few of the basics.

Computer Security And Survivable Computer Systems

Survivable computer systems and computer security are in many ways related but at a low-level very much different. For instance, the hardening of a particular system to be resistant against intelligent attacks may be a component of a survivable computer system. It does not address the ability of a computer system to fulfill its purpose when it is impacted by an event such as a deliberate attack, natural disaster or accident, or general failure. A survivable computer system must be able to adapt, perform its primary critical functions even if in a hostile environment, even if various components of the computer system are incapacitated. In some cases, even if the entire “primary” system has been destroyed.

As an example; a system designed to provide real-time critical information regarding analysis of specialized medications ceases to function for a few hours because of wide spread loss of communication. However, it maintains the validity of the data when communication is restored and systems come back online. This computer system could be considered to have survived under conditions outside of its control.

YouTube Preview Image

On the other hand, the same system fails to provide continuous access to information under normal circumstances or operating environment, because of a localized failure, may not be judged to have fulfilled its purpose or met its objective.

Fault Tolerant And Highly Availability Computer Systems

Many computer systems are designed with fault tolerant components so they continue to operate when key portions of the system fail. For instance; multiple power supplies, redundant disk drives or arrays, even multiple processors and system boards that can continue to function even if its peer component is destroyed or fails. The probability of all components designed to be redundant failing at one time may be quite low. However, a malicious entity that knows how the redundant components are configured may be able to engineer critical failures across the board rendering the fault tolerant components ineffective.

High availability also plays a role in a survivable computer system. However this design component may not maintain computer system survivability during certain events such as various forms of malicious attack . An example of this might be a critical web service that has been duplicated, say across multiple machines, to allow continuous functionality if one or more the individual web servers was to fail. The problem is that many implementations of high availability use the same components and methodology on all of the individual systems. If an intelligent attack or malicious event takes place and is directed at a specific set of vulnerabilities on one of the individual systems, it is reasonable to assume the remaining computer systems that participate in the highly available implementation are also susceptible to the same or similar vulnerabilities. A certain degree of variance must be achieved in how all systems participate in the highly available implementation.

What’s The Difference Between An Attack, Failure, And Accident? How Do These Differences Impact A Survivable Computer System

In many cases when I am discussing the security of systems with customers, the question of business continuity and disaster recovery come up. Most companies that provide a service that they deem critical just know the system needs to be operational in a consistent manner. However, there is typically little discussion about the various events or scenarios surrounding this and that can lead to great disappointment in the future when what the customer thought was a “survivable computer system” does not meet their expectations. Some of the items I like to bring up during these conversations is what their computer systems goal and objective is, what specifically does continuous operation mean to them, and specifically what constitutes an attack, failure, or accident that can cause loss of operation or failure to meet objectives.

A failure may be defined as a localized event that impacts the operation of a system and its ability to deliver services or meet its objectives. An example might be the failure of one or more critical or non-critical functions that effect the performance or overall operation of the system. Say, the failure of a module of code that causes a cascading event that prevents redundant modules from performing properly. Or, a localize hardware failure that incapacitates the computer system.

An accident is typically an event that is outside the control of the system and administrators of a local / private system. An example of this would be natural disasters such as hurricanes, if you live in south Florida like I do, or floods, or wide spread loss of power because the utility provider cut the wrong power lines during an upgrade to the grid. About two years ago, a client of mine who provides web based document management services could not deliver revenue generating services to their customers because a telecommunications engineer cut through a major phone trunk six blocks away from their office. They lost phone and data services for nearly a week.

An now we come to “attack”. We all know accidents will happen, we know that everything fails at one time or another, and typically we can speculate on how these things will happen. An attack, executed by an intelligent, experienced individual or group can be very hard to predict. There are many well known and documented forms of attacks. The problem is intelligence and human imagination continuously advance the form of malicious attacks and can seriously threaten even the most advanced designed survivable computer systems. An accident or failure does not have the ability to think out of the box or realize that a highly available design is flawed because all participants use the same design. The probability that an attack might occur, and succeed may be quite low, but the impact may be devastating.

Conclusion

One of the reasons I wrote this article was to illustrate that it’s not all about prevention. Although prevention is a big part of survivable computer system design, a critical computer system must be able to meet its objectives even when operating under hostile or stressful circumstances. Or if the steps taking for prevention ultimately prove inadequate. It may be impossible to think of all the various events that can impact a critical computer system but it is possible to reasonably define the possibilities.

The subject of survivable computer systems is actually one of complexity and ever evolving technology. This article has only touched on a few of the basic aspects of computer system survivability. I intend on continuing this article to delve deeper into the subject of survivable computer systems.

About the Author: Darren Miller is an Information Security Consultant with over seventeen years experience. He has written many technology & security articles, some of which have been published in nationally circulated magazines & periodicals.Please visit us at

defendingthenet.com

Source:

isnare.com

Permanent Link:

isnare.com/?aid=40163&ca=Computers+and+Technology

Quality, innovation and competitiveness centre-stage at Taipei Int’l Hardware & DIY Show

Friday, October 19, 2007

The 7th Taipei International Hardware & DIY Show, organized by Kaigo Taiwan (The representative of Koelnmesse in Taiwan) and Koelnmesse GmbH, started on October 18-20 at Taipei World Trade Center Exhibition Hall 3. This show has 183 participants using 300 booths to exhibit accessories and tools on esoteric fabricating, home-living applications, and security.

With people in Taiwan valuing on the quality of home-living, the organizer set a pre-show pavilion of “2008 Taipei Home & Lifestyle Fair” and invited B&Q & HomeBox holding DIY workshops for visitors.

This exhibition is conjuncted with industry and applications, and pursuing with three main topics of “Quality, Innovation and Competitiveness”. International factories such as Hitachi, Rexon, Ryobi participated this show for the export opportunity in the hardware industry.

After the “Product Certificates and Testing” pavilion in TAITRONICS Autumn, Bureau of Standards, Metrology & Inspection, M.O.E.A., R.O.C. (Taiwan) and DIY in Europe magazine were invited for speeches focused on certifications on hardware & DIY products and environment issues in EU.

Retrieved from “https://en.wikinews.org/w/index.php?title=Quality,_innovation_and_competitiveness_centre-stage_at_Taipei_Int%27l_Hardware_%26_DIY_Show&oldid=545815”

Illinois man charged in Facebook harassment case

Monday, February 8, 2010

A man from the Naperville, Illinois, United States area has been accused of allegedly threatening to kill his ex-girlfriend and her current boyfriend via messages posted on her Facebook account. 

Nineteen-year-old Christopher J. Bensfield was arrested Jan. 28 at his home in unincorporated DuPage County near the far west-central part of Naperville. He is being held on a $12,500 bond at the DuPage County Jail in Wheaton. He is scheduled to appear at the DuPage County Circuit Court on a felony charge of harassment via electronic communication. Police Sergeant Gregg Bell said the ex-girlfriend, a Naperville-resident, asked Bensfield to stop sending the messages many times before she submitted printed copies of the threatening messages to Naperville police.

Court records indicate Bensfield is already on probation after pleading guilty last September to possession of a controlled substance. He was arrested in August 2008 after disobeying a stop sign in Naperville. Police searched his car and found marijuana and drug paraphernalia. This was the third time Benfield had been arrested for having marijuana since April 2007, when drugs were found in his possession at Naperville Central High School. Last October, a judge issued a fine and required him to join the DuPage County Sheriff’s Work Alternative Program. He has also received five tickets within three months in 2008 for driving violations, including speeding, driving without insurance, transportation of an open alcohol container, and driving too fast for conditions.

Bensfield’s mother also has an order of protection against him. Ms. Bensfield stated that he asked her for money in late December; he then broke into her home in Naperville’s far southeast-side, punching holes in the walls and breaking various items before leaving. Christopher was arrested Dec. 29 and faced a misdemeanor charge of criminal damage to property. He “suffers from bipolar disorder and has not been taking his medication,” according to information the Naperville Daily Herald has received from Ms. Bensfield.

Retrieved from “https://en.wikinews.org/w/index.php?title=Illinois_man_charged_in_Facebook_harassment_case&oldid=2714942”

Why Is Market Research Important For Your Business

By Irina Kesova

Did a favorite item of yours suddenly disappear from the store? Have you ever wondered about how many new products are on shelves every month? In depth market research is done when the decisions to discontinue a product or introduce a new product is done. This type of research also is used for packaging design, product placement on store shelves, and just about every detail of selling in a retail environment.

Market research can be used in other areas and not just the retail environment. You might want to expand your business and provide other types of services, you will first need to find out if there is a market and you will need to locate potential customers. Good market research will provide you with what customers prefer, like the type of cleaning service they need or the program that the accountants use.

Sometimes, market research can be done by conducting interviews of the clients and customers. It’s usually just putting together information by researching the purchasing patterns. When one product does not sell as much as before, this may mean it is time for a marketing and packaging change. If the product sales do not increase, the product may be discontinued.

Along with sales information about a certain products sales in the area; is the idea that maybe the product sales dropped because of a shift of the population? Are there stores that now compete with yours in an area? This type of market research will gather all the information to that an accurate picture is painted which will show the product’s success or failure.

This type of market research can work for anyone running a retail store. Of course you want to stock your store shelves with products that people want to buy. Personal preference should never be the only basis of putting products in the store.

YouTube Preview Image

How does market research assist your business? This research will help you to decide the types of products and services you can and should offer and what is in demand now. It can also help you to see what products and services are somewhat obsolete and no longer in demand.

This kind of research will not specifically tell you what to do with your business but it will help in decision making. For example, if you want to open that cleaning business, good market research may tell you that many homes today have hardwood flooring rather than carpeting. This only goes to show that you should fully understand how to clean up floors properly so you will have a successful business. Research done in one area will help you with decisions that will make your business successful.

Which Companies Should Utilise Quantitative Market Research?

The term quantitative market research is referring to research that is made with a large group of people or a generalized group, rather than focusing on a small group. For a number of companies, this kind of research can be priceless; a larger group can mean a broad variety of opinions and participation from that group.

Not all company may or could utilize quantitative market research. One example is that if you’re planning to open a small store in a strip mall in your area, general research about buying habits for that kind of store can help extremely. On the other hand, more detailed research concerning that particular neighborhood and other stores like that in the area can even have greater advantage. Those people who live next to the store shop and are making their purchasing decisions are more imperative to that business than any other information.

Therefore, what kind of businesses that can apply quantitative market research? Will your business or company benefits from this research? And were there times that you needed both quantitative and qualitative research completed?

Very often larger stores and businesses need to have quantitative market research because they appeal to a larger range of customers or clients. For instance, chain stores may need to know overall purchasing patterns from their customer base since they will have stores in many different areas of the company. Suppliers of wholesale items may need this type of research since their customers will also be more widespread.

Those that have online businesses should also require a larger range of research since their customers may also be more far reaching. For those online businesses, quantitative market research is very much helpful when it comes to products that are selling across the board as well as with the process of purchasing like checkout and payment choices.

Any trade with a national presence in opposition to a local business will need quantitative market research. Learning general trends will greatly help a business owner to create decisions which will be beneficial for the company in general. Changes can be done to local stores or businesses as needed however, this general or overall look at market trends will surely help with the major decisions to be made.

Routinely, quantitative market research is a bit broad and far-reaching that is why it is important to understand how to use it effectively. This research may tell you the general purchasing patterns and marketing trends so, you would have to make sure that you’re applying that research correctly. Is it important to upgrade your machinery and equipment so that you’re giving your customers the products and services they need? Are you trying to get rid of products which are very dawdling or those that don’t really have a large adequate of profit margin on a national level?

Studying market trends will mean understanding future trading habits as well. If one product or service is losing customers then you should know that it is improbable for those customers to return. You can make use of this quantitative market research to help you right away in making decisions which are meant to benefit you in the future.

About the Author: Internet Marketer and Online Entrepreneur

The Way To Make Money Is By Learning To Promote

Source:

isnare.com

Permanent Link:

isnare.com/?aid=554791&ca=Marketing

New Zealand Reserve Bank phone hacker not convicted

Thursday, September 28, 2006

Gerasimos Macridis, 39-years-old, left the court room discharged without conviction after hacking into the New Zealand Reserve Bank’s phone system and then asking for money for his services after pointing out these security flaws to both the Reserve Bank and Telecom New Zealand in May, 2006, and offering to fix them. He had identified himself as a security consultant.

The New Zealand Police then raided his home and took his computer on 21 September. Macridis told police that he did not think it was illegal, but knew he was not authorised to access the phone systems. Telecom then took him to court.

Colin McGilicray, police prosecutor, said: “Macridis has a significant number of previous fraud convictions and it appeared he was trying to obtain money through virtue of his technical knowledge.”

Macridis, who represented himself, told the court that for 11-years he had worked as a casual security consultant and he had worked for Telecom, police and Department of Internal Affairs.

Macridis thought himself as an honest, law abiding citizen as his 1994 conviction had ‘turned his life around’.

Judge Ian Mill said this case was very unusual and also noted that Macridis ended his offending over 10-years ago.

Mill said: “Macridis used his talents to identify security risks and he had identified a grave risk to the Reserve Bank and its customers. Macridis provided a report of his findings, requested payment albeit without a contract and for his troubles was prosecuted. He did not pass the information on to others and did not use it for personal gain.”

“In my view his intentions were honourable,” Mill added.

Mill discharged him without conviction on the basis that a conviction would be out of proportion with his actions.

Retrieved from “https://en.wikinews.org/w/index.php?title=New_Zealand_Reserve_Bank_phone_hacker_not_convicted&oldid=438654”