STEM Outsourcing


Morgan State University Joins Global Partnership

Morgan State University recently announced that it’s been designated “an official institutional global research partner for civic engagement, innovation, and sustainable development in Africa and the African diaspora at the second biennial Africa Open Data Conference (#AODC17)” held in Accra, Ghana, last month.

(MSU’s Dr. Umaru Bah, left, and Dr. Yacob Astatke at the 2017 Africa Open Data Conference. Image: Courtesy of Morgan State University)

“Open data” is a critical component of “big data”—the very large data sets that can be analyzed to reveal patterns and trends. “Open data is globally accessible and is often used in conjunction with online open platforms and open source codes to design viable solutions for civic engagement and sustainable development across all fields and works of life, including health, education, agriculture, nutrition, investigative journalism, architecture, transportation, engineering, leadership, gender equality and social justice,” according to a statement from the university.

“Morgan’s seminal role in the open data movement is critical for future domestic and global information needs and the industries that will spin off as a result of interoperability and standards in this area,” Victor McCrary, Ph.D., Morgan’s vice president for Research and Economic Development, is quoted as saying in a statement.

Umaru Bah, Ph.D., Fulbright associate professor in the Department of Strategic Communication in Morgan’s School of Global Journalism and Communication led the initiative to have Morgan participate in the Africa Open Data Conference.

Yacob Astatke, D.Eng., assistant vice president for International Affairs at Morgan, helped to secure the University’s designation as an official global institutional partner of the conference.

Other partners include the Government of the Republic of Ghana, the United Nations Development Programme, or UNDP, and the World Wide Web Foundation.

While in Ghana, Astatke and Bah also visited Ashesi University, where they opened talks about other partnerships with Morgan.

The partnership furthers a plan “developed with Timothy Akers, Ph.D., assistant vice president for Research Innovation and Advocacy in Morgan’s Division of Research and Economic Development (D-RED), to establish a Morgan Center for Open Data Education and Entrepreneurship, (M-CODE),” according to a statement.

To learn more, read the entire announcement at the Morgan State University website.

Far out: VW plans an electric hippie bus

Retro Volkswagen bus gets electric touch

Volkswagen will revisit its Microbus history, but with a twist.

The German automaker plans to begin production of a new, all-electric version of the its famous van.

The extremely groovy vehicle, called the ID Buzz, won’t arrive in dealerships until 2022, VW said.

The van will be part of Volkswagen’s planned ID line of electric vehicles. The first, a compact car simply called the ID, was unveiled as a concept car at the Paris Motor Show last September. The ID Buzz concept van was unveiled at the Detroit Motor Show in January.

The name Buzz plays off the word “Bus,” VW said. ID stands for any number of things including “Idea,” “Identity” or “Intelligent Design.”

The electric compact car will go on sale before the van does, VW said.

VW buzz concept car The Volkswagen ID Buzz has all-wheel-drive with electric motors front and back.

The ID Buzz concept van is an all-wheel-drive vehicle with electric motors in front and back. Together, the motors can produce 369 horsepower. That’s a vast improvement over the famously underpowered and slow original VW Microbus, a vehicle that became an icon of the “flower power” movement of the late 1960s and early 1970s. The bus ID Buzz concept has a driving range of 270 miles, according to VW

The concept van is also designed for autonomous driving, with a rectangular steering wheel that retracts into the dashboard when not in use. With the steering retracted, the driver’s seat can be rotated around so the driver can talk with passengers while the van drives itself.

VW buzz concept car interior The ID Buzz’s steering wheel retracts when the van is prepared for “autonomous driving” mode.

A short test drive in the concept van demonstrated limitations to the rectangular steering wheel. It isn’t really practical, making for awkward turns in real-world driving. (There’s a reason steering wheels are generally round.) The actual production van will feature “highly automated driving,” according to VW, if not fully automated driving,

What's the difference between electric and electrified cars?

VW’s big push on electric vehicles follows the automaker’s recent diesel emissions scandal. Volkswagen was found to have installed software that reduced harmful emissions from many of the automaker’s diesel-powered vehicles only during testing. As part of a plan to make up for that, VW has agreed to promote electric cars.

Many other automakers, however, are also making big plans for electric vehicles. And several countries, including Great Britain, France, Norway and China, have announced plans to begin phasing out gasoline- and diesel-powered cars.

CNNMoney (New York) First published August 19, 2017: 5:52 PM ET

Top Five Data Center Stories: Week of August 18

By Data Center Knowledge

For your weekend reading, here are the most popular stories that appeared on Data Center Knowledge this week:

Can Windows Server Make Hyper-Converged Infrastructure a Boring Commodity? – Windows Server 16, the latest version of the giant’s ubiquitous data center OS, includes all the elements required for hyper-convergence, which means you will probably see hyper-converged systems in data centers that haven’t necessarily bought a Nutanix box, a Dell EMC VxRail appliance, or another one of the options traditionally associated with the expression.

World’s Largest IPv6 Network Reaches a Milestone – The network operator, which runs a vital part of the internet’s backbone, announced it’s become the first network in the world to connect to over 4,000 IPv6 networks.

Ambitious One-Gigawatt Data Center Planned in Norway – The company has secured a property in a small Norwegian town, inside the Arctic Circle, for what it envisions will be a 1,000MW data center powered entirely by renewable energy. It will be one of the highest-capacity data center in the world if it reaches even a fraction of that.

Docker Can Now Containerize Legacy Apps Running on Mainframes – Some of the legacy apps that Docker has seen brought to containers are more than 25 years old, which makes security a big issue, since apps of that age are almost certain to be unsecure by design.

Equinix Makes Big Bet on Fuel Cell-Powered Data Centers – The deal will bring Equinix’s total fuel-cell capacity to more than 40MW, including its existing Silicon Valley installation and the two Verizon sites, in Los Angeles and New York.

Stay current on data center industry news by subscribing to our RSS feed and daily e-mail updates, or by following us on Twitter or Facebook or join our LinkedIn Group – Data Center Knowledge.

Read more here::

The post Top Five Data Center Stories: Week of August 18 appeared on

Presentación de nuevos productos de ZOPO en la IFA de Berlín bajo el lema “regreso al poder”

BERLÍN, 19 de agosto de 2017 /PRNewswire/ — ZOPO celebrará una conferencia sobre sus nuevos productos durante su participación como presentadora en la feria IFA de Berlín, que comienza el día 1 de septiembre de 2017. El lema de la conferencia es “regresar con más poder” y, durante la misma, tendrá lugar la presentación de los productos actualizados. La nueva consejera delegada de ZOPO, la Srta. Emma Liu, estará en el estand del 1 al 3 de septiembre, de 14.30 a 16.00, y será la encargada de presentar los nuevos teléfonos inteligentes insignia ZOPO Z5000 y P5000.

2017 ha sido un año positivo y prometedor para ZOPO, por lo que la empresa celebrará la exposición con el propósito de dar a conocer los logros alcanzados. Varios de los teléfonos inteligentes estarán a disposición de los medios durante el evento para su evaluación.

La iniciativa para extender la vida útil de la batería de los dispositivos móviles modernos será un mayor incentivo para que los clientes adquieran sus productos, y la conferencia resaltará las mejoras implementadas en estos.

Durante la conferencia se debatirán asuntos fundamentales y se tratarán además los siguientes puntos:

1. El nuevo modo de privacidad, que ofrece un mayor nivel de cifrado para el dispositivo, como el sistema de desbloqueo con dos huellas digitales.

2. Unos sistemas de gestión de energía optimizados y una recarga de batería rápida. Los asistentes tendrán la oportunidad de probar de primera mano unos teléfonos móviles elegantes y duraderos, así como la increíble pantalla 18:9 con diseño completo.

3. El deseo y la ambición de encontrar el equilibrio entre un diseño orientado a los usuarios y una vida útil de batería más extensa. Los fabricantes de dispositivos móviles tendrán además la posibilidad de entender plenamente la ingeniería y diseño innovadores de ZOPO.

4. La decisión de colaborar con más distribuidores para mejorar la disponibilidad de estos dispositivos en el mercado. Esta es la oportunidad de convertirse en socio en tanto que distribuidor dedicado.

El equipo de ZOPO ha trabajado sin pausa para satisfacer las necesidades de los clientes, y la marca se encuentra entre las mejores del mercado. Cada lanzamiento de producto ha recibido una gran acogida por parte del público general desde la creación de ZOPO hace diez años. Con el paso del tiempo se han añadido nuevas prestaciones, como servicios de localización, funciones Bluetooth o asistentes personales, de forma que estos dispositivos han llegado en ocasiones a ponerse por delante de los ordenadores portátiles. No obstante, todas estas prestaciones tienen algo en común: todas requieren energía para operar. La vida útil de batería de estos dispositivos avanzados se ve afectada al intentar llevar a cabo todas estas tareas, razón principal por la que ZOPO está lanzando los modelos Z5000 y P5000. ZOPO nunca se detiene ante los retos a los que se enfrenta, y siempre está preparada para mejorar y actualizarse.

Para obtener más información sobre ZOPO, visite

Dirección de correo electrónico de ZOPO:

Imagen –


Related Links

Au cours du salon IFA, un événement sera organisé pour présenter le nouveau produit de ZOPO, sur le thème du retour à la puissance

BERLIN, le 19 août 2017 /PRNewswire/ — ZOPO tiendra une conférence où sera présenté son nouveau produit, au cours du salon IFA de Berlin, à partir du 1er septembre 2017. Cette conférence aura pour thème « un retour avec plus de puissance » et elle présentera les produits mis à jour. Le nouveau PDG de ZOPO, Mme Emma Liu, sera présente sur le stand, du 1er au 3 septembre, de 14 h 30 à 16 h et elle présentera les produits phares en matière de smartphones, les ZOPO Z5000 et P5000.

Pour ZOPO, 2017 a été une année positive et particulièrement encourageante et, en participant à l’exposition, la société pourra attester des étapes franchies. Au cours de l’événement, certains smartphones seront distribués aux différents médias, qui pourront les examiner.

L’augmentation de la durée de vie des batteries de ces appareils cellulaires modernes encouragera les clients à acheter les produits et les améliorations qui leur ont été apportées seront mises en relief au cours de la conférence.

Au cours de cette réunion, certaines questions décisives seront abordées et les points suivants seront annoncés.

1. L’appareil disposera d’un nouveau mode « privé » doté d’un cryptage plus efficace grâce, par exemple, au système de déverrouillage par double empreinte.

2. Un système de gestion de l’alimentation amélioré, ainsi que des batteries à chargement rapide. Il sera possible d’observer ces téléphones mobiles élégants, prévus pour durer longtemps et qui disposent d’un affichage intégral 18:9.

3. Le souhait et la volonté de trouver un équilibre entre une conception centrée sur l’utilisateur et une durée de vie plus longue de la batterie. Il sera également intéressant pour les fabricants des dispositifs d’accéder à la conception et à l’ingénierie innovantes de ZOPO.

4. La possibilité de s’associer avec un plus grand nombre de distributeurs afin d’améliorer la disponibilité de ces appareils sur le marché. Ce sera pour les distributeurs dédiés une occasion de devenir partenaires.

L’équipe de ZOPO n’a pas ménagé ses efforts pour satisfaire les exigences de la clientèle. La marque fait partie des meilleures sur le marché. Depuis la création de ZOPO, il y a dix ans, chaque nouveauté est largement appréciée par le public général. Plus le temps passe, plus de nouvelles caractéristiques voient le jour : services de localisation, fonctions Bluetooth, assistants personnels… À tel point que ces dispositifs dépassent parfois les ordinateurs portables, tout en conservant un point commun : ils ont tous besoin de puissance. La durée de vie des batteries de ces dispositifs avancés ne permet pas toujours de réaliser toutes ces tâches. C’est la principale raison pour laquelle ZOPO a mis sur le marché les modèles Z5000 et P5000. ZOPO relève les défis auxquels l’entreprise est confrontée, qui est toujours prête à se moderniser et à s’améliorer.

Pour plus d’informations sur ZOPO, veuillez consulter le site  

Courrier électronique de ZOPO :

Photo –


Related Links

CSM Bakery Solutions e 3D Systems hanno stretto un accordo per portare disegni stampati in 3D nell’industria alimentare

Stampa di disegni unici con zucchero ed altri ingredienti

ATLANTA e ROCK HILL, Carolina del Sud, 19 agosto 2017 /PRNewswire/ — CSM Bakery Solutions, leader internazionale in ingredienti, prodotti e servizi per la panificazione e 3D Systems Corporation (NYSE: DDD), l’ideatore della stampa e di soluzioni 3D, hanno annunciato oggi di aver raggiunto un accordo per collaborare nello sviluppo, vendita e distribuzione di stampanti 3D, prodotti e materiali per l’industria alimentare.

L’accordo globale permette alle due industrie leader di unire le forze per portare sul mercato prodotti culinari, innovati e cerativi, stampati in 3D. CSM sosterrà lo sviluppo e avrà in maniera esclusiva i diritti di utilizzare la stampante ChefJet Pro 3D di 3D Systems per prodotti alimentari colorati e ad alta risoluzione per il settore culinario professionale.

“Siamo davvero entusiasti rispetto a quello che questa opportunità può significare per l’industria alimentare,” ha dichiarato Marianne Kirkegaard, presidente ed amministratore delegato di CSM. 

“Il nostro accordo con 3D Systems ha il potenziale di re-definire l’industria alimentare,” ha detto. “Attraverso numerosi settori, la stampa 3D ha aiutato a trasformare le industrie e abbiamo tutte le ragioni di pensare che questo possa essere vero anche per l’industria alimentare. Siamo entusiasti di associarci e di continuare ad ampliare le capacità e le opportunità culinarie con la loro piattaforma.”

Vyomesh Joshi, presidente ed amministratore delegato di 3D Systems, ha espresso un simile ottimismo in merito all’accordo.

“Il nostro ampio e versatile portafoglio di materiali si rivolge alla più vasta gamma di applicazioni e prestazioni in stampa 3D- da quella culinaria a quella industriale,” ha detto. “Mentre continuiamo a dare impulso all’innovazione e ad esplorare partnership strategiche con i leader dell’industria, la nostra collaborazione con CSM è un connubio perfetto per usare abilmente la nostra tecnologia e le nostre capacità di ampliare applicazioni e materiali.”

La partnership permette R&S, ingegneria, design, e sviluppo stampante congiunti, incentrati sulla fornitura specifica, lo sviluppo dei prodotti alimentari e i piani per l’immissione sul mercato. Dopo un’attenta analisi e discussioni, pianificazioni e ricerche di mercato dettagliate, CSM e 3D Systems hanno formalizzato questo accordo ed hanno iniziato il lavoro per portare sul mercato dei prototipi.

Dichiarazioni previsionali
Le dichiarazioni contenute nel presente comunicato stampa che non sono di natura storica sono dichiarazioni previsionali ai sensi del Private Securities Litigation Reform Act del 1995.  Le dichiarazioni previsionali includono, tra le altre, le aspettative che riguardano l’impatto ed il successo della strategica collaborazione tra 3D Systems e CSM Bakery Solutions e nella capacità di portare prodotti e disegni culinari 3D sul mercato, attraverso questa collaborazione o diversamente.  Queste dichiarazioni previsionali sono soggette a rischi ed incertezze, come quelli descritti nelle relazioni periodiche di 3D Systems e CSM Bakery Solutions depositate presso la Securities and Exchange Commission, così come altri fattori, che potrebbero fare in modo che gli attuali risultati differiscano materialmente dai risultati anticipati. Nonostante la direzione creda che le aspettative rispecchiate nelle dichiarazioni previsionali siano sensate, le dichiarazioni previsionali non sono, e non devono essere considerate come una garanzia delle prestazioni o dei risultati futuri, e non proveranno necessariamente di essere indicazioni accurate dei tempi entro i quali tali prestazioni o tali risultati saranno ottenuti. Questa informazione è fornita alla data di questo comunicato, e 3D Systems e CSM Bakery Solutions non si assumono l’obbligo di aggiornare o rivedere nessuna dichiarazione previsionale eseguita da o per conto dell’amministrazione, a seguito della disponibilità di nuove informazioni, eventi futuri o qualsiasi altra ragione.

Informazioni su CSM Bakery Solutions
CSM Bakery Solutions è uno dei leader internazionali in ingredienti, prodotti e servizi per la panificazione per i mercati al dettaglio e Foodservice nonché per forni artigianali e industriali. CSM fornisce più di 45.000 clienti in più di 100 paesi e offre un ampio portafoglio di marchi riconosciuti che forniscono ingredienti specializzati (preparati secchi, farciture, coperture, glasse, mélange, topping, pastella, impasti surgelati e altro) e prodotti finiti (torte, ciambelle, muffins, brownies, biscotti, pani particolari, viennoiserie e altro ancora). Il mosaico dei marchi del patrimonio di panetterie CSM include alcuni delle aziende più affidabili: Brill, Henry & Henry, MeisterMarken, Multifoods, e Waldkorn, per citarne solo alcuni.

Informazioni su 3D Systems
3D Systems fornisce prodotti e servizi 3D di vasta portata, che comprendono stampanti 3D, materiale stampato, servizi di produzione su richiesta e strumenti di design digitale. Il suo ecosistema supporta applicazioni avanzate dal negozio di progettazione del prodotto, passando per la fabbrica, fino alla sala operatoria. Le capacità nell’assistenza sanitaria di precisione di 3D Systems includono la simulazione, la pianificazione di interventi virtuali, e la stampa di dispositivi medici e dentali così come strumenti chirurgici specifici per pazienti. In quanto ideatore della stampa 3D e guida di soluzioni future 3D, 3D Systems ha passato i suoi 30 anni di storia dando la possibilità a professionisti e ad aziende di ottimizzare i loro progetti, trasformare i loro flussi di lavoro, immettere prodotti innovativi sul mercato e guidare nuovi modelli commerciali.

Per maggiori informazioni, contattare:

CSM Bakery Solutions
Dennis Murphy
Vice Presidente e Capo ufficio comunicazione
Ufficio: +1 404-478-5529
Telefono cellulare: +1 770-377-6329

3D Systems Corporation
Diane Parish

Foto –

Foto –

Foto –

SOURCE CSM Bakery Solutions

Related Links

CSM Bakery Solutions y 3D Systems anuncian un acuerdo para aportar diseños de impresión 3D al sector alimentario

Los artículos impresos podrán basarse en diseños exclusivos hechos de azúcar y otros ingredientes

ATLANTA y ROCK HILL, Carolina del Sur, 19 de agosto de 2017 /RNewswire/ — CSM Bakery Solutions, una de las principales empresas mundiales en provisión de ingredientes, productos y servicios de repostería, y 3D Systems Corporation (NYSE: DDD), creadora de impresiones y soluciones en tres dimensiones, han anunciado hoy la consecución de un acuerdo que las llevará a colaborar en la elaboración, venta y distribución de impresoras, productos y materiales 3D destinados al sector alimentario.

Este acuerdo internacional permite a ambos líderes sectoriales unir fuerzas con miras a introducir en el mercado una serie de productos culinarios innovadores y creativos resultantes de la impresión tridimensional; así, CSM va a contribuir a la creación de la impresora ChefJet Pro 3D de 3D Systems, cuyos derechos exclusivos de uso posee y que está pensada para elaborar productos alimentarios en color y alta resolución en un entorno culinario profesional.

“Nos llena de entusiasmo lo que esta oportunidad puede representar para el sector alimentario”, declaró Marianne Kirkegaard, la presidenta y consejera delegada de CSM. 

“El acuerdo que hemos cerrado con 3D Systems tiene el potencial de reconfigurar el sector”, continuó diciendo. “En diversas áreas de actividad, la impresión tridimensional ha contribuido a la transformación empresarial y tenemos muchos motivos para pensar que con el sector alimentario puede ocurrir lo mismo. Nos congratulamos de poder asociarnos con la plataforma de 3D Systems y seguir así ampliando las capacidades y oportunidades que se presentan en el ámbito culinario”.

Vyomesh Joshi, presidente y consejero delegado de 3D Systems, expresó un optimismo semejante ante este acuerdo.

“Nuestra cartera de materiales, caracterizada por su amplitud y versatilidad, abarca la más extensa gama de aplicaciones y prestaciones de las existentes en la impresión 3D, desde lo culinario a lo industrial”, afirmó. “Por nuestro empeño en fomentar la innovación y estudiar el cierre de alianzas estratégicas con algunas de las principales empresas del sector, esta asociación con CSM encaja a la perfección con nuestro propósito de aprovechar la tecnología y las capacidades de que disponemos para ampliar el abanico de aplicaciones y materiales”.

De esta alianza van a resultar tareas colaborativas de I+D, ingeniería, diseño y creación de impresoras que girarán en torno a unas prácticas determinadas de aprovisionamiento, elaboración de productos alimentarios y planes de salida al mercado. Después de un análisis pormenorizado y de largas sesiones de debate, planificación y estudio de mercado, CSM y 3D Systems han formalizado este acuerdo y están comenzando a trabajar para sacar al mercado una serie de prototipos.

Declaraciones prospectivas
Las declaraciones contenidas en el presente comunicado de prensa que no son de índole histórica se describen como declaraciones prospectivas, en el sentido de lo expresado por la Ley de Reforma de Litigios de Valores Privados de 1995. Se trata, entre otras, de las referidas a las expectativas que pueda haber con respecto a las consecuencias y el buen fin de la asociación estratégica creada entre 3D Systems y CSM Bakery Solutions y a su capacidad para sacar al mercado productos y diseños culinarios de impresión tridimensional, sea a resultas de esta colaboración, sea por otros medios. Estas declaraciones prospectivas están sujetas a una serie de riesgos e incertidumbres —como son, además de otros factores, los descritos en los informes que 3D Systems y CSM Bakery Solutions presentan de manera periódica ante la Comisión de Valores y Bolsa— a resultas de los cuales los resultados reales pudieran diferir considerablemente de los previstos. Aunque la dirección de las empresas considera que las expectativas que se reflejan en las declaraciones prospectivas están justificadas, no son ni deben constituir una garantía de desempeño o resultados futuros en la que el lector ponga su confianza, como tampoco van a quedar demostrada necesariamente su condición de indicación precisa del punto temporal en que se van a alcanzar dichos resultados o desempeño. La presente información se ofrece tal como es a la fecha de emisión de este comunicado y, ante la existencia de datos nuevos o acontecimientos futuros o por algún otro motivo, ni 3D Systems ni CSM Bakery Solutions asumen obligación alguna de poner al día o corregir las declaraciones prospectivas efectuadas por la dirección o en nombre y representación de esta.

Sobre CSM Bakery Solutions
CSM Bakery Solutions es un líder mundial en ingredientes, productos y servicios de panadería para minoristas y mercados de servicios de alimentación, así como para panaderías artesanales e industriales. CSM ofrece sus servicios a más de 45.000 clientes de más de 100 países y presenta una amplia gama de marcas reconocidas que ofrecen ingredientes especiales (preparados secos, rellenos, distintos glaseados, mixes, toppings, pasta, masa congelada y mucho más), así como productos ya elaborados, (pasteles, donuts, muffins, brownies, cookies, pan especial y bollería, entre muchos otros). El mosaico de las marcas insignia de panadería de CSM incluye algunos de los nombres de mayor confianza del sector: Brill, Henry & Henry, MeisterMarken, Multifoods y Waldkorn, por citar solo algunos.

Acerca de 3D Systems
3D Systems ofrece una exhaustiva gama de productos y servicios de impresión tridimensional, como impresoras, material de impresión, servicios de fabricación bajo pedido y recursos de diseño digital, en el marco de un ecosistema compatible con aplicaciones avanzadas que van desde las utilizadas en los establecimientos de diseño de productos hasta el quirófano, pasando por las plantas de producción. Las capacidades de 3D Systems en el ámbito de la medicina de precisión abarcan la simulación, la planificación quirúrgica virtual y la impresión de productos sanitarios y aparatos dentales, así como instrumental quirúrgico adaptado a las necesidades del paciente. 3D Systems, en tanto que creadora de la impresión en tres dimensiones y conformadora de las soluciones tridimensionales del futuro, tiene a sus espaldas 30 años de experiencia durante los que ha contribuido a que profesionales y empresas puedan optimizar diseños, transformar los procedimientos de trabajo, sacar productos innovadores al mercado e impulsar otros modelos de negocio.

Para obtener más información, póngase en contacto con:

CSM Bakery Solutions
Dennis Murphy
Vicepresidente y director de Comunicaciones
Tel.: +1 404-478-5529
Móv.: +1 770-377-6329

3D Systems Corporation
Diane Parish

Imagen –

Imagen –

Imagen –

SOURCE CSM Bakery Solutions

Related Links

CSM Bakery Solutions und 3D Systems verkünden Vereinbarung, um 3D-Druckdesigns in die Lebensmittelindustrie zu bringen

Druck von einzigartigen Formen mit Zucker und anderen Zutaten

ATLANTA und ROCK HILL, South Carolina, 19. August 2017 /PRNewswire/ — CSM Bakery Solutions, ein internationaler Marktführer der Backwarenbranche für Zutaten, Produkte und Dienstleistungen, und 3D Systems Corporation (NYSE: DDD), der Initiator für 3D-Druck und 3D-Lösungen, gaben heute den Abschluss einer Vereinbarung bekannt, um bei Entwicklung, Verkauf und Vertrieb von 3D-Druckern, -Produkten und -Materialien für die Lebensmittelindustrie zusammenzuarbeiten.

Die globale Vereinbarung ermöglicht den beiden Branchenführern eine Bündelung ihrer Kräfte, um innovative und kreative, über 3D-gedruckte kulinarische Produkte auf den Markt zu bringen. CSM wird die Entwicklung des ChefJet Pro 3D-Druckers von 3D Systems unterstützen und die Exklusivrechte über dessen Nutzung erhalten, um hochauflösende farbenfrohe Lebensmittelprodukte für das professionelle kulinarische Umfeld herzustellen.

„Wir sind sehr gespannt darauf, was diese Chance für die Lebensmittelindustrie bedeuten kann”, sagte Marianne Kirkegaard, President und CEO von CSM. 

„Unsere Vereinbarung mit 3D Systems hat das Potenzial, die Lebensmittelindustrie neu zu gestalten”, fügte sie hinzu. „In vielen unterschiedlichen Branchen hat 3D-Druck zu einem Wandel beigetragen und alles spricht dafür, dass das Gleiche für die Lebensmittelindustrie möglich sein kann. Wir freuen uns sehr, mit 3D Systems zusammenzuarbeiten und mithilfe ihrer Plattform die Leistungen weiter auszubauen und die kulinarischen Möglichkeiten zu erweitern.”

Vyomesh Joshi, President und CEO von 3D Systems, äußerte sich ähnlich optimistisch über die Vereinbarung.

„Unser umfassendes und vielfältiges Portfolio mit Materialien ist für ein breites Spektrum von Anwendungen und Leistungen im Bereich 3D-Druck ideal geeignet – von kulinarischen bis hin zu industriellen Einsatzmöglichkeiten”, erläuterte er. „Wir setzen unseren Kurs fort, Innovationen voranzubringen und strategische Partnerschaften mit Branchenführern zu erkunden, und aus diesem Grund ist unsere Kooperationsvereinbarung mit CSM perfekt geeignet, um unsere Technologie und Fähigkeiten optimal einzusetzen und die Anwendungsmöglichkeiten und Materialien zu erweitern.”

Die Partnerschaft ermöglicht kooperative Forschung und Entwicklung, Technik, Design und Drucker-Entwicklung, die sich auf die spezifische Beschaffung, Entwicklung von Lebensmittelprodukten und auf Pläne zur Markteinführung konzentrieren werden. Nach sorgfältiger Analyse, ausführlichen Diskussionen, Planungen und Marktforschung haben CSM und 3D Systems diese Vereinbarung formell ausgearbeitet und beginnen derzeit mit der Arbeit, um Prototypen auf den Markt zu bringen.

Zukunftsgerichtete Aussagen
Aussagen in dieser Pressemitteilung, die sich nicht auf historische Fakten beziehen, sind sogenannte zukunftsgerichtete Aussagen im Sinne des Private Securities Litigation Reform Act von 1995. Zu den zukunftsgerichteten Aussagen gehören unter anderem Erwartungen in Bezug auf die Wirkung und den Erfolg der strategischen Partnerschaft zwischen 3D Systems und CSM Bakery Solutions sowie die Fähigkeit, kulinarische 3D-Produkte und -Designs durch diese Kooperation oder auf andere Weise auf den Markt zu bringen. Diese zukunftsgerichteten Aussagen unterliegen bestimmten Risiken und Unsicherheiten, einschließlich jener, die in den von 3D Systems und CSM Bakery Solutions regelmäßig bei der Securities and Exchange Commission eingereichten Berichten dargestellt werden, sowie weiteren Faktoren, die dazu führen könnten, dass die tatsächlichen Ergebnisse wesentlich von den erwarteten Ergebnissen abweichen. Obwohl die Unternehmensleitung davon ausgeht, dass die in den zukunftsgerichteten Aussagen zum Ausdruck gebrachten Erwartungen angemessen sind, stellen zukunftsgerichtete Aussagen keine verlässliche Garantie für zukünftige Leistungen oder Ergebnisse dar und sollten auch nicht als solche betrachtet werden. Zukunftsgerichtete Aussagen sind ebenfalls nicht notwendigerweise als präzise Hinweise auf Zeiträume zu betrachten, in denen solche Leistungen oder Ergebnisse erzielt werden können. Diese Informationen werden zum Zeitpunkt der Veröffentlichung der vorliegenden Pressemitteilung bereitgestellt und 3D Systems und CSM Bakery Solutions übernehmen keinerlei Verpflichtung, jegliche zukunftsgerichteten Aussagen, die von der Unternehmensleitung oder in deren Namen abgegeben wurden, aufgrund von neuen Informationen, zukünftigen Ereignissen oder aus sonstigen Gründen zu aktualisieren oder zu revidieren.

Über CSM Bakery Solutions
CSM Bakery Solutions ist ein Weltmarktführer bei Backzutaten, -produkten und -dienstleistungen für den Einzelhandel und den Gastronomiemarkt sowie für handwerkliche und industrielle Bäckereien. CSM dient mehr als 45.000 Kunden in über 100 Ländern und verfügt über ein umfassendes Portfolio an bekannten Marken, die Spezialzutaten (Trockenmischungen, Zuckerguss, Glasuren, Mischungen, Garnierungen, Ausbackteig, gefrorenen Teig und weitere) sowie Fertigprodukte (Kuchen, Donuts, Muffins, Brownies, Cookies, Spezialbrot, feine Backwaren und weitere) anbieten. Die CSM-Palette aus Traditionsmarken umfasst einige der renommiertesten Namen der Branche: Brill, Henry & Henry, MeisterMarken, Multifoods und Waldkorn, um nur einige wenige zu nennen.

Über 3D Systems
3D Systems stellt umfassende 3D-Produkte und -Dienstleistungen bereit, zu denen 3D-Drucker, Druckmaterial, Fertigungsdienste auf Abruf und digitale Designtools gehören. Die Lösungen des Unternehmens unterstützen fortschrittlichste Anwendungen von der Produktdesign-Werkstatt über die Fertigungsstätten bis hin zur Betriebssteuerung. Die Leistungsangebote von 3D Systems für hochpräzise Gesundheitsversorgung umfassen Simulation, virtuelle Operationsplanung und den Druck von medizinischen und dentalmedizinischen Geräten sowie von patientenspezifischen chirurgischen Instrumenten. Als Initiator des 3D-Drucks und Gestalter von zukunftsweisenden 3D-Lösungen hat 3D Systems in seiner 30-jährigen Unternehmensgeschichte Fachkräfte und Unternehmen befähigt, ihre Designs zu optimieren, die Arbeitsabläufe zu transformieren, innovative Produkte auf dem Markt einzuführen und neue Geschäftsmodelle zu fördern.

Für weitere Informationen wenden Sie sich bitte an:

CSM Bakery Solutions
Dennis Murphy
Vice President und Chief Communications Officer
Büro: +1 404-478-5529
mobil: +1 770-377-6329

3D Systems Corporation
Diane Parish

Foto –

Foto –

Foto –

SOURCE CSM Bakery Solutions

Related Links

CSM Bakery Solutions et 3D Systems annoncent un accord visant à proposer des conceptions d’impression 3D à l’industrie alimentaire

Impression de conceptions uniques à base de sucre et d’autres ingrédients

ATLANTA et ROCK HILL, Caroline du Sud, le 19 août 2017 /PRNewswire/ — CSM Bakery Solutions, leader mondial dans le secteur des ingrédients, produits et services de boulangerie, et 3D Systems Corporation (NYSE : DDD), créateur d’impressions et de solutions 3D, ont annoncé aujourd’hui avoir conclu un accord de collaboration portant sur le développement, la vente et la distribution d’imprimantes 3D, de produits et de matériaux destinés à l’industrie alimentaire.

Cet accord mondial permet aux deux leaders sectoriels d’unir leurs forces afin de proposer sur le marché des produits culinaires imprimés en 3D à la fois innovants et créatifs. CSM soutiendra le développement et possédera les droits exclusifs d’utilisation de l’imprimante 3D ChefJet de 3D Systems, qui offre des produits alimentaires colorés en haute résolution destinés aux environnements culinaires professionnels.

« Nous sommes particulièrement enthousiastes quant aux répercussions de cette opportunité pour l’industrie alimentaire », a déclaré Marianne Kirkegaard, présidente et PDG de CSM. 

« Notre accord avec 3D Systems a le potentiel de refaçonner l’industrie alimentaire », a-t-elle déclaré. « Au sein de nombreux secteurs, l’impression 3D contribue à transformer les industries, et tout porte à croire que cela concernera également l’industrie alimentaire. Nous sommes ravis de ce partenariat qui nous permet de poursuivre l’expansion de nos capacités et de nos opportunités culinaires grâce à sa plateforme. »

Vyomesh Joshi, président et PDG de 3D Systems, a exprimé un optimisme similaire concernant cet accord.

« Notre portefeuille étendu et polyvalent de matériaux permet de répondre à la plus large gamme d’applications et de performances en matière d’impression 3D – du secteur culinaire au secteur industriel », a-t-il déclaré. « À l’heure où nous continuons d’encourager l’innovation et d’explorer des partenariats stratégiques aux côtés de leaders sectoriels, notre partenariat aux côtés de CSM se révèle idéal pour tirer parti de nos technologies et capacités qui permettront de développer les applications et les matériaux. »

Ce partenariat favorise la R&D collaborative, l’ingénierie, la conception et le développement des imprimantes axé sur un approvisionnement spécifique, sur le développement de produits alimentaires, ainsi que sur les plans de commercialisation. À l’issue d’analyses approfondies, de discussions, d’une planification et d’une recherche de marché étendues, CSM et 3D Systems ont officialisé cet accord, et commencent à travailler afin de proposer des prototypes sur le marché.

Déclarations prévisionnelles
Les déclarations contenues dans ce communiqué de presse ne revêtant pas un caractère de nature historique sont des déclarations prévisionnelles au sens de la loi Private Securities Litigation Reform Act de 1995. Les déclarations prévisionnelles incluent, entre autres, les attentes relatives à l’impact et au succès du partenariat stratégique entre 3D Systems et CSM Bakery Solutions, ainsi qu’à la capacité de proposer des produits et des conceptions 3D sur le marché, via cette collaboration ou d’une autre manière. Ces déclarations prévisionnelles impliquent des incertitudes et des risques, tels que ceux décrits dans les rapports périodiques de 3D Systems et de CSM Bakery Solutions déposés auprès de la Securities and Exchange Commission, ainsi que d’autres facteurs susceptibles de faire différer significativement les résultats réels des résultats anticipés. Bien que la direction considère que les attentes énoncées dans les déclarations prévisionnelles soient raisonnables, les déclarations prévisionnelles ne sauraient constituer ou être considérées comme une garantie quant à la performance ou aux résultats futurs, et ne sauraient nécessairement se révéler être des indications précises quant aux délais dans lesquels cette performance ou ces résultats seront atteints. Ces informations sont fournies à la date du présent communiqué de presse, et 3D Systems et CSM Bakery Solutions rejettent toute obligation d’actualiser ou de réviser les déclarations prévisionnelles formulées par la direction ou pour le compte de la direction, que ce soit en réponse à de nouvelles informations, à des événements futurs, ou pour toute autre raison.

À propos de CSM Bakery Solutions
CSM Bakery Solutions est un leader mondial dans le secteur des ingrédients, produits et services de boulangerie destinés aux marchés de la vente au détail et des services alimentaires, ainsi qu’aux boulangeries artisanales et industrielles. CSM propose ses services à plus de 45 000 clients répartis dans plus de 100 pays, et offre un large portefeuille composé de marques réputées, en fournissant des ingrédients spécialisés (préparations sèches, garnitures, glaçages, dorures, mélanges, nappages, pâtes, pâtes surgelées, et bien d’autres ingrédients), ainsi que des produits finis (gâteaux, donuts, muffins, brownies, cookies, pains spéciaux, viennoiserie, et bien d’autres produits finis). La mosaïque de marques ancestrales de boulangerie de CSM inclut quelques uns des noms les plus reconnus dans le secteur, parmi lesquels : Brill, Henry & Henry, MeisterMarken, Multifoods, et Waldkorn, pour n’en citer que quelques-uns.

À propos de 3D Systems
3D Systems propose des produits et services 3D complets, parmi lesquels des imprimantes 3D, des matériaux d’impression, des services de fabrication à la demande, ainsi que des outils de conception numérique. Son écosystème soutient des applications avancées, des ateliers de conception de produits jusqu’aux ateliers d’usines, en passant par les salles d’opération. Les capacités de médecine de précision de 3D Systems incluent la simulation, la planification chirurgicale virtuelle, l’impression de dispositifs médicaux et dentaires, ainsi que d’instruments chirurgicaux spécifiques aux patients. Créateur de l’impression 3D et pionnier en solutions 3D d’avenir, 3D Systems a consacré plus de 30 années de son existence à permettre aux professionnels et aux entreprises d’optimiser leurs conceptions, de transformer leurs flux de travail, de proposer des produits innovants sur le marché, et de favoriser de nouveaux modèles d’entreprise.

Pour en savoir plus, veuillez contacter :

CSM Bakery Solutions
Dennis Murphy
Vice-président et directeur de la communication
Bureau : +1 404-478-5529
Portable : +1 770-377-6329
E-mail :

3D Systems Corporation
Diane Parish

Photo –

Photo –

Photo –

SOURCE CSM Bakery Solutions

Related Links

Wreckage from the USS Indianapolis Located in the Philippine Sea 72 Years after It Was Torpedoed and Sunk During Final Days of World War II

SEATTLE, Aug. 19, 2017 /PRNewswire/ — Wreckage from the USS Indianapolis was discovered on Aug. 18 by the expedition crew of Research Vessel (R/V) Petrel, which is owned by Microsoft co-founder and philanthropist Paul G. Allen. The Indianapolis was found 5,500 meters below the surface, resting on the floor of the North Pacific Ocean.

“To be able to honor the brave men of the USS Indianapolis and their families through the discovery of a ship that played such a significant role during World War II is truly humbling,” Mr. Allen said. “As Americans, we all owe a debt of gratitude to the crew for their courage, persistence and sacrifice in the face of horrendous circumstances.  While our search for the rest of the wreckage will continue, I hope everyone connected to this historic ship will feel some measure of closure at this discovery so long in coming.” 

The Indianapolis was tragically lost in the final days of World War II when it was torpedoed by a Japanese submarine in the early morning hours of July 30, 1945. The Indianapolis sank in 12 minutes, making it impossible to deploy much of its life-saving equipment. Prior to the attack, the Indianapolis had just completed its secret mission of delivering components of one of the two nuclear weapons that were dropped on Japan. Of the 1,196 sailors and Marines onboard, only 317 survived.

“Even in the worst defeats and disasters there is valor and sacrifice that deserve to never be forgotten,” said Sam Cox, Director of the Naval History and Heritage Command. “They can serve as inspiration to current and future Sailors enduring situations of mortal peril. There are also lessons learned, and in the case of the Indianapolis, lessons re-learned, that need to be preserved and passed on, so the same mistakes can be prevented, and lives saved.”

“For more than two decades I’ve been working with the survivors. To a man, they have longed for the day when their ship would be found, solving their final mystery,” said Capt. William Toti (Ret), spokesperson for the survivors of the USS Indianapolis. “They all know this is now a war memorial, and are grateful for the respect and dignity that Paul Allen and his team have paid to one of the most tangible manifestations of the pain and sacrifice of our World War II veterans.”

As the naval flagship of the Fifth Fleet, the sunken Indianapolis was the object of many previous search efforts. Mr. Allen had recently acquired and retrofitted the 250-foot R/V Petrel with state-of-the-art subsea equipment capable of diving to 6,000 meters (or three and a half miles).  

“The Petrel and its capabilities, the technology it has and the research we’ve done, are the culmination of years of dedication and hard work,” said Robert Kraft, director of subsea operations for Mr. Allen.  “We’ve assembled and integrated this technology, assets and unique capability into an operating platform which is now one among very few on the planet.”

The other key factor in the discovery was information that surfaced in 2016 by Dr. Richard Hulver, historian with the Naval History and Heritage Command, which led to a new search area to the west of the original presumed position.

By finally identifying a naval landing craft that had recorded a sighting of the USS Indianapolis the night that it was torpedoed, the research team developed a new position and estimated search, which was still a daunting 600 square miles of open ocean. 

Allen-led expeditions have also resulted in the discovery of the Japanese battleship Musashi (March 2015) and the Italian WWII destroyer Artigliere (March 2017). His team was also responsible for retrieving and restoring the ship’s bell from the HMS Hood for presentation to the British Navy in honor of its heroic service. Mr. Allen’s expedition team was recently transferred to the newly acquired and retrofitted R/V Petrel specifically for continuing exploration and research efforts.

The 16-person expedition team on the R/V Petrel will continue the process of surveying the full site as weather permits and will be conducting a live tour of the wreckage in the next few weeks. The USS Indianapolis remains the property of the U.S. Navy and its location will remain confidential and restricted by the Navy. The crew of the R/V Petrel has been collaborating with Navy authorities throughout its search operations and will continue to work on plans to honor the 22 crew members still alive today, as well as the families of all those who served on the highly decorated cruiser. 

For more information, contact:, 206-342-2230

The following link provides visual assets, materials and video interviews from:

  • Microsoft co-founder and philanthropist Paul G. Allen
  • Director of subsea operations for Mr. Allen, Robert Kraft
  • Director of the Naval History and Heritage Comment, Sam Cox
  • Naval Historian Dr. Richard Hulver
  • B-roll of the R/V Petrel in its search for the U.S.S. Indianapolis
  • Historic photos of the U.S.S. Indianapolis

The following links are recommended resources provided by Dr. Hulver and provide the history of the USS Indianapolis.

About Paul G. Allen

Four decades after co-founding Microsoft, entrepreneur and philanthropist Paul G. Allen is still exploring the frontiers of technology and human knowledge, and acting to change the future.  Mr. Allen is working to save endangered species; combat climate change; improve ocean health; share art, history and film; develop new technology; tackle epidemics; research how the human brain works; and build sustainable communities.

Mr. Allen is deeply committed to honoring our past and the lessons it provides to our future. He has created public spaces including the Flying Heritage and Combat Armor Collection, MoPOP and the Living Computer Museum + Lab —where people learn and interact with historic, cultural and musical heritage. The inaugural Seattle Art Fair helped put the city on the map as one of the premier art destinations in the country. He also thinks globally, making impact investments that will help developing countries expand their health and infrastructure and nurture a diversified economy.

Many of his ventures were seeded in his youth, and reflect the depth and diversity of his passions.  Honoring his father’s service in World War II, Mr. Allen is especially interested in collecting and protecting the artifacts that speak to the heroism and service of that day. His recently acquired Research Vessel Petrel provides a platform to search for historic artifacts that have been lost at sea.

To learn more, visit

View original content:

SOURCE Paul G. Allen

Related Links

Black Men XCEL: BE Education Editor Celebrates An Uncle’s Intellect

In recognition of our very first Black Men XCEL Summit, celebrating the best of black male achievement, the Black Enterprise staff is sharing their stories of the men who’ve had an extraordinary impact in their own lives…

Robin White Goode on Black Men XCEL Black Enterprise Education Editor Robin White Goode (Photo by Seimond London)

Who is the man in your life who’s inspired you to excel?

Besides my father, that would be my Uncle Herby, my father’s oldest brother and also my godfather. He was a brilliant man who earned a Ph.D. in psychology in the ’70s and taught at Fairleigh Dickinson University. He was and is the most intellectual man I’ve ever known. To this day he is the person I measure other smart, accomplished people against, and no one else has matched my Uncle Herby. I don’t think that’s just my hero worship of him either; he was truly a thoughtful and humane and deeply intellectual man. He was a man who read to his children and who took a genuine interest in his younger siblings (he was the oldest of five) and their families. He continues to be very much a kind of lodestar for me. If he were alive today, he’d be 97.

How would you describe the impact he’s had on you?

Uncle Herb was a Quaker—one of the few black Quakers. Because of his influence I chose a Quaker (though nonsectarian) college, Earlham College in Indiana. He had always given me “permission” to be myself in a way that I didn’t experience in my own home (although I did grow up in a loving home). For example, I am naturally somewhat shy and although I love to sing I rarely sing in front of others. But I remember once Uncle Herby asking me to sing a short chorus in front of him, my aunt, and two cousins, his sons—and I did. It just seemed OK to do—there wasn’t any space for silly bashfulness. I don’t know why, but he had that effect on me. He was also a proud black man but had friends of all races. I’ve tried to emulate that in my own life.

What’s the biggest lesson he taught you?

First, fearlessness. He set an example of bold, authentic living by pursuing a terminal degree and also a rich avocational life. For example, he swam regularly and also took art and sculpture classes. He sculpted a bust of his father, my grandfather, whom we all called Pop, that my father still has today. He lived a vibrant, creative life that I found inspiring. Second, he taught me not to set artificial limits around myself, but to be open to people and experiences—to vigorous living. Third, to care about others. All my uncles were great, but he was the only one who took a sustained interest in my well-being and who included me in the activities of his own family.

What are you doing to make him proud?

Not enough! His own sons graduated from Harvard and are now medical doctors—I’m piddling along as an education editor. But seriously, I think what would make him proudest would be for me to be my authentic self, to be courageous (still working on that one), and to continue pursuing the things that delight and thrill me. I also think that when I look out for my nieces, nephews, and their children, I’m following his example.

Register now for the Black Men XCEL Summit and
join us for a celebration of black men!

Would It Be Better If Men Couldn’t Vote?

Science fiction often shows us ways society could be different in the future. One recent example is John Kessel’s novel The Moon and the Other, which presents a fresh take on the idea of a matriarchal society.

“I imagine this society called the Society of Cousins on the moon that is dominated by women, and it’s organized along certain principles that are intended to defuse male violence,” Kessel says in Episode 269 of the Geek’s Guide to the Galaxy podcast.

The basic idea behind the Society is to ban men from voting but otherwise try to keep them as happy and fulfilled as possible. In the book this results in a female-led society with much less violence than other human communities, an idea Kessel finds very plausible.

“I do think that most violence in human culture goes back to male behavior, and I think that there’s got to be a huge biological element to this,” he says.

The intersection of gender and biology is a fraught topic, and at times the potential backlash almost caused Kessel to abandon the project. In the end he persevered, but he was careful to get feedback on the manuscript from writers of various backgrounds.

“I’m a 66-year-old white male,” he says. “I knew all along when I was writing this that I could get myself into very hot water, so I wanted to know what sorts of things people would say about it.”

One thing that’s struck him is that different readers will view the Society of Cousins in completely different ways. “It’s very interesting to me how many people feel the Society of Cousins is a tyranny of women over men,” Kessel says. “And then others say that it’s sort of an imperfect utopia, and that’s more what I felt it was. It’s an imperfect society like our own. It has its good points and its bad.”

Listen to the complete interview with John Kessel in Episode 269 of Geek’s Guide to the Galaxy (above). And check out some highlights from the discussion below.

John Kessel on social deviance credits:

“I was thinking about how certain economic thinkers have thought that one way to control pollution is by setting a certain maximum amount of pollution you allow in society, and then different corporations that pollute have certain credits, and they can trade these credits, so that if someone’s running a coal-fired power plant, they might buy pollution credits from someone who doesn’t pollute as much in order to have more leeway to pollute. And so what I have are ‘social deviance credits.’ So if someone else obeys the law, they’re not using their social deviance credit, so you can sell that social deviance credit to someone who’s a criminal so they can break a certain number of laws with impunity, as long as they’ve accumulated enough social deviance credit to make up for that.”

John Kessel on imagining an Iranian lunar colony:

“I figured that the richest colony on the moon would be at the lunar south pole, where they have deposits of ice, and water being a very rare and necessary commodity for human beings, that would offer any colony there the opportunity to prosper. And then I thought, ‘Well, I don’t want to have it be just a bunch of Americans.’ I wanted to go for some other kind of culture there that would be very advanced and cosmopolitan but would not be middle-class American. So I hit upon the idea of Iranian immigrants founding this colony. There are numerous Iranian exiles around the world right now—there’s an area of Los Angeles, I think it’s called “Tehrangeles,” because of the number of Iranians who have immigrated there—and so I imagined some of them founding this colony.”

John Kessel on surviving on the moon:

“Any long-term lunar colonies would have to be underground, unless you somehow create an atmosphere for the moon—which some people think can be done. But unless that happens, you really have to protect people from radiation or they’ll suffer serious life effects. Also, the low gravity is a problem on the moon. I didn’t really talk about this much in the book, but in my mind anyway, the genes of the people who are born and raised on the moon are altered so that their bone structure is suited to the moon, and they don’t end up with calcium leeching out of their bones, and they don’t end up with the terrible effects of people from Earth who are left in low gravity or microgravity for long periods of time.”

John Kessel on Robert Heinlein:

“He wrote a bunch of stories about the colonization of the moon, and some of them are really pretty intelligent. One of the things I have in my book are people in a large, domed crater being able to fly. Of course that’s not original to me. Heinlein came up with that idea for his story ‘The Menace from Earth’ back in the 1950s, and he makes it quite plausible. I’m really just building off of that, so I have to give the man credit in retrospect. Although his big book that’s set on the moon, The Moon is a Harsh Mistress, I really don’t like that book. I feel like it oversimplifies the politics immensely, and also there’s a kind of mechanicalness to the plot of the book. It’s not my favorite Heinlein book. A lot of people think it’s one of his best, and I do not.”

Go Back to Top. Skip To: Start of Article.

Charlottesville, HBO Hacks, and More Security News This Week

The terrible events of Charlottesville, VA, last weekend caused several parties to reevaluate. The so-called alt-right attempted to disown the rally online despite promoting it heavily in advance. Tech companies finally used some of the tools at their disposal to tamp down white supremacy. Historically neutral internet services company Cloudflare pulled the plug on a client—white supremacist site The Daily Stormer—for the first time. And President Trump, well, watched Fox News, and then repeated the things he saw there.

Elsewhere in the world of security, Verizon took a somewhat surprising stand for your privacy. Stingray-detector apps turned out to be not so hot at detecting stingray devices. A new car vulnerability looks very hard to detect, and even harder to patch. And we took a closer look at HBO’s very bad two weeks, hack-wise.

If all that’s not enough to keep you up at night, please do get cozy with our in-depth look at Russia’s playbook, and how it’s playing out in the US and elsewhere to disrupt democracy around the globe.

Of course, there’s more, which is why we’ve rounded up all the news we didn’t break or cover in depth this week. As usual, click on the headlines to read the full stories.

iOS 11 Lets You Disable Touch ID Quickly in Case of Cops

Touch ID excels at keeping crooks out of your phone, but arguably lets cops in too easily. Getting a suspect’s finger on a home button takes a lot less work than guessing a passcode, or getting them to volunteer one. It appears Apple has taken this sticky civil liberties situation into account in iOS 11, which features a new setting where tapping the power button five times brings up the option to make an emergency call, and disables Touch ID until the user enters their password. Discreet! And another potential front in the ongoing disputes between Apple and law enforcement, though we’ll have to wait at least until iOS 11’s official release this fall to see the full legal ramifications.

Maersk Lost $200-$300 Million To NotPetya Plague

The malware known as NotPetya made headlines largely for how widely it affected networks across the world, hitting Ukraine and then spreading quickly across the internet, mostly to Europe and Asia. But now that two months have passed, it’s becoming clear just how devastating that epidemic was for some of its largest victims. For shipping firm Maersk, it led to as much as $300 million in damages, one of the worst-ever effects of a cyberattack on a company’s balance sheet. In a statement from the company’s CEO Soren Skou on Tuesday, Maersk said it expects to see those nine figures of lost revenue on its third quarter earnings reports. The company’s statement said that was able to start receiving new bookings from customers two days after the attack. But earlier reports on Maersk’s malware debacle found that the company had shut down at least one entire facility in New Jersey and had to switch to manually tracking its loading and unloading of cargo, keeping offline and even handwritten records of its business in branches from India to New Zealand to Alabama.

Update Gone Awry Bricks 500 “Smart” Locks

The internet of things promises many utopian conveniences and magical, cloud-controlled features. It also promises a lot more problems like the one faced this week by the Colorado company LockState, which paralyzed 500 of its customers’ locks by sending out a botched software update. The update for the devices, which are designed to let users remotely set their locks combinations, was for the wrong version. That meant it bricked earlier versions’ electronic functions and prevented any further over-the-air updates that could have fixed the problem. The locks do also offer a manual, traditional keyhole that continued to work as a failsafe. But anyone without a key found themselves locked out of their homes. And since LockState partners with AirBnB, keyless renters who depend on their host setting a temporary code were locked out, too. LockState has offered to replace the locks or update the software for anyone who sends them the bricked devices. But the replacement process could take between days and weeks, LockState says. Nothing like an IoT meltdown to make old-fashioned mechanical pin-and-tumbler locks seem like relative marvels of engineering.

Thieves Steal a Smart Doorbell That Recorded Them the Whole Time

A big week for door-based technology! Not much to say here beyond the headline, but do enjoy the video below of very dumb crooks.

[embedded content]

Yellowstone Supervolcano Could Power Electric Cars of the Future

This story originally appeared on Newsweek and is part of the Climate Desk collaboration.

Electric cars and smartphones of the future could be powered by supervolcanoes like Yellowstone after scientists discovered that ancient deposits within them contain huge reservoirs of lithium—a chemical element used to make lithium-ore batteries, supplies of which are increasingly dwindling.

Lithium, a soft white metal first discovered in 1817 by Johan August Arfvedson, has become widely used in manufacturing, most importantly in the production of rechargeable batteries for phones, laptops, cameras and vehicles. It has also been used in psychiatric treatments and to produce nuclear weapons.

Most of the world’s lithium currently comes from Australia and Chile, generally being extracted from brines, pegmatites (igneous rock) and sedimentary rocks. But it is a finite resource, and with car manufacturers and technology companies increasingly looking to create battery-powered devices, lithium is becoming an ever-more precious metal, with demand outstripping supply.

In a study published in the journal Nature Communications, researchers from Stanford University and the US Geological Survey have found a new potential source for lithium—within America’s supervolcanoes.

These volcanoes are capable of producing huge eruptions, about 1,000 times bigger than average. Along with the famous Yellowstone caldera, there are three other supervolcanoes in the US, Crater Lake, Long Valley and Valles Caldera.

When these volcanoes erupt, they collapse into huge basin-like formations known as calderas. These depressions often fill with water to become lakes, with the ash and pumice ejected during the eruption spread across the caldera in ancient deposits.

In the study, the team looked to supervolcanoes as a potential source of lithium because of the lithium-enriched magmas that formed them. Over thousands of years, lithium leaks out of the volcanic deposits, accumulating in the caldera lake, eventually becoming concentrated in a clay.

  • Related Stories

  • Chelsea Leu

    How Lithium-Ion Batteries Turn Into Skin-Searing Firebombs

  • Sarah Scoles

    Samsung Isn’t the Only One with Lithium Ion Battery Problems. Just Ask NASA

  • Klint Finley

    Tesla’s New Battery Will Make Lithium Ion the Next AA

The team looked at samples taken from the High Rock caldera complex in Nevada, Sierra la Primavera, Mexico, Pantelleria in the Strait of Sicily, Yellowstone, and Hideaway Park in Colorado. By comparing concentrations of magmas formed in these various tectonic settings, they were able to show how supervolcanoes have the potential to host huge amounts of lithium-rich clay deposit.

“If you have a lot of magma erupting, it doesn’t have to have as much lithium in it to produce something that is worthy of economic interest as we previously thought,” study co-author Gail Mahood said in a statement. “You don’t need extraordinarily high concentrations of lithium in the magma to form lithium deposits and reserves.”

Having a supply of lithium available could prove hugely useful in the coming decades—it could meet the rising demand for the metal and to “diversify the global lithium supply chain,” the team wrote.

“We’re going to have to use electric vehicles and large storage batteries to decrease our carbon footprint,” Mahood said. “It’s important to identify lithium resources in the US so that our supply does not rely on single companies or countries in a way that makes us subject to economic or political manipulation.”

Lead author Thomas Benson added: “We’ve had a gold rush, so we know how, why and where gold occurs, but we never had a lithium rush. The demand for lithium has outpaced the scientific understanding of the resource, so it’s essential for the fundamental science behind these resources to catch up.”

Bang & Olufsen’s Beosound Shape Speakers Create a Beautiful Wall of Sound

Don’t gunk up your artfully appointed living room with artlessly boxy speakers. The Danes at Bang & Olufsen have designed a sonic solution for you. The wall-mounted BeoSound Shape is assembled from three flavors of hexagonal tiles: speakers, amplifiers, and echo-­absorbing noise dampers. Mix and match the modules to build a unique array that’s ideal for your dwelling, then select a color scheme that matches your Mondrian. The modules all connect to a brain called the Core, and its algorithm spreads the signal to the speakers. By ditching the typical left-right stereo arrangement, it transforms every seat in the room into a sweet spot. So relax, enjoy the tunes, and gaze at your personal sound sculpture. | $4,025 and up

This article appears in the August issue. Subscribe now.

Space Photos of the Week: Neighboring Galaxies Got a Star Factory Going

You might be counting down the days to the solar eclipse, but the universe is always overflowing with celestials marvels. And this week was no exception.

First up is a rare jellyfish galaxy, nicknamed for its long, winding “tentacles” trailing out behind it. This phenomenon is caused by something known as ram pressure stripping, when galaxies plummet into galaxy clusters at an incredibly fast rate. They sometimes meet hot, dense gas that blows through the galaxy, shooting out gas and setting off starbursts. This process also feeds the supermassive black hole in the center of the galaxy which makes it grow in size and glow brightly. The photo made by ESO’s Very Large Telescope documents just one of 400 known jellyfish galaxies in the universe.

There’s also the sparkling IC 1727 galaxy snapped by NASA’s Hubble Telescope. The galaxy’s unusual and warped shape comes from interaction with neighboring galaxy HGC 672 (not pictured). When galaxies drift too close together, their gravities push and pull against one another, swapping dust and gas. This duo is also a hotbed for star formation, with starbursts and star clusters dotted throughout.

If that’s not enough, check out the hazy atmosphere of Saturn’s moon Titan and Jupiter’s many converging cloud formations. And when you’re finished, make sure to explore the entire collection.

Bacteria May Rig Their DNA to Speed Up Evolution

In 1944, a Columbia University doctoral student in genetics named Evelyn Witkin made a fortuitous mistake. During her first experiment in a laboratory at Cold Spring Harbor, in New York, she accidentally irradiated millions of E. coli with a lethal dose of ultraviolet light. When she returned the following day to check on the samples, they were all dead—except for one, in which four bacterial cells had survived and continued to grow. Somehow, those cells were resistant to UV radiation. To Witkin, it seemed like a remarkably lucky coincidence that any cells in the culture had emerged with precisely the mutation they needed to survive—so much so that she questioned whether it was a coincidence at all.

Quanta Magazine

author photo


Original story reprinted with permission from Quanta Magazine, an editorially independent publication of the Simons Foundation whose mission is to enhance public understanding of science by covering research developments and trends in mathematics and the physical and life sciences.

For the next two decades, Witkin sought to understand how and why these mutants had emerged. Her research led her to what is now known as the SOS response, a DNA repair mechanism that bacteria employ when their genomes are damaged, during which dozens of genes become active and the rate of mutation goes up. Those extra mutations are more often detrimental than beneficial, but they enable adaptations, such as the development of resistance to UV or antibiotics.

The question that has tormented some evolutionary biologists ever since is whether nature favored this arrangement. Is the upsurge in mutations merely a secondary consequence of a repair process inherently prone to error? Or, as some researchers claim, is the increase in the mutation rate itself an evolved adaptation, one that helps bacteria evolve advantageous traits more quickly in stressful environments?

The scientific challenge has not just been to demonstrate convincingly that harsh environments cause nonrandom mutations. It has also been to find a plausible mechanism consistent with the rest of molecular biology that could make lucky mutations more likely. Waves of studies in bacteria and more complex organisms have sought those answers for decades.

The latest and perhaps best answer—for explaining some kinds of mutations, anyway—has emerged from studies of yeast, as reported in June in PLOS Biology. A team led by Jonathan Houseley, a specialist in molecular biology and genetics at the Babraham Institute in Cambridge, proposed a mechanism that drives more mutation specifically in regions of the yeast genome where it could be most adaptive.

“It’s a totally new way that the environment can have an impact on the genome to allow adaptation in response to need. It is one of the most directed processes we’ve seen yet,” said Philip Hastings, professor of molecular and human genetics at Baylor College of Medicine, who was not involved in the Houseley group’s experiments. Other scientists contacted for this story also praised the work, though most cautioned that much about the controversial idea was still speculative and needed more support.

Increasing Variety in the Genome

“Rather than asking very broad questions like ‘are mutations always random?’ I wanted to take a more mechanistic approach,” Houseley said. He and his colleagues directed their attention to a specific kind of mutation called copy number variation. DNA often contains multiple copies of extended sequences of base pairs or even whole genes. The exact number can vary among individuals because, when cells are duplicating their DNA before cell division, certain mistakes can insert or delete copies of gene sequences. In humans, for instance, 5 to 10 percent of the genome shows copy number variation from person to person—and some of these variations have been linked to cancer, diabetes, autism and a host of genetic disorders. Houseley suspected that in at least some cases, this variation in the number of gene copies might be a response to stresses or hazards in the environment.

Jonathan Houseley leads a team that studies genome change at the Babraham Institute in Cambridge. Based on their studies of yeast, they recently proposed a mechanism that would increase the odds for adaptive mutations in genes that are actively responding to environmental challenges.


In 2015, Houseley and his colleagues described a mechanism by which yeast cells seemed to be driving extra copy number variation in genes associated with ribosomes, the parts of a cell that synthesize proteins. However, they did not prove that this increase was a purposefully adaptive response to a change or constraint in the cellular environment. Nevertheless, to them it seemed that the yeast was making more copies of the ribosomal genes when nutrients were abundant and the demand for making protein might be higher.

Houseley therefore decided to test whether similar mechanisms might act on genes more directly activated by hazardous changes in the environment. In their 2017 paper, he and his team focused on CUP1, a gene that helps yeast resist the toxic effects of environmental copper. They found that when yeast was exposed to copper, the variation in the number of copies of CUP1 in the cells increased. On average, most cells had fewer copies of the gene, but the yeast cells that gained more copies—about 10 percent of the total population — became more resistant to copper and flourished. “The small number of cells that did the right thing,” Houseley said, “were at such an advantage that they were able to outcompete everything else.”

But that change did not in itself mean much: If the environmental copper was causing mutations, then the change in CUP1 copy number variation might have been no more than a meaningless consequence of the higher mutation rate. To rule out that possibility, the researchers cleverly re-engineered the CUP1 gene so that it would respond to a harmless, nonmutagenic sugar, galactose, instead of copper. When these altered yeast cells were exposed to galactose, the variation in their number of copies of the gene changed, too.

The cells seemed to be directing greater variation to the exact place in their genome where it would be useful. After more work, the researchers identified elements of the biological mechanism behind this phenomenon. It was already known that when cells replicate their DNA, the replication mechanism sometimes stalls. Usually the mechanism can restart and pick up where it left off. When it can’t, the cell can go back to the beginning of the replication process, but in doing so, it sometimes accidentally deletes a gene sequence or makes extra copies of it. That is what causes normal copy number variation. But Houseley and his team made the case that a combination of factors makes these copying errors especially likely to hit genes that are actively responding to environmental stresses, which means that they are more likely to show copy number variation.

The key point is that these effects center on genes responding to the environment, and that they could give natural selection extra opportunities to fine-tune which levels of gene expression might be optimal against certain challenges. The results seem to present experimental evidence that a challenging environment could galvanize cells into controlling those genetic changes that would best improve their fitness. They may also seem reminiscent of the outmoded, pre-Darwinian ideas of the French naturalist Jean-Baptiste Lamarck, who believed that organisms evolved by passing their environmentally acquired characteristics along to their offspring. Houseley maintains, however, that this similarity is only superficial.

“What we have defined is a mechanism that has arisen entirely through Darwinian selection of random mutations to give a process that stimulates nonrandom mutations at useful sites,” Houseley said. “It is not Lamarckian adaptation. It just achieves some of the same ends without the problems involved with Lamarckian adaptation.”

The Adaptive Mutation Debate

Ever since 1943, when the microbiologist Salvador Luria and the biophysicist Max Delbrück showed with Nobel prize-winning experiments that mutations in E. coli occur randomly, observations like the bacterial SOS response have made some biologists wonder whether there might be important loopholes to that rule. For example, in a controversial paper published in Nature in 1988, John Cairns of Harvard and his team found that when they placed bacteria that could not digest the milk sugar lactose in an environment where that sugar was the sole food source, the cells soon evolved the ability to convert the lactose into energy. Cairns argued that this result showed that cells had mechanisms to make certain mutations preferentially when they would be beneficial.

Budding yeast (S. cerevisiae) grow as colonies on this agar plate. If certain recent research is correct, a mechanism that helps to repair DNA damage in these cells may also promote more adaptive mutations, which could help the cells to evolve more quickly under harsh circumstances.


Experimental support for that specific idea eventually proved lacking, but some biologists were inspired to become proponents of a broader theory that has come to be known as adaptive mutation. They believe that even if cells can’t direct the precise mutation needed in a certain environment, they can adapt by elevating their mutation rate to promote genetic change.

The work of the Houseley team seems to bolster the case for that position. In the yeast mechanism “there’s not selection for a mechanism that actually says, ‘This is the gene I should mutate to solve the problem,’” said Patricia Foster, a biologist at Indiana University. “It shows that evolution can get speeded up.”

Hastings at Baylor agreed, and praised the fact that Houseley’s mechanism explains why the extra mutations don’t happen throughout the genome. “You need to be transcribing a gene for it to happen,” he said.

Adaptive mutation theory, however, finds little acceptance among most biologists, and many of them view the original experiments by Cairns and the new ones by Houseley skeptically. They argue that even if higher mutation rates yield adaptations to environmental stress, proving that the higher mutation rates are themselves an adaptation to stress remains difficult to demonstrate convincingly. “The interpretation is intuitively attractive,” said John Roth, a geneticist and microbiologist at the University of California, Davis, “but I don’t think it’s right. I don’t believe any of these examples of stress-induced mutagenesis are correct. There may be some other non-obvious explanation for the phenomenon.”

  • Related Stories

  • Carrie Arnold

    Evolution Is Slower Than It Looks and Faster Than You Think

  • Ariel Bleicher

    Shrinking Bat Genomes Spark a New Model of Evolution

  • Emily Singer

    Does Evolution Evolve Under Pressure?

“I think [Houseley’s work] is beautiful and relevant to the adaptive mutation debate,” said Paul Sniegowski, a biologist at the University of Pennsylvania. “But in the end, it still represents a hypothesis.” To validate it more certainly, he added, “they’d have to test it in the way an evolutionary biologist would”—by creating a theoretical model and determining whether this adaptive mutability could evolve within a reasonable period, and then by challenging populations of organisms in the lab to evolve a mechanism like this.

Notwithstanding the doubters, Houseley and his team are persevering with their research to understand its relevance to cancer and other biomedical problems. “The emergence of chemotherapy-resistant cancers is commonplace and forms a major barrier to curing the disease,” Houseley said. He thinks that chemotherapy drugs and other stresses on tumors may encourage malignant cells to mutate further, including mutations for resistance to the drugs. If that resistance is facilitated by the kind of mechanism he explored in his work on yeast, it could very well present a new drug target. Cancer patients might be treated both with normal courses of chemotherapy and with agents that would inhibit the biochemical modifications that make resistance mutations possible.

“We are actively working on that,” Houseley said, “but it’s still in the early days.”

Original story reprinted with permission from Quanta Magazine, an editorially independent publication of the Simons Foundation whose mission is to enhance public understanding of science by covering research developments and trends in mathematics and the physical and life sciences.

Yes, Expose the Neo-Nazis. Then Recruit Them Back to Humanity

Last weekend’s events in Charlottesville, Virginia, showed the ugliest face of white nationalism in the United States. That racism is a problem—in both its structural and personal forms—shouldn’t surprise anyone. But even if you knew that virulent hate groups existed, they’re fringe enough that most Americans have never spoken to their members. Aside from a few figureheads like David Duke, you’re more likely to have seen one of their memes than one of their faces.



Dave Algoso (@dalgoso) is a social change consultant. He was raised in Virginia and graduated from the University of Virginia in Charlottesville.

Today, that’s no longer true. We know exactly what they look like. The weekend was well-covered, with participants and journalists capturing most scenes from multiple angles. Last Friday’s tiki torch march through the University of Virginia, last Saturday’s rally in Emancipation Park, and the violence that accompanied both reached us in real-time over Facebook and Twitter. The nightly news and front pages of newspapers have replayed those images in the days since.

Crowd-sourced sleuthing soon turned up the identities and social media profiles of several participants. The willingness to show their faces put “Unite the Right” attendees in stark contrast to the iconic hooded Klansman. As sociologist and educator Eve Ewing commented on Twitter: “They’re all confident they’ll have jobs on Monday.”

They turned out to be wrong. Cole White had lost his job at a California hot dog joint by Sunday morning. Peter Tefft faced a scathing open letter from his father in North Dakota, denouncing his son’s hateful beliefs and attendance at the Charlottesville rally. Peter Cvjetanovic, a college student from Nevada, defended his participation after he was identified; more than 40,000 people have signed petitions calling on the university to expel him. Chris Cantwell, featured in a Vice documentary on the weekend’s events, was kicked off the dating site OkCupid.

The trolls of the so-called alt-right are making a twisted “free speech” defense, playing the victims of an intolerant left. They claim they’re being punished for their political beliefs. But the weapons that rally participants brought to Charlottesville undercut that claim. Last Friday’s assaults on students and last Saturday’s attacks on counter-protestors—including the group beating of local resident Deandre Harris in a parking garage—reveal the group’s insincerity. And the murder of Heather Heyer by a member of white supremacist group Vanguard America shows the argument to be a cover for a cynical, hate-filled world view.

If this had been a peaceful rally within the realm of normal political discourse, then publishing the names of attendees or firing them from their jobs would be an unreasonable reaction. That’s not the case here. No one responded this way in the past, even for white nationalist rallies. This wasn’t even the first time they’d marched in Charlottesville this summer: A smaller group had held a torch-lit preview at the same park in May. But it was the first time white nationalists showed up armed, in large numbers, and became violent.

Fascist views were already well outside acceptable politics. By enacting those views with violence, the rally violated a deep norm that undergirds our social contract. As political scientist David Karpf argued on Twitter, these violations must be met with penalties or the norms fade away. The Trump administration has seen norms against nepotism, kleptocracy, and profiteering soften because a Republican-controlled Congress has refused to impose any penalties. In this case, ordinary people can step in and assert that these norms matter. We should applaud them for it. (Though the task could be approached with more care: Misidentification is a problem, and even accurate identification shouldn’t be followed by threats of violence.)


  • Emma Grey Ellis

    Whatever Your Side, Doxing Is a Perilous Form of Justice

  • Emma Grey Ellis

    There Is No ‘Alt-Left,’ No Matter What Trump Says

  • Jason Parham

    White Supremacy Isn’t a Philosophy, It’s a Filter

Unfortunately, this penalty only applies to the rank-and-file. The organizers and leaders were never anonymous. Their names were on the rally posters. Richard Spencer and Jason Kessler have proudly sought notoriety by promoting white nationalism. Last weekend drew rebukes from the mainstream right, but rally leaders saw a victory in President Trump’s reluctant, kid-gloves condemnation. They left Charlottesville emboldened and empowered.

The job losses and other punishments facing the members of this mob are necessary but will have unintended consequences. When those individuals woke up on Monday morning, they returned to the same online forums and Twitter feeds where they’d first encountered hateful ideologies. Social sanctions may even deepen their involvement. When part of your identity is challenged, you double down on it. Movements unify when under attack.

Society needs a follow-up to the rebuke. We need to help white supremacists unlearn the ideologies that took them to the streets of Charlottesville. One group doing active outreach is Life After Hate, a nonprofit run by former far-right extremists who now work to bring others out of the movement. They were approved to receive federal funding by the Obama administration, only to have their funding paused and then cancelled by the Trump administration. In response, the group launched a crowd-funding campaign that’s taken off since last weekend, raising more than $200,000 for their programs.

One group can’t do it alone. Churches and religious groups are also critical to this effort. Drawing on research from violent groups around in the world, peace and conflict expert Rebecca Wolfe has pointed to the important role of families in pulling extremists back from the brink. Institutions like faith and family provide people with narratives about themselves and their identity that can counter those offered by white supremacist groups. Many of these groups are ill-equipped to do this work on their own, especially given the role of online communities in radicalization. Lessons from anti-gang work show the need for a whole-of-community approach.

Reaching white nationalists isn’t just about restoring their own humanity. Their place at the extreme end of the spectrum legitimizes other forms of white supremacy. Conservative politicians can swat away accusations of racism—even while advancing policies of mass incarceration, police violence, racial profiling, economic inequality, inhumane deportation, and voter suppression—by pointing to the crazies in the street and saying: “Me? A racist? I’m not one of those neo-Nazis!”

By reining in the extremes, we can shift the middle ground toward justice. The goal should be to leave people like Spencer and Kessler out on their own, without support from the political establishment or their previously anonymous troll army. That creates more space for the hard work of dismantling white supremacy in its more prevalent forms, bringing allies and waverers over toward active anti-racism. Let’s not just ostracize the neo-Nazis. Let’s counter-recruit their base out from under them.

WIRED Opinion publishes pieces written by outside contributors and represents a wide range of viewpoints. Read more opinions here.

Trump Administration Elevates US Cyber Command

Between Russian meddling in multiple democratic elections, massive Chinese data exfiltration from troves like the US Office of Personnel Management, and out-of-control ransomware spreading from North Korea, nation-state cyber-aggression has become markedly more prominent in recent years. That escalation provides the backdrop for a new Trump administration directive to elevate United States Cyber Command, currently a division of the National Security Agency, to the status of a unified military command.

“This new Unified Combatant Command will strengthen our cyberspace operations and create more opportunities to improve our Nation’s defense,” President Trump said in the statement. “The elevation of United States Cyber Command demonstrates our increased resolve against cyberspace threats and … will also help streamline command and control of time-sensitive cyberspace operations. … Elevation will also ensure that critical cyberspace operations are adequately funded.”

Related Stories

  • Andy Greenberg

    The WannaCry Ransomware Has a Link to Suspected North Korean Hackers

  • Eric Niiler

    The US Takes On the World in NATO’s Cyber War Games

  • Noah Shachtman

    Cyber Command: We Don’t Wanna Defend the Internet (We Just Might Have To)

Created in 2009 by then-Defense Secretary Robert Gates, Cyber Command works to unify oversight of the military’s digital offensive and defensive operations and cybersecurity resources. Cyber Command also coordinates and leads military network defense. Since the tools and strategies that enable digital intelligence-gathering are similar in many ways to those required for cyberwarfare, the NSA made for a natural first home for Cyber Command. As the division has grown, though—and its role grows more pivotal—it has become increasingly clear that Cyber Command would eventually level up.

“This is definitely the right move; they were already talking about [the elevation] just for organizational reasons,” says Joseph Loomis, CEO of the security firm CyberSponse, a current security contractor and advisor to multiple branches of the US government, including Cyber Command. “It had become too big to manage as a subordinate, and it became kind of a problem because there were too many things going on and there wasn’t enough infrastructure and leadership in place.”

As part of transition to the status of a unified command, Secretary of Defense James Mattis will nominate a new Cyber Command leader. Previously, NSA director Michael Rogers oversaw the group. But Mattis is also mulling a potential separation from the NSA, the White House said Friday, which would be a much more intriguing step for Cyber Command.

“It takes the same expertise to infiltrate for offensive purposes or intelligence until the last step, so that was the logic behind lumping them together with the NSA,” says Julian Sanchez, a senior fellow at the Cato Institute who studies national security and intelligence surveillance. “But that last step is something where those two missions are fundamentally at odds, because an intelligence agency is focused on preserving access over time, while in offensive operations you’re usually alerting the adversary to your presence, and ultimately burning your access. So there has been a sense of tension between the mission of the NSA and Cyber Command.”

“It’s one thing to have the biggest, baddest cyber nuke, that’s all great, but you also need to protect against the adversary’s weapons.” — Greg Martin, JASK

The US shouldn’t rush into that separation, though. Coordination between military operations in cyberspace and digital intelligence gathering is still crucial, even with increased separation between the two disciplines. Sanchez and other experts note that if the NSA and Cyber Command do separate, they’ll still need to collaborate, since the two organizations will continue to utilize many of the same tools and conduct operations around many of the same targets.

“The decision to not fully separate them was a smart one,” says Greg Martin, a former security adviser to government agencies like the CIA and NASA and CEO of the security firm JASK. “It’s going to take time to do it right and this at least guarantees that there’s no immediate operational disruption to the way that the NSA functions. It’s going to take time to get to the point where they fully separate if they ever do.”

Even the first step of elevating Cyber Command to a unified command, though, sends a geopolitical message that the US military has prioritized its digital offense and defense, while also streamlining recruitment and funding for this initiative. Though Friday’s announcement was met with bipartisan support and support from the security community, there is also awareness of how it may stoke the ongoing cyberarms race around the world.

“It’s certainly going to signal to the rest of the world that there will be a US cyber-capability buildup and adversaries are only going to be more emboldened by this news,” Martin says. “But having the best cyberweapons and capabilities is the job of our military, so we just need to be thinking carefully about defense. It’s one thing to have the biggest, baddest cyber nuke, that’s all great, but you also need to protect against the adversary’s weapons.”

The elevation of Cyber Command will likely be an intermediary step in a larger evolution, but by removing a level of subordination and making the unit more independent, the move already opens the door to changes in how the US military incorporates and recognizes digital offense and defense.

“Cyber was always just an intel thing back in the day, now it’s become more of an operational capability with a need to militarize it,” CyberSponse’s Loomis says. “The first step starts the initiative and that cultural shift, they might even have a Cyber Command academy just like you have the Naval Academy. But especially when you have so many intertwined intricacies between NSA and Cyber Command the phased approach makes sense. You can’t just run out of the building and set up a shop across the street.”

“Change is Good” Book Excerpt: WIRED Cofounder Louis Rossetto’s New Novel Parties Like It’s 1998

Louis Rossetto cofounded WIRED in 1993. From his perch as editor in chief, he watched as the nascent internet took off, fulfilling his prediction that the world was about to be swept by a digital “Bengali typhoon.” Among other things, that epochal storm spawned a dotcom wave that was cresting in 1998. Now, two decades later, Rossetto has written a novel that captures the optimism, greed, fervor, and madness of that era. Set in a fictional San Francisco, Change Is Good: A Story of the Heroic Era of the Internet, follows the intertwined adventures of a startup CEO, a WIRED reporter, a code-writing true believer, and many more instantly iconic characters ripped from the mists of the first dotcom boom. What follows is a chapter from Rossetto’s novel, which takes place during a wild party thrown by the fictional WIRED magazine. —The Editors

Wednesday, January 7, 1998, San Francisco

Love at first kiss

Carl Hess stands in the line flowing into a looming warehouse off Third Street in the Mission Bay wasteland that was once the old Union Pacific yards. He’s still carrying his backpack with the skateboard strapped to it. His wide eyes drink in the excitement of the chattering dotcommers in line with him, the hiss of the rotating klieg lights out front, the sweat of the meaty bouncers guarding the door, the blacklit fluorescence emanating from inside like radioactivity, the sweet African melodies ramping as he gets closer. The cool, foggy air of this San Francisco night envelops him with limitless, sensual possibility.

This morning, the 18-year-old hacker was fleeing his home in Paris, Kentucky, on a Southwest time machine to the future—to the digital revolution here in San Francisco. Now he’s on the verge of accomplishing his dream of working at Gnuhere, a search-engine startup that has become the hottest web company in South of Market. Carl looks around. He can barely believe he’s standing in this scene.

Rossetto is publishing his book in partnership with p98a, the iconic digital-analog letterpress house in Berlin. The novel is available through a Kickstarter campaign.

At the door, he hands over the invite he scored from Steve Jefferson, the drug dealer/VJ/computer-game developer he met earlier this afternoon at the Gnuhere offices. And then the danceable rhythms, sensuous harmonies, and soaring guitar lines are loud and wash over him, the bodies are close, and their heat embraces him like a humid jungle. The projections on the stage screen behind the African band are a psychedelic assault.

As Carl becomes used to the warm swell of the crowded dance floor, the legendary Congolese singer Tabu Ley Rochereau and his Orchestre Afrisa International band wind up their song and a hush falls across the cavernous space.

The psychedelic images on the giant screen dissolve into the DayGlo orange of the current January 1998 issue of WIRED and its screaming “Change Is Good” headline. A figure with a mic steps forward on the stage. A spotlight hits her.

“Good evening!” the beautiful young woman in a Dolce & Gabbana party dress calls out. “I’m Jane Metcalfe, WIRED’s cofounder and president. And I wanted to welcome you—and congratulate you! You are the most powerful people on the planet today. Not the priests, not the pundits, not the politicians or the generals. You, the people creating and using digital technologies, are making a revolution that is whipping through our lives like a Bengali typhoon. And tonight this is the white-hot center of that revolution. Let the festivities begin!”

The crowd goes crazy in exuberant self-congratulation. Tabu Ley’s band fires up again. Bodies resume rubbing against one another. The grainy black-and-white image on the big screen behind the band is a progression of blindfolded heads kissing, some tentatively, some lustily.

On the edge of the dance floor, Carl finds himself in one of two lines approaching a big plywood box from opposite directions. When he gets to the front, to his discomfort he discovers that this is the “Kissing Box,” and the images of the people sticking their heads into the box and kissing are what’s being projected on the screen. But before he can object, he’s blindfolded and his bushy red head is guided into the hole on his side of the box.

He kisses anonymous lips in the dark, and the big club screen displays their immense image. Pent-up desire infuses dancing tongues gliding over smooth teeth as her lips press and pull his with an erotic intelligence he’s never experienced. Carl is lost, like this is his first kiss, like he’s never kissed before, tender and fierce simultaneously. Time stops, the sound outside stops, there are only lips, and the mint taste, and the dancing tongue sliding over his teeth and around his tongue, wrapping, teasing, he is getting lost, he could stay all night touching those lips, dancing with that tongue, until finally he can hear the voices outside screaming, OK, enough, our turn, and arms pulling at his shoulders.

Both kissers withdraw, remove their blindfolds, and are surprised to discover that they saw each other that afternoon—the lips Carl kissed were those of Danny Katz, the WIRED reporter he’d run into earlier in the Gnuhere reception area.

Red-faced, Danny hurriedly disappears into the crowd. Carl is giddy. It’s as if the digital revolution itself has just kissed him.

He tries to find her.

Go land that story. Overthrow the state. Get laid.

Danny ducks into the VJ booth where Steve in his salmon Lacoste shirt is mixing images on his laptop with a “Kill Your TV” sticker on it. What he’s projecting on the party walls at the moment is science fiction, sleek, outrageous. Clips from Star Wars, Star Trek, 2001, The Fifth Element, NASA rockets lifting off and rushing past the cameras on the gantry, astronauts walking goofily on the moon, the Space Shuttle blowing up into contrail devil’s horns. Other images include genetic engineering, manufacturing processes, robotics, space stations, and animation of nano-assemblers, before he elides into the infamous porno video of Pam Anderson giving head to Tommy Lee on the motorboat, etc. And then there are his own animations from his computer game in progress, The End of History.

“You look … confused,” Steve says, queuing the next video on his laptop while simultaneously passing out baggies and bindles to, and collecting money from, partygoers who keep appearing at the booth.

She blushes, embarrassed about kissing that young geek Carl, then becomes serious. “I was fired an hour ago.”

“Change is good.”

“What do you mean ‘good’?” Danny asks. “I love my job. I was on track to –”

Steve laughs at her. “You can’t tell which way the train is running by looking at the tracks.”

“Why do we keep saying ‘change is good’? Fuck WIRED and its social programming. Change is scary.”

“You’re a ghost driving a meat-coated skeleton made from stardust, what do you have to be scared of?”

Despite her unease, she has to laugh.

“Go out and do something,” he continues. “We’re all going to be dead soon enough anyway. That ‘story of our times’ you’re always blabbing about writing and winning a Pulitzer for—it could be out there on the dance floor right now.”

He improbably points at a frumpy middle-aged couple looking lost amid the revelers.

“Go land that story. Overthrow the state. Get laid.”

“You’re a big help,” she says, scanning the crowd from his aerie.

She spots Carl, who has now spotted her and is heading her way. She immediately ducks out of the booth, flees through the crowd, only to stumble across …

Three-letter government agency

“Get away from me!” yells Ben Tucker, the CEO of Gnuhere.

“Dude,” Jonny Satoh says. Jonny is a thirtyish Japanese-American with round wire-rim glasses, and he’s holding Ben’s arm. He’s smiling.

Danny rushes up and starts shooting with her WIRED digital video camera. She’s standing next to a silver-haired scarecrow with a beard, whose name, she will discover shortly, is Max Stirner.

“Still snitching for the FBI?” Ben yells louder, and yanks his arm away. His girlfriend, Nicole, is at his side. A crowd is gathering around them.

Behind Ben, one of Steve’s animations scrolls huge on the screen left to right:

It is the business of the future to be dangerous. —A. N. Whitehead

“Man, it’s time to let bygones be—” Jonny says.

“You sold out, you sold me out, you put me in jail.”

“You have only yourself to thank for going to jail, buddy,” Jonny says. “After all, it was all on you to release PGE into the wild.”

Jonny is alluding to Ben writing and then releasing Pretty Good Encryption to the net. PGE was Ben’s version of private key encryption, a sophisticated method of protecting data and communications that was used by governments and large corporations, and its export was heavily regulated. Anyone could use encryption to securely send data over the net—almost no understanding of how PGE worked in detail was needed.  The moment Ben put PGE on the net, it immediately went around the world. The NSA arrested him and charged him with unauthorized export of a weapon—cryptography.

“We broke encryption loose from government control in a big way,” Ben says.

Jonny laughs. “You’re accusing me of selling out? You, who’s chasing the dotcom fever to become a billionaire.”

“Maybe I just found a better way to fight that fight!” Ben screams.

People in the crowd are pointing at Ben. He’s a celebrity. He can’t go anywhere, this party included—perhaps this party especially—without attracting attention.

Jonny is still smiling, arms raised slightly from his sides, palms up as if showing he’s unarmed.

“Anger might not be a good place to come from”—Jonny echoes Ben’s words to Danny earlier in the day—“if you want to be a revolutionary.”

“And what would be?” Ben asks sarcastically.


Ben actually stops to consider that, because it’s precisely what he told Danny in their contentious interview in his office this afternoon.

“That’s better,” Jonny says, holding out his hand. “We were close once. And we may have different perspectives. At least we don’t have to be enemies.”

Ben finally accepts Jonny’s outstretched hand.

Another hand enters the frame. The hand of the silver-haired scarecrow standing next to Danny. He covers the lens of her camera.

She recoils and tries to withdraw the camera from his grasp. He shakes his head disapprovingly and keeps his hand firmly clamped over the lens.

Jonny keeps his grip on Ben’s hand, leans in close, and whispers so that others can’t hear, “I don’t work for the FBI—I work for another three-letter agency. We need your help with PGE.”

“When hell freezes over,” Ben says, trying to pull his hand away.

Nicole can see the long-suppressed fury at Jonny rippling under the skin of Ben’s face. He’s about to lose control. Nicole pulls at Ben. “You’re making a scene.”

“It’s time to get over your naive fantasy about overthrowing our ‘evil’ government through technology,” Jonny says. “The world is different today. There’re some really bad actors using your program who really mean to hurt us.”

“Show me how the government’s ability to violate the privacy of any citizen has prevented a single major disaster. They’re abridging the freedom of all citizens—to defend us against a bogeyman that they won’t explain.”

“Privacy is quite dead,” Jonny says.

“The universe believes in encryption,” Ben says. “It is easier to encrypt information than it is to decrypt it.”

“That people still worship at its corpse doesn’t change that.”

“I am never going to work for a three-letter government agency,” Ben says angrily, leaning in close to Jonny.

“Don’t take the bait, Ben,” Nicole implores as she pulls more insistently on his arm.

With eerie confidence, Jonny whispers in Ben’s ear, “One way or another you’re ours. You just don’t know it yet.”

Ben shakes off Nicole and angrily pushes Jonny in the chest.

Jonny immediately pushes back, and Ben squares up against him.

Nicole surprises herself by reflexively stepping between the two of them to defend Ben from Jonny, and from himself.

“Get out of my way,” Jonny says as he tries reaching around her to get at Ben.

“Go find another idealist to betray,” Nicole says, her voice quivering with anger and anxiety at drawing the crowd’s attention.

Jonny pulls up as if smacked—then actually does smack Nicole in the face.

The crowd inhales. She starts as if to smack him back but stops, leaving his aggression unanswered, to expose him to the gapers as the asshole he is.

Instead, Ben launches himself at Jonny, and Jonny at Ben, but somehow Nicole stands her ground between them.

She stares icily at Jonny.

“At least he didn’t betray his best friend,” she says with contempt. “He stood up for what he believed in.”

Jonny shakes his head in disgust.

“Just leave him alone!” Nicole yells with a fierce protectiveness for Ben she didn’t know she had.

Jonny laughs at her.

“Come on, Nicole.” Now it’s Ben who is doing the pulling as he drags her away. “Let’s find someone else to save me from.”

Nicole pulls back her arm but allows herself to be steered away.

Ben glares back at the smiling Jonny. You’re mine, Jonny mouths.

The path of revolution isn’t a straight line

“What do you think you’re doing?” Danny says to Max Stirner, the silver-haired scarecrow standing next to her, as she yanks her camera free.

“Private things should remain private,” he replies in a thick German accent.

“What’s it to you?” Danny asks.

“Let’s just say I’m a former comrade in Chaos.”

“The German hacker group?” Danny asks.

“We are cypherpunks,” Max says.


“No, cypherpunks. The word has a precise meaning,” Max says. “Cypherpunks are dedicated to creating anonymous systems. We want to build a world where an individual’s informational footprints—everything from an opinion on abortion to the medical record of an actual abortion—can be traced only if the individual chooses to reveal them. We use cryptography, anonymous mail-forwarding systems, and electronic money to do that.”

“The government would say there are already laws to guarantee privacy.”

“I want a guarantee with physics and mathematics, not laws.” Max regards her suspiciously. “And you, what is your interest?”

She holds up the camera with its WIRED sticker.

“I’m Danny Katz. And you?”

“Max Stirner.”

“There’s something not right about what we just saw,” she says.

“The less we know, the more we suspect,” Max says.

“How do we know this isn’t misdirection? That Ben isn’t already working with Jonny for some ‘three-letter agency’?”

“Because Jonny sent Ben to prison.”

“Why? The law had never been used for cryptography before.”

“Because PGE is so powerful, the government wanted to make an example of him.”

“Funny, though. Ben got what he wanted—his reputation as an outlaw hacker has served him well. It’s like his releasing PGE was a stunt.”

“The spooks don’t think PGE is a stunt. Putting industrial-strength encryption in everyone’s hands is a nightmare to them. Remember, he was tried for exporting ammunition without a license. Takes hundreds of years to decrypt PGE, even a simple email, even with NSA supercomputers.”

“How do we know the NSA didn’t get Ben to put a back door in it?”

“I know Ben. He wouldn’t.”

“So you’re OK with him becoming a billionaire on the back of his reputation as a rebel hacker?”

“The path of revolution isn’t a straight line. And we’re literally in a race between our ability to build and deploy technology and their ability to build and deploy laws and treaties. Maybe it’s helpful to have someone on our side with money and power and technology.”

Danny tilts her head at him and narrows her eyes. “You know more than you’re letting on.”

But before Max can answer, the middle-aged couple Steve pointed out from the VJ booth approach her and tug on her arm.

Danny wheels to confront them, then stops. Frumpily dressed, ill at ease, they look completely out of place among the hip crowd around them.

The housewife-looking woman introduces herself and her husband, in horn-rimmed glasses, as the Wozniaks. “You’ve got to help us,” she tells Danny. She is almost hysterical. “They’re after us.”

“You are the only person who can help us,” says her worried husband.

Danny is taken aback by the paranoia shimmering off them like heat off summer blacktop.

When Danny looks back for Max, all that’s left is a retinal afterimage.

Flirting in plain sight

As he moves through the party, people continually call out to Ben, and women flirt boldly. Tall and lithe, with arresting gray eyes, Nicole is a magnet for guys’ naked lust. Together, they make a striking couple.

Ben stops to say hello to Andy Bechtolsheim. Andy is a Silicon Valley legend. While a doctoral student in electrical engineering at Stanford, he designed a powerful PC with built-in networking he called the SUN workstation, after the Stanford University Network. In 1982 he joined with two Stanford Business School graduates, Scott McNeely and Vinod Khosla, to write the business plan for what became one of Silicon Valley’s most famous hardware startups, Sun Microsystems. Andy was employee number one. By the time he left in 1995 to start Granite Systems, he was a billionaire. When Cisco bought Granite two years later before it had even launched a product, the sale added another $200 million to his net worth. So he co-founded HighBAR Ventures to do angel investments. Gnuhere was its first.

“All good?” Andy asks.

“Couldn’t be better,” Ben tells him.

“Need any more money, you know who to call,” Andy says.

Ben laughs. It’s their standing joke. Both of them know that Gnuhere long ago graduated past angel funding.

“Andy, we’re doing so good,” Ben says, clapping him on the back. “Pretty soon you won’t be asking me if I’ll take more of your money; you’re going to ask me for money and to join your fund. Change the name to HighBARB.”

Enter the bankers, stage right. Morgan Goldman’s Brad Terzo and Maria Martin are celebrities in their own right. They met with Ben this afternoon so Ben could sign their letter of intent to manage Gnuhere’s IPO. Based in the Valley, Brad’s internet startup practice has done the most IPOs, raising the most money at the best valuations since the sector got hot after the Netscape IPO in 1995. And Maria has been christened “Queen of the Internet” ever since her research for the bank earlier in the decade had broken the space wide open.

Now she’s decided to make the leap over the Chinese wall and leave research to join the banking side. This afternoon at Gnuhere was her first call with Brad. It started well enough, with her demonstrating how Morgan Goldman managing the IPO would turn Ben into a billionaire. It didn’t hurt that there was an undercurrent of sexual attraction between the two of them. But the meeting ended badly, with Maria claiming she needed to do her own due diligence on Gnuhere, even though Brad had been doing his for months. Ben refused to sign the letter of intent.

Not only was Ben unhappy, so was Brad, who had been pressured by the bank’s partners in New York to allow her to join his team. At a ceremony earlier in the evening, where Maria collected the Society of Equity Analysts’ Achievement Award for 1998, Brad told her that if she didn’t straighten up, he was going to turn her “career into a smoking pile of rubble—and then make the rubble bounce.” Recognizing her move to the better-paid side of the business was in jeopardy, Maria apologized and promised it wouldn’t happen again.

Now Brad and Maria, who still has her trophy in her hand, bump into Ben and Nicole.

“I hope you didn’t get any false impressions today,” Maria tells Ben, her voice frankly affectionate as she gives a quick flick of her eyes to Brad to be sure he registers that she’s a team player. Brad nods to her approvingly.

Then Maria serves Ben a playful stare.

“You understand”—Ben smiles at her and they lock eyes—“we can’t be too careful. We’ve waited our entire lives for this moment.”

Nicole looks at them with her head tilted. Could they actually be flirting in front of her?

“Just to be clear”—Maria smiles back at him; he has this magnetism made even more delicious by the obvious conflict of interest—“I want to see this deal happen as much as you do. I want Morgan Goldman to be your bank. I intend do everything I possibly can to make that happen. And I want you to enjoy every minute. All we need is trust, and a little bit of pixie dust.”

Yes, they are shamelessly flirting.

“And just to be clear,” Ben says, now that he knows they want him as much as he wants them, “I’d never lie about Gnuhere, because I have nothing to hide.”

In flirting with Maria, Ben isn’t looking to ditch Nicole. But given the state of their relationship, some part of him is feeling that maybe Maria is an upgrade. Never know unless you try?

He’s playing with the thought of Maria, wondering what she feels like, how her nipples perk, whether she has an outie or an innie. Does she shave?

On Maria’s part, normally she doesn’t indulge in this kind stuff; she’s phenomenally disciplined. But still, he’s charismatic, she has to admit. If she rode him, would he last long enough?

“And I’d never lie about Gnuhere either,” Maria jokes, and everyone laughs. But her eyes are serious, appraising Ben.

Even as Nicole glares at both of them, Ben’s callous indifference to her feelings isn’t new. Her inability to suppress her mounting rage is, to her, simultaneously surprising, thrilling, and scary.

Put the puck on the ice

“Hi,” Carl says to Steve up in his VJ booth.

“If it isn’t my redneck homey,” Steve says as he mixes a Teletubbies video into solar flares into Pam Anderson on his laptop.

“Do you believe in love at first sight? Or kiss?”

“No, I just believe in me. Yoko and me.”


“Gnuhere it,” Steve tells him sarcastically, but with a broad grin. Carl wasn’t the only one who found that grin disconcerting. Steve’s grin made it seem that regardless of what words came out of his mouth, he really wasn’t being mean, he was just sort of playing a harmless game for his own amusement, pushing buttons to see which would throw you off balance. But wasn’t that in itself mean?

“You’re so cynical—do you believe in anything?” Carl asks.

“Forget about love,” Steve says. “There’s a whole room of fertile women out there. Ask them and they’ll tell you they’re all looking for love. But they’ll settle for lust.” He sweeps his arm at the river of youth and anticipation. “See that nymph over there?” He points to a particularly attractive girl in the crowd. “Try your luck. Put the puck on the ice.”

“Been thinking about your game. You’re gonna have cheats, right? You know, access to all weapons, unlimited ammo, unlimited money. And my favorite, a one-minute do-over—so if you die, you can go back one minute before you die and correct what you did.”

“The real world doesn’t have cheats; why should games?”

“The real world doesn’t have cheats?” Carl snorts. “People are cheating all the time. Lucas cheated when he had Greedo shooting at Han.”

“Fucking right, Han shot first.”

“And you know what would be really cool? How about real interactivity, not just fake in-game interactivity? What if what you do in the game makes something happen in meatspace?”

Cheats for the real world. Steve grins. I like that. Even if the kid is a dork.

Then Carl remembers why he’s here. “You wouldn’t know where I can score some acid?”

“You tried E, a rube like you?” Steve asks, reaching into his backpack.

“Of course I’ve tried ecstasy,” Carl tells him. “Paris, Kentucky, may not be San Francisco, but we still have E. I’m not talking about E, I’m talking about acid.”

“Acid, like LSD? You tripped?”

“What do I look like,” Carl asks, “a virgin?”


“OK, say I haven’t –”

“I don’t care, blow your brains out.” Steve holds out his hand with a Mickey Mouse head grinning off a small red blotter tab. “Two hundred fifty mics pure lysergic acid. Ten bucks.”

“And give me a tab of E too.”

“Sure. You’re not stoned enough if you can lie on the floor without holding on.”

Are you a real reporter, or do you just play one on TV?

The paranoid middle-aged couple has Danny boxed in.

“Aren’t you the one on the WIRED show on MSNBC always going on about fighting the establishment?” says Mr. Wozniak as he peers around nervously.

“We have a story for you,” Mrs. Wozniak says. “But you have to be brave.”

“We’re in hiding,” the man says conspiratorially.

“In plain sight?” Danny asks.

“We don’t sleep two nights in the same bed,” he says.

“Are you brave enough?” the woman repeats.

“Wait,” Danny says. Are these guys nuts? “Back up. What are you going on about?”

“Three years ago, the Justice Department gave us a contract to write a software program.”

“It tracks legal cases.”

“It’s called CasePro.”

“We had a small company, so we had to hire 20 more programmers. We wrote the code.”

“Worked round the clock for two years.”

“Submitted it to Justice a year ago.”

Related Stories

  • Klint Finley

    Here’s the Real Way to Get Internet to the Next 4 Billion People

  • Steven Levy

    The Internet Isn’t the Wild Wild West Anymore. It’s Westworld.

  • Davey Alba

    Mary Meeker: The Internet’s Growth Is Actually Slowing Down

“And they didn’t pay us the last installment on the contract.”

“The biggest installment.”

“This is news?” Danny spots Maria with her banker posse, carrying her glittering statue. People react to her as if she’s a celebrity. “It’s the government,” Danny says distractedly. “It’s a payment glitch.”

“They won’t talk to us.”

“They say we were never contractors.”

“They’ve driven us into bankruptcy.”

“We’ve lost everything.”

“Our lawyer thinks it’s a secret National Security Agency project using the Justice Department as cover.”

“Former Attorney General Richardson wrote an op-ed about us in The New York Times.”

Danny is plainly skeptical, even annoyed, still tracking Maria with her eyes. “This sounds like a story for the –”

“We tried the mainstream media.”

“They don’t understand the software angle.”

“The Village Voice had a reporter researching the story. They say he committed suicide in a motel room. Right.”

“The software is incredibly powerful.”

“And no one is interested in challenging Attorney General Janet Reno.”

“Been watching too many X-Files, have we?” Danny asks archly.

“Are you a real reporter?” the man asks, “or do you just play one on TV?”

“This story is so big you could win a Pulitzer Prize.”

“OK, don’t believe us,” the wife says.

“But maybe you’ll believe this guy,” the husband tells Danny, peering around nervously as he thrusts a card into her hand.

“Yeah, believe the opposite of what he says,” the wife says. “He’s part of the conspiracy.”

“Yeah?” Danny asks distractedly. “What does your software do, again?”

“They told us they wanted it to track cases, but we think they want to use it to spy on American citizens.”

That gets Danny’s attention. But before she can continue, Maria bursts in and gives Danny a big hug.

When Danny turns back to the couple, they’re gone. The blessing and curse of big parties—you lose people in the crowd.

She stares down at the card they pressed into her hand. It has an FBI crest on it, above “Agent John Smith,” with a San Francisco address, and a phone number on the back.

This man buys and sells revolutionaries

Carl looks at the two hits in his hand—the round yellow ecstasy pill with the winking smiley face and the red paper LSD tab with Mickey Mouse on it. Easy choice. He pops the tab of LSD into his mouth, wanders around waiting for it to take effect. In due course, he finds himself at the bar, where he orders a beer. Next to him a discussion is taking place that catches his attention.

“Digital revolution?” a gaunt, austere guy his buddies have been calling The Skeptic is saying. “No such thing.”

“What do you mean?” Carl butts in. He can’t help himself; the guy sounds arrogant and looks like a poseur in his leather jacket. “Information is power.”

The coterie around The Skeptic laugh at Carl and regard him with derision, the next bull entering the ring.

“Yeah sure.” The Skeptic wheels slowly to address him. “Tell it to the librarian.”

“The internet is the most amazing revolution in history,” Carl replies. “Maybe since fire.”

“Oh, we have a true believer here.” The Skeptic eyes Carl with the detachment he would reserve for a lobster he’s about to boil for dinner.

“Guilty as charged. I‘m a believer in leveling the playing field.”

“When I think of a level playing field, I think of a nice site for an office building,” The Skeptic laughs. “You must be one of those overpaid programmers.”

Carl turns to face The Skeptic. “I’m about to be hired as a coder at Gnuhere. We’re the people who’re changing the world.”

“Changing the world? You guys can’t even change your underpants. You’re a myth built around a social disease.”

Carl flashes anger. The Skeptic has touched a nerve.

“What do coders use for birth control?” The Skeptic asks, goading Carl. “Their personality.”

“What do you know about the Digital Revolution, anyway?” Carl says.

“Do you know who you’re talking to?” one of The Skeptic’s cronies tells Carl.

“This man buys and sells ‘revolutionaries’ like you,” another snorts.

“I know enough not to confuse making money,” The Skeptic tells Carl, “with the invention of fire.”

Carl’s acid is finally kicking in, and the colors of the party are flowing around him like thick oil, the sound pressing on his temples like warm hands. He leans into the Skeptic, really checks him out, can even see the pores on his nose. The aura pulsing off him is as dark and full of malignant power and menace as a Kentucky tornado blotting out the summer sun as it heads toward town. He looks into The Skeptic’s eyes, really dives in—and finds casual contempt layered over a swirling vortex of pure evil. Is this what tripping on acid is like? Where’s the euphoria?

He screams at the Skeptic: “You’re like the jerks I went to school with—I killed them all!”

Then the screen behind him goes black-and-white with images of Nazi soldiers standing in endless, ordered ranks at the vast stadium in Nuremberg from Leni Riefenstahl’s movie Triumph of the Will. Godwin’s law, Carl thinks.

The Skeptic and his coterie laugh at Carl before calmly resuming their banter as if he doesn’t exist.

That was college, a long time ago

“Looked like you needed rescuing,” Maria tells Danny.

Danny stares at the banker with naked affection.

“It’s great to see you, Maria. It’s been too long. Still chasing the American dream?”

“Well, I got the trophy”– she waves it joyfully—“and I’ve got the fancy apartments in New York and Nob Hill, about to buy a house in Woodside, and I’ve got the corporate jet on call, and I’ve got the CEO of IBM on speed dial, and I’m probably going to make partner next year …”

“Too much ain’t enough?”

“My mother told me my first word was ‘more.’” Maria’s eyes are scanning the room as if looking for the next encounter. Her gaze stops to appraise Steve in the VJ booth. He looks familiar—and attractive.

“I guess because you’re a woman”—Danny’s voice has a biting edge—“you have to work twice as hard to be a prick.”

Maria’s attention returns to Danny. “Same old self-righteous Danny.” Now Maria’s voice has an edge too. “Why is it that when a man is ambitious it’s a virtue, and when a woman’s ambitious it’s a vice?”

“Am I hitting a nerve here?”

Their shoulders square up; their body language shifts to confrontation.

“You’re suggesting I made some kind of choice,” Maria says.

“Between ambition and love,” Danny replies pointedly, her eyes locked on Maria, obviously trying to raise issues from their earlier relationship.

“Cliché much?”

“But why should we have to choose?” Danny continues.

“You tell me.” Maria leans into Danny. “You were the philosophy major.”

“Maybe we don’t,” Danny replies softly, a wry smile on her lips now, the tension broken. “How’s your love life?”

Maria chooses to not to answer. She’s pretty much asexual these days, no time for a private life, living mostly in planes and hotels.

“You know I’m still in love with you,” Danny says.

“Stop,” Maria says with finality, shutting off Danny’s aggressiveness. When Danny was at Barnard and she was at the Columbia B-school, they bumped into each other on the stairs in the stacks of Butler Library and had a fling. She eases back from her. “That was a long time ago. And it was never love. Love is based on knowledge. At best it was infatuation, which is based on ignorance. You never knew me. You still don’t.”

Red phial yellow phial


Hacker is staring intently at the monitor above his workbench at the Computer Emporium. Or more precisely, at the webcam image of the bedroom where Beatrix was abducted by the alien.

“This is crazy,” Hacker is saying. Hacker looks an awful lot like Carl, the coder kid from Kentucky.

“Ya gotta go,” his Emporium boss with the big head of unruly white hair is telling him.

“How am I supposed to go?” Hacker tells Boss. “She’s in a computer monitor.”

Boss holds out his palm; in it are two phials, red and yellow.

“Have you been studying Gödel, Escher, Bach?” Hacker asks.

“Take the red one,” Boss tells Hacker, “and you start your adventure. Take the yellow one and you stay stuck in your boring, meaningless life. Only you’ll think it’s the most beautiful boring life you’ve ever lived.”

Without hesitation, Hacker grabs the red phial.

“First, here’s your invisibility cloak.” Boss hands him a small cloth package. “Then you’ll need this magic gun.” Boss holds out an automatic pistol. “Never runs out of its special ammo.”

Hacker reaches for the pistol.

Boss holds it out of his grasp. “You have a terrible temper. Fight it. Don’t just go out and kill all the assholes because they piss you off.”

Hacker reaches for the pistol.

Boss holds it out of his grasp again. “Surf the disruption. Everything is going to be new all the time. Don’t be scared by the time and space discontinuities—just keep moving forward, always forward. No matter how weird it gets, stay focused. The only picture you should pay attention to is the big picture.”

“Save Beatrix? Humanity? The universe?”

“The aliens are going to take Beatrix to the castle. You need to intercept them before they get to the tower.”

Hacker reaches for the pistol.

Boss holds it out of his grasp again. “And—this is real important—even though you have to keep moving forward, when it’s time, don’t forget to leave yourself behind: Change is good.”

Hacker reaches for the pistol again—and this time Boss gives it to him.

Boss smiles benignly at Hacker.

Hacker swallows the contents of the red phial.

And immediately transmogrifies into the helmeted, armored, Halo-esque superhero Chief Rock, now inside the old black-and-white CRT monitor on Hacker’s workbench. Across the front of his helmet are the words “We Fight to Win!”

Boss materializes in the game beside him. He’s now a wizard with a long white beard badly glued over his scraggly stubble, his unlit stogie still in his mouth and a conical wizard hat perched on his big head.

They both stand in Beatrix’s bedroom in front of her shocked and naked lover, her fiancé’s best friend.

This is a cutscene from Steve’s computer game-in-progress called The End of History—which is exactly what he’ s VJing onto the walls of the WIRED party.

Steve’s gameplay play

Three guys who look barely 20 hesitantly approach Steve up in the VJ booth.

“Can we talk to you?” one asks timidly.

“E is $10 a pure 100-milligram dose. Got some great blow—the stuff that killed Belushi. Humboldt weed …”

“We want to know who’s doing the animations,” they interrupt him, embarrassed.

Steve looks at them skeptically.

“We’re fans,” they hasten to add.

“I know him,” Steve replies blandly.

“What’s his name?”

“You wouldn’t recognize it,” Steve says.

“Do you know whether he works on games?” one of the guys says.

“Would you give him something for us?” another says.

“Who’re you?” Steve asks.

“We’re Absolutely Nominal Studios,” one says.

“Never heard of it.”

“We wrote a 3-D game engine.”

“Dime a dozen,” Steve says.

“We know. But this one is better than the Quake engine.”

“Your hallucination is duly noted.”

“No kidding. It’s faster, with better 3-D rendering,” one of the guys says.

“Yeah, it’s super-fast, hyper-efficient, and networkable,” the other says.

“Makes for just dope gameplay,” the first says.

“Blows all the others out of the water.”

Steve eyes them slyly. Can he use this for the game he’s making?

“We’d like the guy who did the animations to come work for our game company,” one says.

“Sort of like Lasseter at Pixar,” another says.

They hold out a CD case with a computer-generated character on the cover and the words “AbNom Game Engine.”

“I’ll pass it along,” Steve says, tossing it onto the table as he focuses on his laptop.

They hesitantly back out of the booth.

Steve steals a glance at the shiny disc.

The web dream

For Carl, his life is becoming engulfed by the surrounding spectacle coming at him at 126 to 189 beats per minute. Smoke machines spew fog cut by lasers streaking in a plane above his head like glowing red wire. Intellabeam spots pulse lavender and magenta, swiveling now to DJ Dmitry’s mix caroming off the concrete walls, floors, and ceilings. High-speed strobes freeze the sexual energy of the glazed, sweaty, ecstatic dancers rubbing bodies, changing personas, open to anything as they swirl in the flow. The techno cocoon is like the internet itself—no age, no gender, no time.

Smiling faces loom every which way he turns in moon-eyed wonder, his bushy hair a red halo around his head. The party grows into a wondrous dichotomy: the soft sensuousness of the dancers hugging, touching, and indulging in blatant displays of E-driven affection—as contrasted with the primitive, fearful brutalism exploding in another room nearby, where two huge 10-foot-tall Survival Research Labs (aka SRL) battle-robots are methodically demolishing each other with utterly inhuman indifference.

The verbal soundtrack weaving through the music is a cacophony of fast-talk stepping over itself:

“What good is being a pioneer if you can’t make money while you’re young enough to baste in the fat of life?”

“Of course we want to sell out. It’s time to turn this into someone else’s headache.”

“The web is a place that echoes with the footfalls of rent-me capitalists making their hasty exits.”

“What’s the difference between a dead weasel in the road and a dead venture capitalist in the road? There are skid marks in front of the weasel.”

“Digital haves and have-nots? Not. Only have-nows and have-laters.”

“The web dream is what smart kids across America are dreaming.”

“The web is a place you go without ever getting anywhere.”

“The only way to rationalize these valuations is to believe a greater fool will come along and be willing to pay more.”

“As far as I’m concerned, the Digital Revolution is a big fat waste of electricity.”

Carl is swimming through a sea of buzzwords: new economy, killer apps, embedded systems, netheads, bellheads, information infrastructure, corporate repositioning, dweebspeak, retail pet food sales, smart cards, cyberspace, network latency, digital underground, clipperchip, vaporware, searchbot, digital watermark, key escrow, immersive technology, cypherpunk, the von Neumann bottleneck, gigabit Ethernet, consensual marketing, gigahertz, technocult, algorithmic trading, hedge funds, valuation, living on internet time, HDTV, LCDs, blamestorming, null convention logic, transformational experience, Mother Nature on a motherboard, genetic algorithms, Silicon Alley, friction-free commerce, international cryptography framework, copyright compliance officer, smartifacts, PointCast, push media, one-to-many media, Manifesto of the Digital Revolution …

Carl is making soulful eye contact with beautiful girls—but they quickly stare away, as if embarrassed to see right through him to the Paris, Kentucky, hayseed in his soul.

Carl comes across the “nymph” Steve pointed out from his VJ booth. In Carl’s blissful state, she’s the girl of his dreams, angelic and sensual.

“Hey, you wanna, like, dance?” he asks her with joyful longing.

She looks him over from top to bottom to the backpack with the skateboard strapped to it that he’s still lugging around, smiles teasingly—and decides against.

“I’m not your type,” she tells him.

“What’s my type?” he asks.

“I’m gay, OK?” she tells him, giggles to her girlfriend, and walks away.

“Oh,” Carl says dejectedly. And watches her immediately begin flirting with some cute guy.

Crack! A white ball hits a number 1 yellow on green felt in the poolroom, and Carl’s mind goes caroming around the table.

When you gotta go, you gotta go

Maria has to pee. There’s a long line outside the women’s, none outside the men’s. She pushes through the door to the men’s.

Even history seems malleable

“What was that back there?” Nicole says.

“What was what?”

“With that Maria woman?”

“Nothing, baby. You being paranoid again?”

“You being a jerk again? Stop lying to me. This open relationship thing is really not working for me.”

“Are you still upset about the gallery?” Nicole was rejected this afternoon by hip XYZ Gallery for a show of her nude watercolors. After two years of work, she is vibrating between rage and despair. And their relationship is a convenient target.

“I’m upset about where we find ourselves. About you insulting me to my face with your women as if I’m not there. About you wanting to fuck me in the ass instead of making me come!”

“Wait, whoa, there’s more going on here.”

Nicole sighs. “Maybe it has to do with how we always help each other achieve our goals. But now you’re pulling ahead, and I’m being left behind.”

“What am I supposed to do? Drop everything to figure out how to help your career? I’m only going to get one chance to do this,” Ben says, trying to reason with her. “I have to focus on the IPO now—”

“So you can grow an even bigger ego?”

What is she bargaining for? She has to see he needs to keep his priorities straight. “Nicole, most people are the prisoners of fate. Yet there are these moments when even history seems malleable. This is one of them. I have to take advantage of this.”

“To me, it feels more like our relationship is a prisoner of your fate.”

“Forget my fate. I have the fate of 300 Gnuhere employees, who are also owners, in my hands. They’ve put their hearts and souls into what we’ve built together. They trust me to do the right thing for them and their families. They’re about to see their dreams fulfilled. I can’t let them down now.”

Both of them can feel big wheels turning under them, as if the room is starting to tilt. Ben doesn’t want to face it. Nicole wants to force it.

“Nicole, can we talk about this later? This isn’t the time or the –”

“When later? This can’t wait. What’s wrong with talking about serious stuff now?”

“Because I need to take a leak,” he says, and escapes into the men’s room they’re passing.

Bring some meaning into your life

Nicole stands outside the men’s room, staring blankly at the door, then remembers the Nikon digital camera that she’s been carrying around in her purse since Ben gave it to her. He said he got it from Nikon in exchange for advertising. She pulls it out.

Steve comes by in his salmon Lacoste polo shirt.

“Put it between your legs,” he tells her.

“Pardon me?” Nicole asks.

“Stuff it up your skirt, press the shutter, a good-looking woman like you.” Steve smiles his guildeless, megawatt Chris Rock smile at her.

“Is this your idea of picking up girls?” she asks archly.

“No, I’m telling you how to bring some meaning into your life,” he says, and strides away.

Our little secret

Ben takes the urinal next to Gnuhere’s Asian CFO, Jeff Tsai.

“We have a problem,” Jeff says, concern in his voice.

“What kind of problem?”

“A genuine crisis. You remember the big Amazon ad buy? It was scheduled to start next week? Just got a text from sales—they’ve decided to postpone it until next quarter. Leaves us a major cash hole.”

“Net net, what’s the delta?”

“At current burn rates, we’re out of money in six weeks. Empty.”

“I thought we had six months?”

“Report I got late this afternoon shows collections deteriorating. Lot of bad pays with these dotcom startups.”

“Can we accelerate the IPO?”

“If our finances look bad, Morgan Goldman’s not going to want to do the IPO in the first place.”

He flushes the urinal.

“Can our VC do a bridge loan? He’s here tonight, isn’t he?” Ben asks, as if he didn’t shoot Jeff down earlier this afternoon for suggesting they talk to their VC. He doesn’t want to go back to him now for more money. He doesn’t need his insufferable told-you-so’s; and pre-IPO venture money at this point would certainly be more costly than the equity funding to come. But he needs to keep moving forward to stay in the race with Yahoo and Lycos and the rest of them. And more expensive money from Paul Plymouth is still worth it to keep the pedal to the metal and build value faster. Ben prides himself on his ability to surf that risk/reward edge.

“I saw him at the bar,” Jeff says.

“Let’s go find him.”

“Meanwhile, we don’t talk about this with anyone,” Jeff says seriously on his way out. “Especially don’t want to spook the Morgan Goldman people.”

“No kidding,” Ben says, zipping up and following Jeff out. “We really need them to do our IPO before –”

The door shuts

A toilet flushes and Maria steps out of a stall, a knowing, excited look on her face, a wolf that’s picked up the scent of prey.

Nicole snaps

Ben exits the men’s room and rushes past Nicole.

Then Maria emerges—and Nicole’s face clenches. She turns to follow Ben.

“Hey, wait up!” she calls out to him.

“Something’s come up,” Ben says as he makes for the bar.

“We need to talk.” She chases after him.

“Later,” Ben says.

“It’s always ‘later,’ Ben. Which is another way of saying never.” Her voice is rising. “Which is another way of saying I come last.” It’s all becoming too much.

Ben stays focused and keeps following Jeff to the bar.

She catches up, grabs his arm, and spins him around. “You can’t walk away from me. You can’t ignore me. You are killing us.”

People stop and look at them.

“Nicole, please, this is not my fault,” Ben tells her calmly as they approach the bar, uncomfortable with the attention she is attracting.

“I want to talk now!” Nicole screams at Ben.

“Now’s not the time, Nicole,” Ben says, still calm, as if he can find a way to thread the needle through Nicole’s fragile emotional state and his need to stay focused on his immediate mission of talking to his VC.

But it’s too late for that.

“Then fuck you!” she screams at the top of her lungs, and stomps away, almost tripping over Carl, who is wandering by with big eyes. “And I’m glad I never masturbated for you!”

The crowd stares.

Then Nicole gets an idea and grabs Carl’s arm.

“You want a date tonight?” she suggestively asks the startled Carl, grabbing his hand and leading him away.

“Do you ever think we’re all living inside the holodeck?” Carl asks Nicole. “That this is all just a big computer game simulation?”

Ben bursts out laughing. Carl is still carrying his backpack and skateboard.

Nicole strides back and can’t contain herself. She stabs her stiletto heel into Ben’s foot. Then stomps away.

“What about our date?” Carl says plaintively.

Into the streets of the city


The Hacker/Chief Rock materializes in Beatrix’s bedroom with Boss/Wizard.Beatrix’s fiancé’s best friend, the one who had been porking her, is rattled by this new intrusion. He feebly tries to cover his nakedness.

“Who took her?” Chief Rock yells frantically at her fiancé’s best friend.

“Alien death cult—wants to take over the earth!” the fiancé’s best friend cries abjectly.

“Where are they taking her?” Chief Rock says.

“To the drop zone in the castle. Their mother ship is coming to pick her up.”

“Why her?” Chief Rock screams at him.

“She’s the chosen one!” he cries even more abjectly. “They want to use her as some kind of breeder.”

“You’re lying!” Chief Rock yells.

“Why would I lie?” the fiancé’s best friend cries abjectly some more.

“Because you’re an alien,” Chief Rock replies, ripping the head off the fiancé’s best friend with his bare hands to reveal a two-headed alien inside. Then he rips the two heads off.

“Always important to pick stuff up,” Boss/Wizard says. “You never know when you might need it.”

Chief Rock scans the room, then grabs the money off the dresser. The money “Bing!”s and flashes as he grabs it.

He runs out the same door that the armor-clad alien warrior took Beatrix through—and is immediately thrust into the first-person-shooter computer game The End of History, where he is pursuing the alien and Beatrix into the dark streets outside the club in San Francisco.

Which is what’s on the screens of the WIRED party.

I’m thinking that might not be enough right now

Ben limps to the bar and to the gaunt Paul Plymouth, aka The Skeptic, with whom Carl had been debating the Digital Revolution earlier. Jeff is already huddling with the leather-jacketed Plymouth.

Andy Bechtolsheim may have been the first investor to put money into Gnuhere, but Paul Plymouth and his Valley Venture Partners were the first to put up serious money—initially $10 million, now grown to $30 million in a series of subsequent rounds. Ben remembers the feeling of relief when, after suffering literally hundreds of rejections, Plymouth agreed to fund his plan. “I want to invest in your dreams” is how Plymouth told him. The negotiations on the investment contract were arduous, with Plymouth fighting for every advantage. But when they were over, documents signed, and the money in the bank, Plymouth shook Ben’s hand and told him affably, “Now that we’re on the same side of the table, you should be happy that I’m going to fight for you just as hard.”

“We have a timing issue,” Jeff says now. “Amazon had a big contract starting Monday that they’ve unexpectedly postponed until next quarter.”

“Always ‘unexpectedly,’” Plymouth says. He’s grinning at the scene between Ben and Nicole he just witnessed. He looks back at Jeff. “Let me guess. Now you don’t have enough cash to get to the IPO?”

Jeff nods unhappily. “We have six weeks.”

“Didn’t I tell you your spending was out of control? That this IPO was premature?” Plymouth asks. “That you guys weren’t ready?”

Ben watches as Nicole stomps away, seething. She makes a beeline toward the nearest attractive guy who doesn’t appear attached.

“Had enough networking?” she asks the guy, whose name is Seth.

“Depends who you came to connect with,” Seth replies, amused.

She conspicuously slips her arm through his, smiles pointedly back at Ben as if to say, “Take that, asshole,” and heads away.

Ben moves reflexively toward Nicole as she picks up the handsome guy, then halts.

“Focus, Ben,” Plymouth tells him with a facsimile of concern. “You’re at a stage in the game where your focus must be complete.”

Ben tries, but his attention keeps being drawn to Nicole as she moves with Seth through the crowd toward the exit.

“It’s in your interest to give us the bridge,” Jeff says to Plymouth. “Your fund has already put in $30 million.”

“Don’t remind me,” Plymouth laughs.

“What’s another million to get to a $3 billion payday six months from now?”

“You talk as though that ‘payday’ is a sure thing,” Plymouth says.

“Morgan Goldman is the best investment bank in the world,” Jeff says.

“Oh, then it’s a done deal?”

“We have a letter of intent,” Jeff says.

“Jeff, I’m going to let you in on something: IPOs fail. If you even get to an IPO. Who knows what else pops out of your clown car between now and then?”

Behind them, in a room visible through the glass wall, SRL’s huge battle-robots are swinging at each other. They stagger … then recover to swing again.

“Why so negative on Gnuhere?” Jeff asks.

“I’m not negative. But I have been saying all along that you guys are out of control. Six weeks’ cash is the very definition of out of control.”

Ben turns back from Nicole to focus on Plymouth. “I think it was Mario Andretti who said that if things seem under control, you’re just not moving fast enough.” He grins. “It’s our job to take risks. And it’s your job to finance that risk.”

“No, Ben, that’s not accurate. It’s my job to manage risk. As Jeff accurately points out, I have $30 million at stake in Gnuhere.”

“All we need is a small bridge loan to reach the IPO,” Jeff says.

“And what do I get out of it?” Plymouth asks.

“Your payday when the IPO closes,” Ben says. “Gnuhere options at the pre-IPO valuation.”

“I’m thinking that may not be enough right now.” Plymouth smiles. The purple light from the Intellabeams may be playing tricks with his perception, but to Ben that grin appeared less than friendly, even menacing.

But then Ben’s attention is taken again by Nicole leaving the warehouse. She looks back at Ben, as if expecting him to come after her. When he doesn’t, a profound sadness crosses her face before giving way to fierce resolution as she exits with Seth.

One of the robots in the large window behind Plymouth and Ben lands a terrific blow. The other robot staggers and falls heavily.

One word: day trading

As Maria and Steve leave the party through the same door, they almost collide as they did earlier in the day at the Gnuhere offices. And do a double take when they recognize each other.

Behind them, Nicole is leaving arm in arm with Seth.

Maria and Steve find themselves heading in the same direction. Maria has a happy buzz on from the alcohol, the award statue in her hand, and the prospect of stupid wealth coming her way from being on the sell side at the bank during this second San Francisco gold rush. Steve is high from the party energy of his VJ gig.

“Big swinging dick,” Steve says.

She looks at him, puzzled.

He nods at the award, falling into step beside her.

She smiles, happy with her statue, pleased with herself.

“Give the VJ a lift?” he asks, holding up his laptop.

Maria is feeling adventurous. He’s cute in a dangerous kind of way. Why not?

“Top-of-the-line Bimmer,” Steve continues as they walk toward her sleek black car.

They fail to notice two guys in long black coats and fancy boots 10 paces behind them.

Steve continues his inventory: “Armani dress—it would look even better crumpled in a corner of my room.”

Did I just hear that? Maria laughs at him.

“What laptop you carry?” he asks.

“IBM ThinkPad.”

“New York address?”

“Spring Street, Soho.”

“Favorite hotel?”

“Hotel de Russie in Rome for the amazing food, and it’s right off the Piazza del Popolo. And the Tokyo Park Hyatt for the glass-roofed swimming pool on the 47th floor.”

“Boyfriend? Some buff young master-of-the-universe lawyer just made partner at Wilson Sonsini?”

“How do you know it’s not a girlfriend?”

“Because I know you like boys. So you don’t have a boyfriend.”

“Don’t have the time.” She remote-unlocks the doors of her black BMW 740, beep beep.

“Got any contacts at Disney in your Rolodex?” he asks.

“Michael Eisner?” she says.

“Wrong level,” he replies. “An even more intimate question: personal dealer?” he asks as they get in and close the doors.

She looks over at him at she starts the car. “What kind of question is that?”

“Dealer to the Digerati, at your service.”

Suddenly, both back doors open. The two long black coats slip in from either side and shut the doors.

“Dealer, huh?” one of the guys smirks.

Maria is startled by the intrusion. This isn’t the danger she was looking for tonight.

Steve swivels his head to look at them. Huh, these were the guys trailing him around South Park earlier this afternoon.

“Ever thought about the consequences?” the other asks.

“What are you, my mama?” Steve asks them.

“And he has an attitude too, Moses,” the first says.

“A bad attitude, Clyde,” Moses says.

“No, we ain’t your mother, bitch.” Clyde suddenly gets angry and whips out a knife.

“We’re your motherfuckers!” Moses yells, also pulling out a knife.

Maria is paralyzed. The risk-reward algorithm is crashing her mind.

“We’re here to tell you, Mr. Digerati Dealer –”

But he stops midsentence as Steve calmly reaches toward the omnipresent daypack he carries his laptop and drugs in and lifts the daypack toward the guys while pivoting in his seat.

“I think it’s time for you to leave,” he says, a big grin on his face.

They look at his hand in the daypack pointed at them, then at his maniacal grin.

“You don’ wanna mess up dis lady’s fine car.” Moses smiles nervously, fumbling for the door.

“Yeah, Clyde,” the other says. “Sucka’s got the message, time to go.”

They hop out, slam the car doors, start running.

Maria stares at Steve, then reflexively embraces him in relief. She’s excited by the ultimate high—surviving near death—and his cool.

“What was that about?” she asks.

“They just wanted to boost you; you rich.”

“No, it was about you. You in trouble?”

“I hope I‘m about to get into trouble,” he says, holding her closer.

“You’re in trouble,” she says, now serious. “You’re a dealer? Maybe you need to change your life.”

“We need to change the subject.”

“If guys like this are coming around …”

“Because change is good?” He laughs.

“In my business, they say: Every day you’re not selling a stock you own, you’re buying it. Every day you’re not changing your life, you’re choosing to keep living it.”


“Were you really going to shoot them?” she asks.

“Sister, I don’t even have a gun. My laptop is my weapon. Art is my game.”

Maria pulls away from him, disbelief on her face. “You could have gotten us killed.”

“Bluff is life,” Steve says. “Sometimes you gotta bluff just to keep the other side guessing.”

“Get that in a fortune cookie?”


“Should have known.”

She starts driving. She’s attracted to and scared of Steve at the same time.

“Have a problem with gaming?”

“I prefer to win real stuff, not virtual.”

Steve laughs. “Gaming isn’t about winning or losing,” he says. “It’s about improving. Every time you die, you learn.”

“In the real world you only have one life.”

“Maybe you need a mentor to explore gaming.”

“Are you offering yourself?”

“Careful. Betrayal by mentors is a theme in games.”

“Where do I drop you off?” she asks, smiling.

“How’s your bedroom sound?” Steve asks.

She laughs. “Think I don’t know you?” she tells him. “The entitlement queen who thinks he earned his good luck?”

“You should talk, you white Hispanic banker whore. You know why sharks don’t attack bankers? Professional courtesy.”

Maria thinks: He plays the cool cat, but it’s an act. Too bad. She says: “Aren’t you starting to wonder if you’re getting too old for this shock artist pose?”

“Pose on my face, mama,” he says.

She abruptly pulls over. “I have one word of advice for you before you get yourself killed: day trading. OK, that’s two words. Open a Charles Schwab account. People are making a lot of money on the internet. Try earning an honest living for a change—or as honest as you can in this business.”

Steve steps out of the car. Then he leans back in. “You’re a tough ass who likes to think she’s really an idealist, aren’t you? Or is that an idealist who thinks she’s a tough ass? Hopefully the correct one will win, before you get yourself killed.”

Where are you sleeping tonight?

Danny and the now really messed-up Carl find themselves at the door of the warehouse, leaving at the same time.

“I’ve been looking for you.” He grins at Danny.

She allows herself a rueful smile.

“Do you believe in love at first kiss?” Carl asks dreamily, drunkenly.

Danny shakes her head, surveying his erratic swaying, the backpack, the skateboard. “Who can I call to come and get you?”

He grins at her numbly.

“Where are you sleeping tonight?” she tries again, getting annoyed.

“In your bed?” He peers at her with melting eyes.

“In your dreams,” she says dismissively—just as Carl slow-motion slumps into her arms, unconscious in the dark night.

Installing Windows 95 on VirtualBox on MacOS

Looking through a stack of CDs and DVDs on the shelf on my desk, amongst many other things, I still have install CDs for Windows 95 and Windows 98. I wondered (as you do, well, maybe not everyone does) what it would be like to install 95 again from scratch, so created a new VM in VirtualBox and off I went. If you’ve come across any of my posts before you might remember I’ve installed all sorts of OSes under VirtualBox before, because, well why not? OS/2 and AROS probably the most interesting.

The steps in this blog are very useful for a guide. Windows 95 install CDs were apparently not bootable, and I don’t remember having boot floppies. If I did I probably don’t have them anymore. I download a Windows 95 boot disk floppy .img from here, and attached it to the floppy drive in the VirtualBox config for this machine.

After booting to an a: prompt, attempted ‘format c:’ but got a ‘invalid drive specification’ error. Seems I needed to partition my blank attached virtual disk first, so from the a: prompt, ran fdisk:

And then:


Next, Windows 95 setup was telling me that my newly created and formatted disk was reporting an incorrect size, so started a Scandisk:

1GB or more.

I decreased it to 512MB, then got:

Other posts seem like this is to do with host CPUs faster than 2.1GHz, and my Mac Pro has dual 2.8 Xeons. Maybe this is as far as I’m going to get with 95. Next up, trying 98!

Fashion Celebrity Global Summit to be held in Qingdao, China

BEIJING, Aug. 19, 2017 /PRNewswire/ — China’s 1st Fashion Celebrity Global Summit will be held in Qingdao, a well-known seaside travel destination, on August 25th and 26th 2017.

This event will bring together global influencers including China’s largest fashion KOL Gogoboi, China’s most profitable fashion celebrity Dayi Zhang, Australian model Lily May Mac, Youtube star singer Jason Chen, and American record producer Maejor.

The Fashion Celebrity Global summit is hosted by China’s largest fashion MCN MOKO, Trends Group and Qingdao National High-tech Industrial Development Zone. It’s aimed to build a platform connecting global enterprises and fashion celebrities, therefore positioning Qingdao as an influential city in the global fashion world.

During the 2-day summit, speakers will discuss on content innovation and monetization, personal branding and IP, fashion e-commerce, and many other topics that will transform China’s fast-growing fashion influencer industry.

Executives from China’s top Internet companies like Weibo, as well as senior representatives from international fashion industry leaders like IMG and UTA, are confirmed to attend and share their vision with more than 1000+ expected attendees.

Last but not least, MOKO will bring Fashion Celebrity Global Summit with EDGE Fashion to Intrepid Sea, Air & Space Museum in New York Fashion Week Spring/Summer 2018. As MOKO’s overseas official partner, EDGE Fashion invites Chinese American fashion PR Vermouth Liu to hold EDGE Fashion Blogger Awards 2017, Fashion Forum and Fashion Run-way Shows during the event. As celebrities, fashion bloggers, brands, and journalists from all over the United States of America will come together to recognise the dedication of fashion bloggers worldwide.

About MOKO

MOKO is China’s oldest fashion influencers’ website that provides training, performance and business opportunities to talents. Today, with 3.5 million cooperated fashion talents, MOKO has become the largest fashion talent MCN contributing to China’s Internet celebrity industry.

MOKO as China’s 1st Internet industry leader moving its headquarter to Qingdao, has signed a strategic MOU with Qingdao government to support the city’s development in technology, fashion and innovative industries.

View original content:


Four DevOps Tools for the Database You Can’t Live Without

You can’t buy DevOps. Just as you can’t be a carpenter simply by swinging a hammer, DevOps is a process by which we identify and streamline our application development and release process. The process part of DevOps begins with identifying the parts of the development and release process that are taking too long and creating a bottleneck.

Time and time again, the database change process is often the biggest bottleneck in the process. That’s not surprising as there are fewer tools to support DevOps for the database than DevOps for the application. That doesn’t mean they don’t exist, it’s just more important than ever to pick the right tools for the job.

Let’s look at why we absolutely can’t live (or get our jobs done!) without database development tools, application release automation (ARA), test data management, and database release automation.

1. Database Development Tools

When you think of DevOps tools, it’s unlikely you will consider database development tools as part of that category. However, it’s important that ALL of your tooling is DevOps-y.

I will always make the argument that Agile begat DevOps. Without the speed and efficiency we received from Agile software development, we wouldn’t have needed to create DevOps. Thus, bringing Agile to the database is key for DevOps for the database. Quest Software’s Toad has some great features for supporting Agile development. The first is its Team Coding functionality. Databases are different than the application and have state. Thus, having a database instance we can develop against as part of a team is key. Toad’s Team Coding allows users to leverage existing Source Code Control (like Git, Subversion, others) and a live database to support database developers. Not only can they check in and out their SQL scripts, but they can do so with the database objects like tables and stored procedures, as well.

2. Application Release Automation

Our applications today are complex and have a large number of components. As we move to adopt microservices, containers, and other technologies that allow us to provide functional isolation and avoid single points of failure, orchestrating this complex process requires application release automation. As we moved from “tribal knowledge” to scripts to deploy our applications, the next step is ARA to tie all these steps together and make sure they are completed successfully.

ARA DevOps Tools like CA’s Release Automation, IBM’s UrbanCode Deploy, Serena’s Deployment Automation from MicroFocus, and Xebia Lab’s XL Deploy are an absolute necessity for DevOps.

3. Test Data Management

Now that you’re deploying your application at the speed of thought, you are new free to make certain that your testing efforts are valid. The biggest problem with application testing today is that lack of real-world data. Today’s applications change functionality based on the data stored in the database. Thus, providing data that mirrors (or actually is) production data is key to having valid testing efforts. After all, your entire testing cycle could be invalidated by testing against improper data. If that’s the case, there is no point in testing at all!

DevOps Tools like CA’s TDM, Delphix Data Virtualization, and IBM’s Optim allow you to populate your test databases with data. (In some cases, like Delphix, you can self-service request copies of production databases for integrated testing environments.) You are adopting DevOps for a reason and that is to improve your software; a huge part of that is enabling more and more testing.

4. Database Release Automation

Quick! Sketch a simple diagram of your application. I bet there are three boxes and one is the application and one is the database. You will not be successful with your DevOps initiative if you neglect that database. In fact, several DevOps leaders who have successfully implemented DevOps, point to the database as a key post-mortem learning. “In retrospect, I wish we had automated database deployments first,” is very common to hear.

Thus, as you evaluate your DevOps tooling, database release automation will be key. A herd can only move as fast as its slowest member. For companies that use databases (all of them!), the database deployment process is that slowest member.

You have a whole host of DevOps tools to choose from. Finding the ones that work for you will require evaluation and consultation with all team members. Remember: DevOps is a process to constantly improve and move faster. If you make a bad tool decision or simply forget key parts of your release process, you will not be able to improve nor accelerate your application release process – and if the going is slow, why go at all?

To learn more about DevOps Tools for the Database, read this white paper, Four DevOps Tools You Can’t Live Without

JavaScript for Microcontrollers and IoT: A Web Server

In our last post from the JavaScript for Microcontrollers and IoT series, we talked about building a sensor hub. We succeeded, but our use of JavaScript remained small in contrast to the amount of C code that was necessary to write. In this post, we take our sensor hub and expand it using JavaScript to act as a web server in our local network. The web server will display readings from the sensors but only for authenticated users. Will it be as easy as it looks? Read on to find out!


In our last post, we finally used all the code we developed in the first post for something useful. We created a small script that was in charge of reading values from sensors and then sending that information to different destinations. We sent the code to the cloud, to be handled by a Webtask that in turn could do useful stuff with it (like sending an email when thresholds were exceeded), and we also sent the readings to a computer in the local network. However, there was no way for a user in the local network to simply take a look at the readings (unless they set up a web server on a computer). We also came to the conclusion that the added complexity of setting up a JavaScript interpreter and then exposing the C API through it was simply not worth it for small scripts. Things could be different if the JavaScript code were bigger, or, in other words, if most of the development happened on the JavaScript side of things. So for this post, we decided to run the experiment: let’s write something bigger in JavaScript and see where that gets us.

The Plan

We already have the sensor hub, so the next logical step is to have some way to see the readings from any smart device in the local network. One simple way to do that is to simply have a webpage served by the microcontroller. We could put the readings there!

Now, if you recall what we saw of the Particle API in previous posts, you may remember we did have TCP sockets and WiFi. That’s great! However, for this, we are missing a key part of the puzzle: an HTTP server. What we want to do should be simple enough, and luckily, HTTP is, for the most part, rather simple for small tasks like ours. Could we integrate a small HTTP server using JavaScript in our sensor-hub example? It turns out we can.

For our example, we have decided to use http-parser-js, a JavaScript-only implementation of Node’s HTTP parser. Node’s HTTP parser is written in C, so we could actually use that instead, but the point of using JavaScript on a microcontroller is to write less error prone C code and more JavaScript. The JavaScript version should be simpler to use, as long as our interpreter is up to the task.

Using http-parser-js, we developed a small example that passes data from Particle’s TCP API to the parser and then back to user-specified handlers, in the spirit of the rather simple Express library (although with a completely different, and much simpler API).

We also decided to add a small authentication screen to the sensor readings page. Since our example is only meant to run on the local network, as there is no SSL/TLS available on the Particle API yet, this is mostly for educational or testing purposes. For this, we will use auth0.js, which lets us add authentication to a page with only a few lines of code.

An interesting side of adding authentication is actually having the microcontroller validate the credentials. Since Auth0 implements OpenID Connect, we will learn how to validate JWTs on the microcontroller too! For this task, we decided to use our clean-room implementation of JWT HMAC signatures from the JWT Handbook. Why? Because it has no external dependencies and it is very small. Of course, for production uses you should prefer a well-tested library with better error handling and not an educational one. Still, this poses an interesting challenge for our interpreter of choice: JerryScript.

Some of the libraries we decided to use for this require ECMAScript 2015. JerryScript, the interpreter we have been using so far, only support ECMAScript 5.1, so we will also learn to use a transpiler and bundler to accomplish our mission. For this task, we will be using Rollup and Babel. Rollup produces very small code, and size is always important when working with microcontrollers.

To sum up: We will expand our JerryPhoton library to support incoming TCP connections (listening TCP sockets). We will parse HTTP requests using http-parser-js. We will write a small HTTP class that will read the HTTP request and dispatch it to the right handler. We will convert all the JavaScript code into a single bundle using only ECMAScript 5.1. We will embed an HTML web page inside our JavaScript code using Rollup and then serve it according to the HTTP request. We will validate JWTs to protect API endpoints using our educational, clean-room implementation of HMAC signatures from the JWT Handbook. We will rely on auth0.js to perform the authentication for us.

Looks like quite a ride, so buckle up!


Incoming TCP Connections

The Particle API provides a convenient class to handle incoming TCP connections: TCPServer. Fortunately, TCPServer instances return TCPClient instances once the connection is established, so most of the hard work is already done in JerryPhoton (which provides a wrapper for TCPClient instances in JavaScript). We just need to create a new JavaScript object to expose the functionality (ṕhoton.TCPServer) and include a single method in it: available.

This is simple enough:

static jerry_value_t create_tcp_server(const jerry_value_t func, const jerry_value_t thiz, const jerry_value_t *args, const jerry_length_t argscount) { jerry_value_t constructed = thiz; if(argscount != 1 || !jerry_value_is_number(*args)) { return jerry_create_error(JERRY_ERROR_COMMON, reinterpret_cast<const jerry_char_t*>("TCPServer: missing port")); } const uint16_t port = static_cast<uint16_t>(jerry_get_number_value(*args)); // Construct object if new was not used to call this function { const jerry_value_t ownname = create_string("TCPServer"); if(jerry_has_property(constructed, ownname)) { constructed = jerry_create_object(); } jerry_release_value(ownname); } { const jerry_value_t name = create_string("available"); const jerry_value_t func = jerry_create_external_function(tcp_server_available); jerry_set_property(constructed, name, func); jerry_release_value(func); jerry_release_value(name); } // Backing object TCPServer* server = new TCPServer(port); jerry_set_object_native_pointer(constructed, server, &server_native_info); return constructed;

And the available method:

static jerry_value_t tcp_server_available(const jerry_value_t func, const jerry_value_t thiz, const jerry_value_t *args, const jerry_length_t argscount) { TCPServer* server = NULL; const jerry_object_native_info_t *native_info = NULL; jerry_get_object_native_pointer(thiz, reinterpret_cast<void**>(&server), &native_info); if(native_info != &server_native_info) { return jerry_create_error(JERRY_ERROR_TYPE, reinterpret_cast<const jerry_char_t*>( "TCPServer.available called with wrong this pointer")); } TCPClient* client = new TCPClient(server->available()); jerry_value_t jsclient = jerry_create_object(); build_tcp_client_object(jsclient, client); return jsclient;

If you don’t understand the signatures of these C++ functions read the first post in this series, where we explore the integration of JerryScript on the Particle Photon.

We can now use this object from within JavaScript like so:

var server = photon.TCPServer(80);
while(true) { var client = server.available(); if(client.connected()) { // Do something with the client }

Transpiling and Bundling Code

Before starting to work with our JavaScript code, we need to set up a way to bundle everything in a single JavaScript file so we can easily include it in our project. We also need a transpiler to convert ECMAScript 2015 code to ECMAScript 5.1 code. Let’s take a look at how to do that with Rollup and Babel.

Rollup’s main feature is to let you mix up JavaScript code with different module systems. In particular, Rollup was conceived to handle integration between CommonJS modules and ECMAScript 2015 modules seamlessly. There are other module bundlers that can do this, like Webpack, but Rollup is very simple to configure for minimum code size with the least possible amount of added support code in the resulting bundle. Our Rollup configuration is as follows:

import resolve from 'rollup-plugin-node-resolve';
import babel from 'rollup-plugin-babel';
import cjs from 'rollup-plugin-commonjs';
import strip from 'rollup-plugin-strip';
import html from 'rollup-plugin-html';
import uglify from 'rollup-plugin-uglify';
import { minify
from 'uglify-es'; export default { entry: './main.js', format: 'es', dest: './dist/main.bundle.js', useStrict: false, plugins: [ html({ include: '**/*.html', htmlMinifierOptions: { collapseWhitespace: true, collapseBooleanAttributes: true, conservativeCollapse: true, minifyJS: true } }), strip({ debugger: true }), resolve(), cjs(), babel({ exclude: 'node_modules/**', // only transpile our source code presets: ['es2015-rollup'] }), uglify({}, minify) ],

As you can see, we are using a number of plugins. These plugins give us the following functionality:

  • node-resolve: lets us resolve packages from within node_modules.
  • babel: converts ECMAScript 2015 code to ECMAScript 5.1 code. We are using the es2015-rollup Babel preset that basically converts everything to ECMAScript 5.1 except the module declarations. These declarations are handled internally by Rollup.
  • commonjs: handles require and module.exports usage from within modules.
  • strip: removes the use of common debugging calls like assert. We do not want (to save space) nor have that functionality in our interpreter so we need to remove that.
  • html: takes an HTML file and embeds it in the bundle inside a string. We will use this to integrate our webpage inside our bundle.
  • uglify: space is everything: we need to keep the size of the bundle as small as possible, so Uglify can help us to achieve that. Uglify does not support ECMAScript 2015 modules yet, so we need to use a specific minifier that can do that: that is what uglify-es provides.

With this pipeline, we will get a single JavaScript file with all we need. If you want to take a look at how the resulting code compares to the original code, comment the uglify call in the plugins array. The resulting code is pretty readable and has very little added support code.

Wait, how are we going to upload this to the microcontroller?

Another thing we need is to find a way to get the bundle into the microcontroller. We will now be working with larger amounts of code, so we cannot use the simple upload functionality we developed in post 1. The upload functionality allowed us to dynamically run JavaScript code sent through a TCP socket. This was great, but to do so the code was first copied into RAM and then run from there. The Particle Photon does not have a lot of RAM, so we cannot waste it by keeping our script there. Fortunately, there is a way to embed our JavaScript bundle into the ROM!

The Particle API does not have a concept of a file or resource system, therefore anything that must be available to the C code in form of data must also be included in the code itself. Fortunately for us, this is very easy to do with some minor shell scripting. Once we have the JavaScript bundle we can convert it to a C-array using xxd, a tool to produce textual binary dumps. xxd conveniently provides an option to produce C-arrays as output.

Here’s the whole JavaScript source to JavaScript bundle to C-array pipeline:

cd js
echo 'Are npm packages installed?'
if [ ! -d node_modules ]; then echo 'Nope, installing npm packages.' npm install
echo 'Yes, building JavaScript bundle using Rollup.'
node_modules/rollup/bin/rollup -c cd dist
echo 'Putting JavaScript bundle into a C array.'
xxd -i main.bundle.js > ../../src/main.bundle.h
cd ../.. echo 'Making bundle C array static const.'
sed -i -e 's/^unsigned/static const/' src/main.bundle.h

The last command, sed, is necessary because we want to make sure our C-array gets stored in ROM and not in RAM. To tell the C compiler that, we need to make the array static and const. We also change the type from unsigned char to just char. This makes no difference for the data in it and matches the signature of the jerryphoton::eval() function.

Integrating the HTTP Parser

The first library that we are going to integrate is the HTTP parser (http-parser-js). This library is a simple JavaScript-only HTTP parser meant to work as a drop-in replacement for Node.js’s C-based parser. It provides the exact same JavaScript API. However, since this parser was written with Node in mind, certain minor adaptations must be performed before we can use it in JerryScript. We’ll talk about them here.

The first and biggest change has to do with the use of Node’s Buffer object. Buffer is a Node-specific object and we can’t use it here. There are two ways we could fix this here: we can rely on JerryScript’s limited support for ECMAScript 2015’s TypedArray, or we can use JavaScript strings. After taking a look at the code that uses Buffer we decided to go the String route. Let’s take a look at the code:

HTTPParser.prototype.consumeLine = function() { var end = this.end, chunk = this.chunk; for (var i = this.offset; i < end; i++) { if (chunk[i] === 0x0a) { // \n var line = this.line + chunk.toString('ascii', this.offset, i); if (line.charAt(line.length - 1) === '\r') { line = line.substr(0, line.length - 1); } this.line = ''; this.offset = i + 1; return line; } } //line split over multiple chunks this.line += chunk.toString('ascii', this.offset, this.end); this.offset = this.end;

Fortunately for us, this is the only function where Buffer is used. The variable chunk is a Buffer. The methods used are array access (chunk[i]) and chunk.toString('ascii', ...). These uses are very simple to adapt to String:

HTTPParser.prototype.consumeLine = function() { var end = this.end, chunk = this.chunk; for (var i = this.offset; i < end; i++) { if (chunk.charCodeAt(i) === 0x0a) { // \n var line = this.line + chunk.substring(this.offset, i); if (line.charAt(line.length - 1) === '\r') { line = line.substr(0, line.length - 1); } this.line = ''; this.offset = i + 1; return line; } } //line split over multiple chunks this.line += chunk.substring(this.offset, this.end); this.offset = this.end;

We use chunk.charAt and chunk.substring. This will work for our simple usage.

Since we performed modifications to http-parser-js , we included it in our code rather than use the version from node_modules.

The HTTP Class

To process HTTP requests we will write a simple JavaScript class that will use http-praser-js and then call a user-defined handler with the parsed request. Since we are using Babel we will write an ECMAScript 2015 class:

export default class HTTP { constructor(tcpClient, handler) { this.client = tcpClient; this.parser = new HTTPParser('REQUEST'); this.parser[HTTPParser.kOnHeadersComplete] = info => { handler(this, info.headers, info.method, info.url); }; } process() { if(this.client.available() === 0) { return; } this.parser.execute(; } isConnected() { return this.client.connected(); } sendHtml(html) { sendResponse(this.client, 200, 'html', html); } sendJson(json) { sendResponse(this.client, 200, 'json', json); } send401() { sendResponse(this.client, 401); } close() { this.client.stop(); }

The HTTP class takes a Particle TCPClient object and a JavaScript function as constructor parameters. When the process method is called, if an HTTP request is completely parsed, the handler will be called. If the HTTP request is not completely present in the TCPClient buffer, the state will be preserved for future calls (that is, one must call process repeatedly until the request is completely processed). The handler will receive the HTTP object, the headers, the name of the HTTP method and the full URL of the request.

The HTTP class also provides a couple of simple methods for sending responses: sendHtml, sendJson and send401. The sendResponse private function handles all the work:

function sendResponse(client, status, type, data) { const msg = `HTTP/1.1 ${getStatus(status)}\r\n` + `Server: Custom\r\n` + getDataHeaders(type, data) + `Connection: Closed\r\n\r\n`; client.write(msg); if (data) { const chunkSize = 256; for(let bytes = 0; bytes < data.length; bytes += chunkSize) { const chunk = data.substr(bytes, chunkSize); for (let written = 0; written < chunk.length;) { written += client.write(chunk.substring(written)); //photon.log.trace(written); photon.process(); } } }

You may have noticed that the part of this function that writes to the socket is a bit contrived. This is necessary to keep RAM usage withing acceptable levels. Since we will be using this function to send an HTML page to a browser, depending on the size of the HTML page, it may be necessary to create a very big buffer to send the data (data from the JavaScript side is copied in the C side). To keep this at reasonable levels, we send the data in chunks: one 256-byte chunk at a time. You can experiment with different sizes of chunks, but we found that for our simple usage, this worked without problems.

The JWT Decoding and Verification Functions

As we mentioned before, we are going to use the basic JWT decoding and verification functions from the JWT Handbook. These functions are clean-room implementations of all the algorithms, down to Base64 encoding. These functions were written for educational purposes and are not ideal from a performance and security point of view. However, they are very small and the code is clear enough to be easily debugged.

DISCLAIMER: Do not use these functions in production. They were not tested in the wild and are only meant for educational purposes. Clarity of implementation was the main criteria used when they were written. You should not consider them secure.

The clean room implementation of HMAC signatures used in the JWT Handbook relies heavily on ECMAScript 2015 features. In particular, TypedArray classes are used everywhere. Fortunately for us JerryScript developers are already working on an implementation of typed arrays. However, at the time we wrote this, the implementations were incomplete. Nonetheless they are perfectly usable with a couple of adaptations. We also relied on ECMAScript 2015 new methods for String. These are also easy to replace. Let’s take a look:


The only String method that was used from ECMAScript 2015 is endsWith. This method takes a string and checks whether the string used as this ends with the specified string. If it does, it returns true, otherwise it returns false.

JerryScript appears to be designed in such a way that changing the prototypes of built-in objects does not work correctly. Although this practice is frowned upon, it is sometimes useful. In this case we are trying to provide a polyfill, so it would certainly make sense to be able to do something like this. In any case, we can still provide free functions to do the same.

export function endsWith(thiz, str) { var idx = thiz.indexOf(str); if(idx === -1) { return false; } return (idx + str.length) === thiz.length;

Unfortunately, this means we must now find all uses of endsWith and change them. You can find this function in utils.js.


The JWT Handbook examples make use of two unimplemented methods in JerryScript: set and fill. The set method provides a way to set the contents of a typed array with the elements from another array (either a common array or a typed array). The fill method, on the other hand, sets a number of elements all to the same value.

export function fill(arr, elem) { for(var i = 0; i < arr.length; ++i) { arr[i] = elem; }
} export function set(target, source, offset) { var off = offset ? offset : 0; for(var i = 0; (i < source.length) && ((i + off) < target.length); ++i) { target[i + off] = source[i]; }

Just like what happened with String, JerryScript does not allow us to modify the prototype of the TypedArray object, thus it is necessary to provide free functions as polyfills and then change the code manually.

You can find these functions in utils.js.


It would appear that the version of JerryScript that we used for this example has a bug in the implementation of TypedArray.of. For this reason, we repĺaced all uses of TypedArray.of for code like this:

const h_ = new Uint32Array(8);
set(h_, [ 0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a, 0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19

The HTTP Request Handler

The main business logic of our application is the HTTP request handler, which ties all other parts together. The handler takes an HTTP request and dispatches it to the right functions to act according to the URL. All of this code is located in our main.js function. Let’s take a look:

import * as sensors from './sensors.js';
import HTTP from './http.js';
import page from './index.html';
import { jwtVerifyAndDecode } from './hs256.js'; // (...) function handler(http, headers, method, url) { if(url.indexOf('/get-sensor-data') !== -1) { sendSensorData(http, headers); } else { http.sendHtml(page); }
} const server = photon.TCPServer(80);
let httpClients = [];
setInterval(() => { httpClients.push(new HTTP(server.available(), handler)); const connected = []; httpClients.forEach(client => { client.process(); if(!client.isConnected()) { return; } connected.push(client); }); // Discard disconnected clients. httpClients = connected;
}, 0);

Here we see we have a function that gets repeatedly executed as fast as possible after giving the system some time to process other stuff. The function checks whether there is a new connection available, and if there is and it remains connected, it attempts to read data from it. This is done for all active connections, which are stored inside the httpClients array. All disconnected TCP connections are discarded after each loop (and collected by the garbage collector eventually). A new instance of theHTTP class is created for each new connection. The handler for HTTP requests is the handler function, which simply checks for one of two endpoints: the main page, and the endpoint that returns sensor data. The page variable is where the HTML file that serves as our main page is stored as a string.

Other functions from the main.js file:

// Get this from
const secret = 'test';
const audience = '/get-sensor-data';
const issuer = ''; sensors.startReports(); function validateJwt(headers) { try { const idx = headers.indexOf('ACCESS-TOKEN'); if(idx === -1) { return false; } const decoded = jwtVerifyAndDecode(headers[idx + 1], secret); return decoded.valid && decoded.payload.aud == audience && decoded.payload.iss == issuer; } catch(e) { return false; } return false;
} function sendSensorData(http, headers) { if(!validateJwt(headers)) { http.send401(); http.close(); return; } http.sendJson(JSON.stringify(sensors.getLastReport()));

The Web Page

The web page is really simple. Of course, you could make something much more pleasing from an aesthetic point of view. The page displays a text introduction, and then either a login button, or the report from the sensors in textual form. The web page periodically requests new sensor data using XMLHttpRequest. Let’s see how it works.

DISCLAIMER: Since there is no SSL/TLS support on the Particle Photon, this page is NOT secure. All tokens are sent in the clear. Do not use this example outside of your local network, or even inside your local network if you need to keep tokens secure.

<!DOCTYPE html>
<html> <head> <title>Local Sensors</title> <script src=""></script>
</head> <body> <p>Hello, this is your local sensors report</p> <p>BEWARE: this example should only be used on trusted networks! NO SSL/TLS IS IN PLACE, TOKENS TRAVEL IN THE CLEAR IN YOUR LOCAL NETWORK.</p> <button id="login-button" onclick="loginClicked()">Login</button> <div id="sensors-report"> <p> <span style="font-weight: bold">Movement: </span> <span id="sensor-movement"></span> </p> <p> <span style="font-weight: bold">Flame: </span> <span id="sensor-flame"></span> </p> <p> <span style="font-weight: bold">Humidity: </span> <span id="sensor-humidity"></span> </p> <p> <span style="font-weight: bold">Temperature: </span> <span id="sensor-temperature"></span> </p> <p> <span style="font-weight: bold">Gas: </span> <span id="sensor-gas"></span> </p> <p> <span style="font-weight: bold"> Time since last alarm in milliseconds: </span> <span id="sensor-time-since-alarm"></span> </p> </div> <button id="logout-button" onclick="logoutClicked()">Logout</button> <!-- ... -->

The HTML page embeds a small script to do all its magic. The script checks whether the user has logged in previously and shows or hides the necessary elements according to that:

const accessToken = localStorage.getItem('access_token'); // (...) if(accessToken) { = 'none'; = 'block'; = 'block'; if(!refreshInterval) { setInterval(refresh, 2000); }
} else { = 'block'; = 'none'; = 'none'; if(refreshInterval) { clearInterval(refreshInterval); }

The refresh function gets the sensor data using the access token and then updates the DOM accordingly:

function refresh() { httpGet('/get-sensor-data', accessToken).then(data => { try { const sensors = JSON.parse(data); sensorMovement.innerHTML = ? 'detected' : 'undetected'; sensorFlame.innerHTML = ? 'detected' : 'undetected'; sensorHumidity.innerHTML = + '%'; sensorTemperature.innerHTML = + ' Celsius'; sensorGas.innerHTML =; sensorTimeSinceAlarm.innerHTML = sensors.timeSinceLastAlarmMs.toString() + 'ms'; } catch(e) { console.log(e); } }).catch(status => { if(status === 401) { logoutClicked(); } });

The httpGet function is a simple wrapper around XMLHttpRequest:

function httpGet(url, accessToken) { return new Promise((resolve, reject) => { const request = new XMLHttpRequest(); request.onreadystatechange = () => { if(request.readyState !== XMLHttpRequest.DONE) { return; } if(request.status === 200) { resolve(request.responseText); } else { reject(request.status); } }"GET", url, true); request.setRequestHeader('ACCESS-TOKEN', accessToken); request.send(); });

And last but not least there’s Auth0 authentication:

// Get this from
const auth0Client = new window.auth0.WebAuth({ domain: "", clientID: "5OzskonPwTAikfl1pIexAZYPuJN65WmK"
}); function parseHash() { const re = /access_token=(.*?)&/; const match = re.exec(window.location); if(match) { localStorage.setItem('access_token', match[1]); document.location.href = '/'; }
} function loginClicked() { auth0Client.authorize({ audience: '/get-sensor-data', scope: 'read:sensors', responseType: 'token id_token', redirectUri: '' });
} function logoutClicked() { localStorage.removeItem('access_token'); window.location.reload();
} parseHash();

By using the auth0.js library, authentication and authorization are just a matter of calling auth0Client.authorize. This will send the user to the Auth0 login page. After the user is authenticated, the authorization server will redirect the user back to our sensor site with the right access token for our API. This is what our parseHash function does: it gets the token from the URL and stores it in local storage.

To use Auth0 you will first need to perform a couple of simple steps, which we describe below.

Setting Up Auth0

To use Auth0 to authenticate, authorize and get an access token for our API we need to perform two steps: first we need to create a client (this identifies our client application to the authorization server), and second, we need to create an API endpoint so that we can request access tokens for it. If you haven’t signed up for Auth0, sign up now. You can use the free tier for this example!

Create a Client

  1. Go to the Auth0 dashboard and select Clients.
  2. Click on Create Client.
  3. Choose a name and put it in the text field near the top.
  4. Select Regular Web Applications.
  5. Select Settings.
  6. You will now see your Auth0 Domain and Auth0 Client ID on the screen. Take note of these and set them in both index.html and main.js.
  7. Go down and find the Allowed Callback URLs field. Set the IP address of your Particle Photon there as an URL. Example: You should make sure the Particle Photon gets assigned the same IP address always (most modern WiFi routers keep track of this).

Create an API Endpoint

  1. Go to the Auth0 dashboard and select APIs.
  2. Click on Create API.
  3. Choose a name. In the Identifier field put /get-sensor-data. This is what the access token will carry in the aud (audience) claim. For the algorithm pick HS256. Click on Create.
  4. Go to Settings and take note of the signing secret. Set it in main.js.

That’s it! Once you have done this Auth0 is ready to use.

Finishing Touches

To be able to run this example another minor change was required with regards to post 2. We had to slightly increase the heap size for JerryScript. Fortunately, there still is some free RAM in the Photon. Heap size is now set to 42KB, you can see this in Makefile.particle. That’s right, this whole example uses less than 42KB of RAM, and its running on JavaScript!

Another change that was necessary was to enable typed arrays and regular expressions in JerryScript. Typed arrays are used by the JWT libraries, and regular expressions by the HTTP parser. Even so, RAM use remains really low! You can see these changes in custom.profile, the JerryScript profile used for this example.

Let’s see it in action!

Get the full code for this example. If you need help flashing the compiled firmware, refer to the previous post.


In our previous post, we managed to get something useful running on JavaScript, but we didn’t really develop a full fledged application. For this post, however, we upped the ante and managed to run our own web server doing most of the work using only JavaScript. We handled connections, HTTP parsing, request dispatching, and JWT validation with HS256 (HMAC + SHA256). We also integrated a Node library (http-parser-js) and wrote all of our code using ECMAScript 2015 with modules. The result is over 1000 lines of JavaScript, or around 15KiB of minified JavaScript. This all runs on a 120MHz ARM CPU and uses less than 42KB of RAM!

The development experience was not without trouble. JerryScript remains rough around the edges for now. Some constructs are not handled correctly (for example, the common immediately invoked function expression appears to fail), typed arrays remain incomplete, and using polyfills by adding or changing methods in a prototype does not work as expected. These are all common patterns or tools in the JavaScript world, and there may be more small differences in behavior between it and the more powerful V8 or SpiderMonkey implementations.

So now that we have gone over the experience of developing something bigger using JavaScript, has it changed our opinion from the last post that JavaScript only makes sense for microcontrollers if you don’t need to fall back to C often? To be honest, no, it has not changed. Using existing libraries has been tremendously helpful, but we still had to debug them and find out the very specific differences between JerryScript and other more common JavaScript engines. This took some time. We also estimate that the performance of doing HTTP parsing and JWT decoding and verification on an interpreter is much slower than doing them in C code. For our case, it has not resulted in problems, but bigger codebases may struggle to be performant. Things may be different using a different JavaScript engine. What we have seen so far is very good, but not entirely production ready. Using JavaScript through JerryScript on the Particle Photon remains an interesting option for smaller teams or hobbyists.

In our next post we will take a look at the ESP8266 (finally) and Espruino, a different firmware that comes with an integrated JavaScript interpreter and most of its API already exposed through it. We will see if a different development environment results in a more “production-ready” experience. Until then, hack on!

Please enable JavaScript to view the &amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;a href=&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;quot;;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;quot; rel=&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;quot;nofollow&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;quot;&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;comments powered by Disqus.&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;/a&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;

LEXMARK INTERNATIONAL SHAREHOLDER ALERT: CLAIMSFILER Reminds Investors with Losses in Excess of $100,000 of Lead Plaintiff Deadline in Class Action Lawsuit Against Lexmark International, Inc. – (LXK)

NEW ORLEANS, Aug. 18, 2017 /PRNewswire/ — ClaimsFiler, a FREE shareholder information service, reminds investors that they have until September 19, 2017 to file lead plaintiff applications in a securities class action lawsuit against Lexmark International, Inc. (NYSE: LXK), if they purchased the Company’s securities between August 1, 2014 and July 20, 2015, inclusive (the “Class Period”).  This action is pending in the United States District Court for the Southern District of New York.

Get Help

Costar Technologies, Inc. Announces Date of 2017 Annual Meeting of Stockholders

COPPELL, Texas, Aug. 18, 2017 /PRNewswire/ — Costar Technologies, Inc. (the “Company”) (OTC Markets Group: CSTI), announced today that the Company’s 2017 Annual Meeting of Stockholders will be held on October 4, 2017 at 3:00 p.m. local time at its corporate headquarters located at 101 Wrangler Drive, Suite 201, Coppell, TX 75019. The Company also announced that it has set the close of business on August 15, 2017 as the record date for determining the stockholders entitled to receive notice of and vote at the annual meeting.

The Company anticipates mailing its proxy statement to stockholders on or around August 28, 2017, which will include a description of the matters to be considered at the annual meeting. Stockholders may also obtain a copy of the 2017 proxy statement when it is available as well as other information concerning the Company at   

About Costar Technologies, Inc.

Costar Technologies, Inc. develops, designs and distributes a range of security solution products including surveillance cameras, lenses, digital video recorders and high-speed domes. The Company also develops, designs and distributes industrial vision products to observe repetitive production and assembly lines, thereby increasing efficiency by detecting faults in the production process. Headquartered in Coppell, Texas, the Company’s shares currently trade on the OTC Markets Group under the ticker symbol “CSTI”. Costar was ranked 41 in a&s magazine’s Security 50 for 2016. Security 50 is an annual ranking of the world’s largest security manufacturers in the areas of video surveillance, access control and intruder alarms and is based on financial performance.

Cautionary Statement Regarding Forward Looking Statements

This press release contains forward-looking statements that are subject to substantial risks and uncertainties that could cause actual performance or results to differ materially from those expressed in or suggested by the forward-looking statements. You can identify forward-looking statements by words such as “believe,” “may,” “estimate,” “continue,” “anticipate,” “intend,” “plan,” “expect,” “predict,” “potential,” or the negative of these terms or other comparable terminology. These forward-looking statements are based on management’s current expectations but they involve risks and uncertainties. Actual results and the timing of events could differ materially from those anticipated in the forward-looking statements as a result of the risks and uncertainties.

You should not place undue reliance on any forward-looking statements. The Company assumes no obligation to update forward-looking statements to reflect actual results, changes in assumptions, or changes in other factors affecting forward-looking information, except to the extent required by applicable laws.

View original content:

SOURCE Costar Technologies, Inc.

Related Links

8-Year-Old Nia Mya Reese Writes Best-Selling Book About Her ‘Annoying’ Brother

At just 8 years old, Nia Mya Reese has officially become a best-selling author, which is no easy feat for an adult, let alone a child.

Reese, a third-grader from Birmingham, Alabama, was inspired to pen a book when her first-grade teacher asked her class to write about a topic within their realm of expertise. Being confident in her ability to take care for her younger brother, Reese decided to offer advice on how to be a good older sibling. Entitled “How To Deal With and Care For Your Annoying Little Brother,” the book encourages siblings to practice love, patience, and kindness.

(Image: Twitter/NiaMyaReese)

Reese’s mom, Cherinita Ladd-Reese, says that she was so moved by her daughter’s book that she pushed her to continue working on the project even though her class assignment was complete.

“I was very, very tickled. I said ‘I think you wrote your first self-help book for kids,’” Ladd-Reese told

“We went through a long process,” Reese said about revising her work. “My mommy checked it.”

Reese’s hard work paid off. Two years later, her story became a best-selling book listed on Amazon’s Parenting section.

“My granddaughter loved this book. She and her brother have a classic sibling rivalry relationship and this book has shown her ways to deal with her younger brother. She is 6 and he’s 3 and they can have some knock down drag out fights. lol,” reads one customer review on Amazon.

Not only is the book getting rave reviews, Reese’s teacher says it is a great learning tool for her peers in school who have to deal with irritating siblings at home. On top of that, Reese has been taking her inspirational message around the nation as she travels across the country doing book signings. She has even been featured on CBS Evening News, NBC’s Harry talk show, and in Stylist magazine.

When she’s not signing autographs and doing media interviews, Reese enjoys spending time playing with her dolls and working on her next book.

(Image: Amazon)

Join DJ Khaled on Xbox Live Sessions, a New Interactive Show Premiering August 25 on Mixer

SEATTLE, Aug. 18, 2017 /PRNewswire/ — Next week, Xbox will unveil Xbox Live Sessions, a brand new, livestream hosted on the Mixer Xbox Channel that will feature some of the world’s most celebrated pop-culture icons as they play highly anticipated new titles on Xbox One.

Beginning on Friday, August 25th at 6:00 p.m. PDT, DJ Khaled will join Xbox for its first-ever Xbox Live Session, as DJ Khaled plays Madden NFL 18 on Xbox One S, all while discussing his projects, answering fan questions and giving away prizes throughout the livestream. Popular radio personality and founder of Dash Radio, DJ Skee will join DJ Khaled in-studio as one of the first hosts of Xbox Live Sessions.

“I am pumped to bring my A-game to Xbox Live Sessions and kick it off with Madden NFL 18,” said DJ Khaled. “Looking forward to hanging with the fans.”

Following the broadcast, fans are also encouraged to tune-in to Xbox Snapchat for exclusive behind-the-scenes footage, and a special DJ Khaled takeover.

“We are thrilled to help connect the biggest stars in pop culture like DJ Khaled to the world’s leading gaming social network with Xbox Live Sessions,” said Aaron Greenberg, GM of Games Marketing at Xbox. “DJ Khaled kicks off an incredible line-up of guests coming to not only chat, but interact with fans in titles like Madden NFL 18 over Xbox Live.”

Here are some of the exciting moments you can expect from future Xbox Live Sessions:

A-List Featured Guests
During each livestream hosted on Mixer, premiere guests – including some of the most iconic athletes, actors, musical talent, and more – will join Xbox to share stories and discuss their passions, while debuting exciting new titles on Xbox One.

Giveaways, Fan Interviews and More
Throughout each livestream, Xbox fans will be able to interact with their favorite celebrities, like never before, by submitting questions for celebrity guests to discuss during the live broadcast. Viewers will also have the opportunity to participate in multiple giveaways throughout each session.

Exclusive Gameplay
During Xbox Live Sessions, fans will have the chance to see exclusive gameplay of Xbox’s most anticipated titles, including sneak-peeks of popular games ahead of their official release.

Make sure you tune in to see DJ Khaled on Friday, August 25 at 6:00 p.m. PDT on the Mixer Xbox Channel.

View original content with multimedia:


The Ivey’s Hotel Delivers An Enhanced Guest Experience With 5Church Restaurant Partnership

5Church Charlotte is now the exclusive provider of room service, the operator of the new Sophia’s Lounge and one of two preferred vendors for on property catering at The Ivey’s Hotel. The hotel, lounge and restaurant are conveniently located in the same building at 127 N. Tryon Street, in the heart of Uptown, Charlotte. The 42-room boutique hotel is home to luxury accommodations and impeccable service, serving as the ideal oasis for visitors of Charlotte to experience a stay for work or leisure. With the new partnership, guests can enjoy a full culinary experience during their stay at the Ivey’s.

Featuring an array of Chef Jamie Lynch’s beloved favorites for breakfast, brunch, lunch and dinner, 5Church’s Room Service Menu will be available daily with mouthwatering options like Belgian Waffles with berry compote, Fried Chicken BLT with house made pimento cheese and Prime NY Strip with red wine jus. Hotel guests can also satisfy their late-night cravings with options like Wild Mushroom Flatbread and 5Church’s famed Lamb Burger, available on the Late-Night Menu Fridays and Saturdays from 11:00 p.m. to 1:00 a.m. 5Church also offers room service and catering to the 61 condos located in the three floors above the hotel.

Sophia’s Lounge is the Ivey’s Hotel’s bar and lounge on the ground floor of the Ivey’s building and is under operation and management by the team behind 5Church. The lounge has easy access to the public from 5th Street and hotel guests can enter the lounge through the second floor where the hotel’s guest rooms are situated. The space was outfitted by the Ivey’s Hotel team and features crystal chandeliers, European style art, vintage accents and custom furniture pieces. Already proven to be a local hit, Sophia’s Lounge features various unique, sharable plates created by Top Chef Alum Jamie Lynch including butter poached Alaskan King crab, filet minion toast and lamb tartare. Guests can choose from a menu of hand-selected fine wines, local beers and crafted cocktails by Master Mixologist and Sommelier, Patricia Smith. The most popular cocktail is the “Where is the Honey” which is comprised of New Amsterdam Vodka, rosemary honey simple syrup, fresh squeezed grapefruit juice.

5Church is also offering a special Catering Menu to guests of The Ivey’s Hotel, perfect for meetings and groups to enjoy in the hotel’s events space – The Tulip Room.

About the MRK Hotel Collection: The Ivey’s Hotel is the third and newest boutique hotel in The MRK Hotel Collection, which was imagined and then curated by the owners and their meticulous attention to details and comfort. Their two other hotels are the Windsor Boutique Hotel in Asheville, North Carolina and The Marlin Hotel in South Beach, Miami Florida and they operate the Désirant Shop in Asheville. While every hotel in the collection is centrally located in the heart of city center and delivers the same five-star experience guests expect, each hotel still has its own personality and draws inspiration from the vibe of its home city and people. The MRK Hotel Collection’s main goal is to provide its guests with The Ultimate Boutique Experience no matter where you stay with them. For more information on The Ivey’s Hotel, visit, follow @theiveyshotel or call 704-228-1111.

About Sophia’s Lounge: The wife of King George III, Sophia Charlotte was a patroness of the arts and a lover of botany. Designed with the Queen in mind, Sophia’s Lounge offers a royally outfitted setting in the heart of Uptown off 5th Street, located on the first floor of the hotel. In this space, opulence meets a vintage touch and vibrant European flair. Sip on crafted cocktails and nibble small bites and choose to sit at the custom-built wraparound bar, or in its many intimate corners in a high-backed chair or on a velvet sofa. Art adorns the walls under the glittering custom chandeliers along with the warm glow of candlelight. The menu is crafted by Top Chef Alum and Executive Chef, Jamie Lynch and craft cocktails are inspired by Mixologist, Patricia Smith. A truly luxurious cocktail bar, Sophia’s is sure to impress. For more information on Sophia’s Lounge visit or follow @SophiasLounge.

About 5Church Charlotte: Located at the intersection of 5th and Church Streets and within the Ivey’s building, the modern and innovative American menu is created by the popular Top Chef Alum and Executive Chef, Jamie Lynch. 5Church has won numerous awards, drawn various celebrity diners, and its bar hosts a lively social scene. For more information on 5Church or to make reservations, please visit or call 704-919-1322.

The Ivey’s Hotel Media Contact(s):

Janal Montagna, The Ivey’s Hotel, 508-577-1593

William Jones, MRK Investments, 704-756-6722

Related Links:

View original content:

SOURCE The Ivey’s Hotel

Related Links

Gadget Lab Podcast: Essential Wants to Get Into Your Pocket—and Your Smart Home

A new Android phone hits the market in a couple of weeks. Normally that’s unexciting news—Android phones are basically always raining from the sky. But this is the Essential phone, the first consumer product from the company co-founded by Andy Rubin, the man largely responsible for the Android operating system. So yeah, Essential’s debut hardware is a big deal. David Pierce has been covering Essential for months, and he tells us what to watch for in this sexy new handset offering.

Some notes: David’s review of the Essential phone. Brendan Nystedt writes about the snap-on 360 camera accessory. Also see David’s deep dive into the phone’s development, and his profile of Andy Rubin where they discuss Ambient OS, as well as Essential’s larger ambitions. Recommendations this week: the Back to the Roots aquaponics fish tank, the BioLite PowerLight Mini, and Logan Lucky.

Send the hosts feedback on their personal Twitter feeds. Arielle Pardes is @pardesoteric, David Pierce is @pierce, and Michael Calore is @snackfight. Bling the main hotline at @GadgetLab.

Go Back to Top. Skip To: Start of Article.

Global Tracked Excavators Market 2017-2021 – Latest Trend is the Integration of IoT in Construction Equipment for Remote Monitoring

The global tracked excavators market to grow at a CAGR of 3.03% during the period 2017-2021.

Global Tracked Excavators Market 2017-2021, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market landscape and its growth prospects over the coming years. The report also includes a discussion of the key vendors operating in this market.

The latest trend gaining momentum in the market is Integration of IoT in construction equipment for remote monitoring. Technology plays a vital role in every industry. Technology has evolved with time and the need for connected devices has increased in recent years. This is where Internet of Things (IoT) comes into the picture. With the implementation of IoT, the performance of tracked excavators is expected to increase by integrating remote monitoring systems with Global Positioning Systems (GPS). This will help in monitoring the performance and efficiency of the machine.

According to the report, one of the major drivers for this market is Increased government spending on infrastructure. There are multiple government infrastructure projects, with significant investments, planned in various countries between 2017 and 2021. Infrastructure development is of prime importance in any country as it is directly proportional to the economic growth of a nation.

Further, the report states that one of the major factors hindering the growth of this market is Construction equipment rental market. Most construction equipment are very costly, especially tracked excavators which require high initial investments.

Key vendors

  • Caterpillar
  • Komatsu
  • Hitachi Construction Machinery
  • Volvo Construction Equipment
  • XCMG Group

Other prominent vendors

  • BEML
  • J C Bamford Excavators
  • Deere & Company
  • Kobelco Construction Machinery
  • Terex
  • Menzi Muck
  • CNH Industrial
  • Doosan
  • Hyundai Heavy Industries
  • LiuGong
  • Liebherr
  • Mecalac
  • Tata Hitachi Construction Machinery
  • Takeuchi

Key Topics Covered:

Part 01: Executive summary

Part 02: Scope of the report

Part 03: Research Methodology

Part 04: Introduction

Part 05: Market landscape

Part 06: Market segmentation by type

Part 07: Market segmentation by geography

Part 08: Decision framework

Part 09: Drivers and challenges

Part 10: Market trends

Part 11: Vendor landscape

Part 12: Key vendor analysis

Part 13: Appendix

For more information about this report visit

Media Contact:

Laura Wood, Senior Manager

For E.S.T Office Hours Call +1-917-300-0470
For U.S./CAN Toll Free Call +1-800-526-8630
For GMT Office Hours Call +353-1-416-8900

U.S. Fax: 646-607-1907
Fax (outside U.S.): +353-1-481-1716

View original content:—latest-trend-is-the-integration-of-iot-in-construction-equipment-for-remote-monitoring-300506518.html

SOURCE Research and Markets

Related Links

Global $8.17 Billion Scratch Resistant Glass Markets 2014-2017 & 2025

The global scratch resistant glass market is expected to reach USD 8.17 billion by 2025

The growing sales for premium smartphones coupled with growing concerns regarding screen strength is expected to drive market growth.

The demand for scratch resistant glass is the highest LCD/LED manufacturing. The growing demand for sapphire glass and gorilla glass in display applications is expected to drive market growth over the forecast period. The introduction of new display devices with high resolution and increased screen size is boosting the application of scratch resistant glass as these products require glass equipped with anti-cracking properties.

North America accounted for the maximum market share owing to rise in startups involved in the manufacturing of sustainable lighting solutions and connected devices under the Internet of things (IoT) product category. The growing demand for OLED’s and wearables is expected to further augment the consumption of scratch resistant glass over the forecast period. Asia Pacific market is expected to grow rapidly over the forecast period owing to rising demand for budget smartphones.

Further key findings from the report suggest:

– Smartphone application segment is anticipated to grow at a CAGR of 10.8% from 2017 to 2025 owing to increasing demand for smartphones with high screen toughness.
– Automotive application segment is projected to grow at a CAGR of 9.9% from 2017 to 2025 owing to research on in car infotainment and improving the passenger safety.
Asia Pacific market share is expected to reach over 30% in 2025 owing to rise in local demand backed by growing smartphone manufacturing activity in the region.
Middle East & Africa is projected to grow at a CAGR of 8.1% from 2017 to 2025 owing to growing demand for smartphones and LED lighting solutions.
– The market players are engaged in research on developing technologies for the manufacturing of products at an affordable price as consumers still prefer screen protector films.

Key Topics Covered:

1 Methodology and Scope

2. Executive Summary

3. Scratch Resistant Glass Market Variables, Trends & Scope

4. Scratch Resistant Glass: Application Estimates & Trend Analysis

5. Scratch Resistant Glass Market: Regional Estimates & Trend Analysis

6. Competitive Landscape

Asahi Glass
– Corning Glass
– Nippon Electric Glass
Schott Glass
– Guardian Glass
– Kyocera
– Rayotek
– Rubicon Technology
– Saint Gobain
– Crystalwise Technology
– Crystran
– Swiss Jewel

For more information about this report visit

Media Contact:

Research and Markets
Laura Wood, Senior Manager

For E.S.T Office Hours Call +1-917-300-0470
For U.S./CAN Toll Free Call +1-800-526-8630
For GMT Office Hours Call +353-1-416-8900

U.S. Fax: 646-607-1907
Fax (outside U.S.): +353-1-481-1716

View original content:–2025-300506515.html

SOURCE Research and Markets

Related Links

Global Pharmaceutical Robots Market 2014-2017 & 2025 – Market is Anticipated to Reach USD 430.0 Million

The global pharmaceutical robots market is anticipated to reach USD 430.0 million by 2025

This growth can be attributed to the flourishing pharmaceutical industry.

The pharmaceutical industry is flourishing due to huge R&D investments by global players. With increasing drug discovery and clinical trials, there is growing demand for robotics. To minimize workload and maintain higher levels of accuracy, automation has become a significant part of pharmaceutical manufacturing. It increases efficiency, prevents performance of repetitive activities, and avoids human error & contamination.

Technological advancement is an important factor driving growth. The use of robots & automated machines in the field of pharmaceuticals is still in its nascent stage and expected to grow in the near future. The automation industry has incorporated a few new techniques such as collaborative robots and laboratory automation.

Pharmaceutical robotic machines also minimize manufacturing costs by reducing labor. These machines are 3 to 4 times faster than humans and have the capacity to work for 24 hours. Reduction in production cost is expected to raise return on investment in the long run, thus driving demand for these products in the future.

Key Topics Covered:

1 Research Methodology

2. Executive Summary

3. Pharmaceutical Robots Market Variables, Trends & Scope

4. Pharmaceutical Robots Market: Product Estimates & Trend Analysis

5. Pharmaceutical Robots Market: Application Estimates & Trend Analysis

6. Pharmaceutical Robots Market: End-use Estimates & Trend Analysis

7. Pharmaceutical Robots Market: Regional Estimates & Trend Analysis, by Product, Application, End-use

8. Competitive Landscape

  • Kawasaki Heavy Industries Ltd.
  • FANUC America Corporation
  • ABB Ltd.
  • Yaskawa Electric Corporation
  • Denso Wave Inc.
  • Seiko Epson Corporation
  • Marchesini Group S.p.A
  • Universal Robots A/S

For more information about this report visit

Media Contact:

Laura Wood, Senior Manager

For E.S.T Office Hours Call +1-917-300-0470
For U.S./CAN Toll Free Call +1-800-526-8630
For GMT Office Hours Call +353-1-416-8900

U.S. Fax: 646-607-1907
Fax (outside U.S.): +353-1-481-1716

View original content:–2025—market-is-anticipated-to-reach-usd-4300-million-300506506.html

SOURCE Research and Markets

Related Links

Ginger Fisher is recognized by Continental Who’s Who

SCOTTSDALE, Ariz., Aug. 18, 2017 /PRNewswire/ — Ginger Fisher is recognized by Continental Who’s Who as a Pinnacle Lifetime Member in the Food Service field. Fisher’s professional title is President and Partner at RPF Specialty Food Brokers. She has worked in her current position…

CalPortland Strike Ends And Larger Strike Avoided As Teamsters Local 174 Members Ratify A Contract With Sand And Gravel Companies

TUKWILA, Wash., Aug. 18, 2017 /PRNewswire-USNewswire/ — A full week after 86 Teamsters at CalPortland walked off the job and 208 other Teamsters in the sand and gravel industry prepared to do the same, everyone is now back to work after a deal was finally reached in the pre-dawn hours between Teamsters Local 174 and the five companies involved in bargaining. The contract was voted on by Local 174 members at CalPortland, Cadman, Stoneway Concrete, Salmon Bay Sand & Gravel, and Lehigh Cement at a 9:00AM meeting this morning. It was ratified by a 92% margin.

The four-year contract includes record-setting wage increases, increases in pension contributions, and full maintenance of benefits for healthcare over the entire length of the contract. Most importantly of all, it includes language that protects Teamster work in King County from being undercut by drivers brought in from outlying areas at lower wage rates.

“We are incredibly proud of the strength and dedication our members showed during this difficult process,” said Local 174 Secretary-Treasurer Rick Hicks. “A strike is hard on everyone involved, and our CalPortland members held the picket lines with courage and with patience. Without their sacrifice, we could never have gotten this incredible contract. They are an inspiration to us all.”

Members at CalPortland are glad to be going back to work, and they are proud of what they were able to accomplish through their outstanding teamwork on the picket line.

“Being on strike is no vacation. It’s seven days a week, constant anxiety, and it would have been a hell of a lot easier to just go to work and go home at the end of the day,” said CalPortland Teamster Mark Hislop. “But we are Teamsters. We don’t do what is easy – we do what is right. When our employer is disrespecting us, we stand up for ourselves. And there’s nothing better for building character, strength, and solidarity than standing together all day and all night with our Brothers and Sisters fighting for the things that are most important: our livelihoods and our families.”

Teamsters at the other four sand and gravel companies are also grateful for CalPortland Teamsters’ sacrifices on the strike line. “These guys led the charge,” said Cadman Teamster Dave McDowell. “We are indebted to them for that. Our families are indebted to them for that.”

The deal that has been agreed to was able to address and accomplish all of the major goals that Local 174 members identified prior to negotiations.

“This has been an uphill battle from Day One, but we got it done, just like we always manage to,” said Local 174 Director of Negotiations Patty Warren. “We got to where we needed to be, and we are happy that this has all been resolved.”

“We are proud to have reached yet another industry-leading and record-setting contract,” Local 174 Secretary-Treasurer Rick Hicks said about the new deal. “Local 174 has a reputation for getting the best contracts, but the only reason we are able to do that is because we have the best members. Our members in this industry have been rock solid since the very beginning, and have had complete trust in us and trust in the process. Through their strength, solidarity, and commitment to following through to the bitter end, we were able to reach a life-changing deal that will bring them the job security and economic rewards that they deserve for the hard work they do, day in and day out.”

Members in the industry are also incredibly thankful for the support they got from other Unions and organizations, especially those within the Building and Construction Trades whose work has been impacted by the CalPortland strike. Various organizations including the International Brotherhood of Electrical Workers, the Iron Workers, the Operators, the Laborers, the Cement Masons, the Firefighters, the Sheet Metal Workers, the Carpenters, and more, delivered essential moral support, as well as bringing food and beverages to the CalPortland strike lines. Many of them even stood and held picket signs in support of their Teamster Brothers and Sisters.

“An injury to one is an injury to all,” an International Longshore and Warehouse Union member posted on the Teamsters Local 174 Facebook page, echoing an attitude that had been seen on the picket lines all week.

“There will always be those that say that going on strike doesn’t get you anything,” said CalPortland Teamster Mike Sparrow. “I think that this pretty clearly proves otherwise. We got a great deal, we got the respect we deserved, and we got the chance to prove once and for all that ‘rock solid’ isn’t just a motto – it’s a fact.”

Founded in 1909, Teamsters Local 174 represents 7,200 working men and women in the Seattle area. “Like” us on Facebook at

Jamie Fleming, (206) 441-6060

View original content with multimedia:

SOURCE Teamsters Local 174

Eeek! DNA-born malware at ESC Minneapolis 2017

August 18, 2017

Max The Magnificent-August 18, 2017

As I’ve said on several occasions, things are beginning to move very, very quickly in Embedded Space (where no one can hear you scream).

Just a couple of years ago, things like machine learning (ML) and artificial intelligence (AI) were topics that were primarily of academic interest only. Now these technologies are being deployed in all sorts of real-world embedded systems, and we’re only just scratching the surface of what’s possible.

Day-by-day, I see more and more weird and wonderful items of techno-weenie news crossing my desk, such as a system with the ability to listen to a group of people talking — along with noise sources like air conditioners and television news programs playing in the background — analyze the entire sound space, disassemble it into the individual elements, and then isolate all of the elements and listen to them in real-time, including tracking the locations of individual speakers as they more around the room (see A game-changer for embedded speech).

Or how about a start-up company whose deep-learning/neural-network-based systems can analyze as little as a minute of someone speaking and use this to generate a unique key. This key can subsequently be used to generate any speech, mimicking its corresponding voice, augmented with any desired emotion (see Thinking of using voice authentication? Think again!).

The thing is that, although some of this stuff is exciting, a lot of it is starting to get somewhat scary. Consider, for example, the AI system at Facebook that invented its own language. Researchers pulled the plug when they realized they didn’t understand what the AI agents were saying to each other (see Researchers shut down AI that invented its own language).

Or how about the fact that researchers at the University of Washington have demonstrated that biohackers, using widely available tools, could embed malware in synthesized strands of deoxyribonucleic acid that would allow them to take over the computer analyzing the DNA (see New Security Worry: DNA-borne Malware).

So where should you go to learn about all the things you can look forward to, and all the things you have to start worrying about? Well, a good place to start is the Embedded Systems Conference (ESC), November 8-9, in Minneapolis.

In particular, you should attend my talk on Advanced Technologies for 21st Century Embedded Systems, in which we will delve into cognitive (thinking / reasoning) embedded systems, artificial neural networks, deep learning, machine vision, virtual and augmented realities, and how all these technologies are coming together.

Happily, this talk will be in the ESC Engineering Theater, which means anyone can attend so long as they are flaunting a Free Expo Pass, but you do have to register. Hopefully I’ll see you there. I’ll be the one in the Hawaiian shirt. As always, all you have to do is shout “Max, Beer!” or “Max, Bacon!” to be assured of my undivided attention.

No Eclipse Glasses? No Problem

BATTLE CREEK, Mich., Aug. 18, 2017 /PRNewswire/ — If you missed out on buying those highly sought-after eclipse glasses, don’t worry. As the solar eclipse becomes visible across much of the United States on Monday, Aug. 21, 2017, there are still ways to view the phenomenon without…

National Geographic Celebrates Historic Solar Eclipse with Live Coverage of the Event Online, Web Portal Featuring Exclusive Visuals and Educational Materials, and More

WASHINGTON, Aug. 18, 2017 /PRNewswire-USNewswire/ — As millions of people across the country are gearing up for the first total solar eclipse to cross the U.S. in nearly a century, National Geographic is offering a full day of coverage, including live commentary from science experts on the ground and stunning visuals, to help people witness this remarkable event. National Geographic has created a number of original resources to enhance viewers’ experience and convey the extraordinary nature of this event, including a solar eclipse hub,101 video explainer, a detailed map of the path of totality across the U.S. and more.

In addition, National Geographic has teamed up with Airbnb to provide live coast to coast coverage of the eclipse starting the night before the event where two National Geographic Explorers will host a live digital broadcast from a Airbnb Geodesic Dome in Terrebonne, Oregon. Internationally recognized scholar and astrophysicist Dr. Jedidah Isler and acclaimed National Geographic photographer and science journalist Babak Tafreshi will discuss the science behind the eclipse and answer viewers’ questions in anticipation of the next day’s historic event.

The live coverage will continue the next day as the total solar eclipse begins its path across the US. Viewers will hear from National Geographic experts stationed along the path of totality, see stunning photos, and be among the first to see the eclipse as it reaches the continental US. Hosting the broadcast will be award-winning science communicator, journalist and podcaster Cara Santa Maria. She will be joined by Former International Space Station and National Geographic author of View from Above Terry Virts. Viewers will have the opportunity to have their questions answered during the broadcast by using #NatGeoEclipse.

National Geographic science experts and explorers stationed throughout the country as part of the broadcast and available for interviews include: Andrew Fazekas from Isle of Palm, South Carolina and Victoria Jaggard from Sweetwater, Tennessee.

The live coverage will broadcast over Facebook Live, Twitter via Periscope, and on YouTube beginning at 10 p.m. EST/7 p.m. PST on August 20th and 9:30 a.m. PT/12:30 p.m. ET on August 21st.

National Geographic and Airbnb are also offering one lucky winner and a guest a once-in-a-lifetime opportunity to sleep under the stars in the outskirts of Bend, Oregon before taking flight the morning of August 21 to be among the first to witness the solar eclipse before it crosses the US. Guests will interact with Dr. Jedidah Islerand and Babak Tafreshi during their stay. Please visit Airbnb’s Night At Solar Eclipse page to learn more.

Please visit our solar eclipse content at eclipse and tune in to our live coverage of the solar eclipse beginning 9:30 a.m. PT/12:30 p.m. ET on August 21st.

About National Geographic Partners LLC

National Geographic Partners LLC (NGP), a joint venture between National Geographic and 21st Century Fox, is committed to bringing the world premium science, adventure and exploration content across an unrivaled portfolio of media assets. NGP combines the global National Geographic television channels (National Geographic Channel, Nat Geo WILD, Nat Geo MUNDO, Nat Geo PEOPLE) with National Geographic’s media and consumer-oriented assets, including National Geographic magazines; National Geographic studios; related digital and social media platforms; books; maps; children’s media; and ancillary activities that include travel, global experiences and events, archival sales, licensing and e-commerce businesses. Furthering knowledge and understanding of our world has been the core purpose of National Geographic for 129 years, and now we are committed to going deeper, pushing boundaries, going further for our consumers … and reaching over 730 million people around the world in 172 countries and 43 languages every month as we do it. NGP returns 27 percent of our proceeds to the nonprofit National Geographic Society to fund work in the areas of science, exploration, conservation and education. For more information visit or, or find us on Facebook, Twitter, Instagram, Google+, YouTubeLinkedIn and Pinterest.

About Airbnb

Founded in 2008, Airbnb’s mission is to create a world where people can belong when they travel by being connected to local cultures and having unique travel experiences. Its community marketplace provides access to millions of unique accommodations from apartments and villas to castles and treehouses in more than 65,000 cities and 191 countries. With Experiences, Airbnb offers unprecedented access to local communities and interests, while Places lets people discover the hidden gems of a city as recommended by the people that live there. Airbnb is people powered and the easiest way to earn a little extra income from extra space in a home or from sharing passions, interests and cities.

View original content with multimedia:

SOURCE National Geographic Partners

Related Links

xG Technology Closes $3,200,005 Registered Direct Offering and Concurrent Private Placement

SARASOTA, Fla., Aug. 18, 2017 /PRNewswire/ — xG® Technology, Inc. (“xG”, “xG Technology”, or the “Company”) (Nasdaq: XGTI, XGTIW), a leading provider of wireless video solutions to broadcast, law enforcement and defense markets, and private mobile broadband networks for critical communications, today announced the closing of its previously announced registered direct offering of 1,560,978 shares of its common stock at a an offering price of $2.05 per share and its concurrent private placement of common stock purchase warrants (the “Warrants”) to purchase 780,489 shares of common stock. The Warrants have a per share exercise price of $2.50, are exercisable immediately and will expire five (5) years from the date of issuance.

Gross proceeds to xG from these offerings are approximately $3,200,000, before deducting placement agent fees and other estimated offering expenses.

The Company intends to use the net proceeds from these offerings for working capital and other general corporate purposes.

Aegis Capital Corp. acted as the sole placement agent in connection with these offerings. Maxim Group LLC served as a financial advisor to xG.

The Shares were offered by the Company pursuant to a registration statement (File No. 333-197820) filed with the Securities and Exchange Commission (the “SEC”) that was declared effective on August 21, 2014, as supplemented by the prospectus supplement dated August 15, 2017, and filed with the SEC on August 17, 2017. The registration statement and prospectus are available on the SEC’s website located at Copies of the prospectus supplement and the accompanying base prospectus relating to this offering may be obtained, when available, from Aegis Capital Corp., 810 7th Avenue, 18th Floor, New York, NY 10019 or via telephone at 212-813-1010 or email:

The Warrants were offered pursuant to the exemption from registration afforded by Section 4(a)(2) under the Securities Act of 1933, as amended (the “Act”), and Regulation D promulgated thereunder. Such Warrants and the common shares issuable upon exercise of such Warrants have not been registered under the Act, and may not be offered or sold in the United States absent registration with the SEC or an applicable exemption from such registration requirements.

This press release shall not constitute an offer to sell or the solicitation of an offer to buy nor shall there be any sale of these securities in any state or jurisdiction in which such offer, solicitation or sale would be unlawful prior to registration or qualification under the securities laws of any such state or jurisdiction.

About xG Technology, Inc.

xG Technology’s brands provide wireless video solutions to broadcast, law enforcement and defense markets, and private mobile broadband networks for use in challenging environments. xG’s brand portfolio includes Integrated Microwave Technologies (IMT), Vislink, and xMax.

IMT has pioneered advanced digital microwave systems and is a trusted supplier to broadcast, sports and entertainment, and MAG (Military, Aerospace & Government) markets. Their products are recognized for their high level of performance, reliability, build quality, extended operating ranges and compact form factors. More information about IMT can be found at Vislink specializes in the wireless capture, delivery and management of secure, high-quality, live video, and serves broadcast & media and public safety & surveillance markets. More information about Vislink can be found at

 xMax is a secure, rapid-deploy mobile broadband system that delivers mission-assured wireless connectivity in demanding operating environments. It was designed to serve as an expeditionary and critical communications network for use in unpredictable scenarios and during fluid situations, making it ideal for disaster response, emergency communications, and defense applications. More information about xMax can be found at In addition to the above business lines, xG has a dedicated Federal Sector Group (xG Federal) focused on providing next-generation spectrum sharing solutions to national defense, scientific research and other federal organizations. Additional information about xG Federal can be found at

Based in Sarasota, Florida, xG Technology has over 100 patents and pending patent applications. xG is a publicly traded company listed on the NASDAQ Capital Market (symbol: XGTI) For more information, please visit

Cautionary Statement Regarding Forward Looking Statements

Statements contained herein that are not based upon current or historical fact are forward-looking in nature and constitute forward-looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. Such forward-looking statements reflect the Company’s expectations about its future operating results, performance and opportunities that involve substantial risks and uncertainties and regarding the closing of the offering and anticipated use of proceeds. These statements include but are not limited to statements regarding the intended terms of the offering, closing of the offering and use of any proceeds from the offering. When used herein, the words “anticipate,” “believe,” “estimate,” “upcoming,” “plan,” “target”, “intend” and “expect” and similar expressions, as they relate to xG Technology, Inc., its subsidiaries, or its management, are intended to identify such forward-looking statements. These forward-looking statements are based on information currently available to the Company and are subject to a number of risks, uncertainties, and other factors that could cause the Company’s actual results, performance, prospects, and opportunities to differ materially from those expressed in, or implied by, these forward-looking statements.


xG Technology:
Daniel Carpini

View original content with multimedia:

SOURCE xG Technology, Inc.

Related Links

Global $12.82 Billion Fingerprint Sensors Market Analysis and Forecasts 2017-2023

Fingerprint Sensors Market Anticipated to Reach $12.82 Billion by 2023

Fingerprint sensors market has undergone a transformation in the last couple of years and these sensors offer security, ease of access and reliability. This form of authentication is considered to be one of the most viable deterrent to people with malevolent intentions. It has helped to identify known suspects traversing crowded security areas such as airports, railway stations and others. Further, multiple terror attacks have been prevented using the innovations in this physical security form.

In terms of fingerprint sensors split by technology, capacitive sensors had the largest share in 2016. However Optical sensors are expected to witness the fastest growth. Significant developments and innovations are taking place in optical sensors. A major factor that drives the growth of optical sensors is significant increase in demand of optical sensors across wide range of applications.

In terms of application, Mobile Devices had the largest share in 2016. This growth can be attributed increasing interest of car manufacturers towards implementing fingerprint solutions in their cars so as to strengthen car’s security.

Some of the key companies in the market are Synaptics, Precise Biometrics, Next Biometrics, NEC Corporation, Fingerprint Cards AB and Bio-Key International. These companies are actively aiming for an increased participation through partnerships and new product launches in order to expand their operations and offerings to target potential clientele.

Key Topics Covered:

Executive Summary

1 Research Scope and Methodology

2 Market Dynamics
2.1 Market Drivers
2.1.1 Massive Proliferation of Smartphones and Tablets
2.1.2 Provision of Second/Third level of Security Using Fingerprint Authentication Devices
2.1.3 Increased Security and Convenience for Consumers
2.1.4 Adoption of Biometrics by Various Governments
2.2 Market Challenges
2.2.1 Latent Fingerprinting and Spoofing
2.2.2 Integration of Fingerprint Sensors Technology into Existing Software
2.3 Market Opportunities
2.3.1 Increasing Adoption of Fingerprint Authentication in Banking and Healthcare Sector Banking and Financial Institutions Healthcare
2.3.2 Increasing Adoption of E-Commerce Services

3 Competitive Insights
3.1 Key Strategies and Developments
3.2 Industry Attractiveness
3.3 Value Chain Analysis

4 Global Fingerprint Sensors Market by Type
4.1 Assumptions and Limitations
4.2 Market Overview
4.3 Swipe Sensors
4.4 Area Sensors
4.5 Touch Sensors

5 Fingerprint Sensors Market by Technology
5.1 Market Overview
5.2 Optical Sensors
5.3 Thermal Sensors
5.4 Ultrasonic Sensor
5.5 Capacitive Sensors
5.6 Others

6 Fingerprint Sensors Market by Application
6.1 Market Overview
6.2 Mobile Devices
6.3 Travel
6.4 Commercial
6.5 Smart Cards
6.6 Residential
6.7 Automotive
6.8 Healthcare
6.9 Government

7 Fingerprint Sensors Market by Geography

8 Company Profiles

  • 3M Cogent
  • 4G Identity Solutions
  • Anviz Global
  • Aware Inc.
  • BIO-Key International
  • Crossmatch Technologies
  • Diamond Fortress Technologies
  • Fingerprint Cards AB
  • FlexEnable
  • Fulcrum Biometrics
  • GenKey
  • HID Global
  • Innovatrics
  • iPulse Systems
  • M2SYS Technology
  • NEC Corporation
  • NEXT Biometrics
  • Precise Biometrics
  • Safran Identity & Security (Morpho)
  • Synaptics

For more information about this report visit

Media Contact:

Research and Markets
Laura Wood, Senior Manager

For E.S.T Office Hours Call +1-917-300-0470
For U.S./CAN Toll Free Call +1-800-526-8630
For GMT Office Hours Call +353-1-416-8900

U.S. Fax: 646-607-1907
Fax (outside U.S.): +353-1-481-1716

View original content:

SOURCE Research and Markets

Related Links

High school teachers become students for a week to learn about radar systems

From July 9 to 22, the Lincoln Laboratory Radar Introduction for Student Engineers (LLRISE) summer program provided 18 high school students from across the country with a project-based course on radar fundamentals. For the first time since LLRISE’s inception, two high school physics teachers participated in the first week of the program. The teachers, both of whom were from Michigan, took part in all aspects of the curriculum along with the students; they attended lectures on the basics of radar systems, assembled radar systems that could perform range-Doppler imaging, learned about computer-aided design and 3-D printing, and went on tours of Lincoln Laboratory’s facilities.

The teachers were interested in evaluating how the radar workshops could be incorporated into their own physics classes. They were particularly excited about integrating the radar lessons into labs and projects and supplementing conceptual lectures with hands-on building activities.

“We already have the theory, but it’ll be great for students to know how the radar is applied and how to build it. And it’s great to not just be able to talk about the Doppler effect, but to also have examples of how it affects the real world and how it all ties together,” said Scott Brunner, who has been teaching physics for 10 years and currently teaches 11th- and 12th-grade physics at University Liggett School in Grosse Pointe Woods, Michigan. He plans to implement lessons about the construction and use of radar into the electricity and magnetism class at his school. With so much material to cover in the school year, he said, the radar lessons will likely be part of the after-school curriculum.

The teachers said one of the things that made their learning experience at LLRISE so productive was the Lincoln Laboratory staff instructors. “I’ve been impressed by the instructors — how real they are, how approachable they are. These are some of the smartest people in their fields, but they don’t dumb anything down for the students,” said Gary Campbell, a physics teacher of 20 years at Rochester High School in Rochester, Michigan.

The students certainly were able to keep up with the material and asked advanced questions, Brunner said. As they spent the week together, the teachers and students developed a friendly relationship based on mutual learning. They ate lunch together every day, and the teachers helped students through difficult problems. In return, the teachers said they often gained insight into alternative ways of learning from the students.

“It was great having teachers in the classroom,” said Chiamaka Agbasi-Porter, one of the developers of LLRISE. “This year, there was a different dynamic in the classroom when teachers were present, as compared to previous years without teachers. The teachers were able to help explain some concepts to students who found the material a little challenging. It was great to see the teachers enthusiastically building their radar and thinking about how to incorporate the LLRISE curriculum into their schools.”

While Campbell and Brunner were eager to bring back new material to their classrooms, they expressed regret about having to part with the students and the LLRISE program so soon. “I’m actually disappointed to be leaving,” said Brunner at the end of the week, saying he wished he could have seen how the students’ radar projects turned out. But both teachers said they enjoyed being the first teachers to collaborate with LLRISE and are looking forward to providing feedback about their experience to help the program next year.

For the future, the LLRISE organizers are developing online classes consisting of lectures and instructions for building small radar systems. Both students and teachers can access these lessons from home. In addition, local teachers will have the opportunity to meet with Lincoln Laboratory staff mentors throughout the school year. The mentors will provide the teachers with guidance for introducing the radar curriculum into their classrooms. 

“We want LLRISE for Teachers to be meaningful and effective for all teachers, and we want to provide a framework for long-term integration of new technology,” said Agbasi-Porter. “With Lincoln Laboratory mentors present, we can empower teachers to teach a really focused topic such as radar.”

Global Photonic Crystals Market – Analysis & Forecast – 2017 to 2021 Focus on Type; Applications and Region

The global photonic crystals market is expected to reach $53,607.1 million by 2021, growing at a CAGR of 8.5% between 2017 and 2021.

The photonic crystals market is driven by a number of factors such as superior properties of photonic crystals, increasing demand from various end-use applications, as well as photonic crystals in LED. However, fabrication of 3D photonic crystals is hampering the growth of the photonic crystals market. Substantial investment in research & developmental activities, increasing demand of photonic crystals in solar & photovoltaic cell, especially in the emerging economies such as India, China, and Brazil, are expected to create opportunities in the photonic crystals market.

The photonic crystals market is segmented into three types: one-dimensional, two-dimensional and three-dimensional. The two-dimensional photonic crystal dominated the global photonic crystals market with a market share of approximately 66.5% in 2016. During the forecast period, the 3D photonic crystals market is expected to grow at a faster rate in comparison to other photonic crystals. Factors such as wider variety of applications are further aiding the market growth.

On the basis of application, photonic crystals market is segmented into seven major applications which include optical fiber, LED, image sensor, solar & PV cell, laser, discrete and integrated optical components and others. The optical fiber application segment dominated the global photonic crystals market with a market share of approximately 33.7% in 2016. The rising demand for fiber optics is due to the increase in the demand of the smartphone, since it utilizes optical fibers for LED light.

Solar & PV application segment is expected to register the highest CAGR in the forecast period. This is because solar energy is one of the potential options to replace fossil fuels, as it is pollution free and also, available in abundance. Further, the solar cell or PV cells are also used to convert solar energy into electricity. Photonic crystals are used to stimulate enhanced light trapping in solar cells to make use of solar energy.

On the basis of end-use industry, photonic crystals market is divided into four segments which include industrial, aerospace & defense, life sciences & healthcare & others (research & development). Industrial segment dominated the global photonic crystals market. This dominance is expected due to the increase in the usage of photonic crystal in telecommunication, electronics, laser, and solar energy based products, among others, as photonic crystals are used to stimulate enhanced light trapping to make use of solar energy.

Key Topics Covered:

Executive Summary

1 Research Scope and Methodology

2 Market Dynamics

3 Competitive Insights

4 Industrial Analysis

5 Global Photonic Crystals Market, by Type

6 Global Photonic Crystals Market, by Application

7 Global Photonic Crystals Market, by End-Use Industry

8 Global Photonic Crystals Market, by Region

9 Company Profiles

  • Corning Incorporated
  • Dk Photonics Technology Limited
  • Furukawa Electric Co., Ltd.
  • Glophotonics
  • Gooch & Housego Plc
  • Hamamatsu Photonics K.K.
  • IPG Photonics Corporation
  • Labsphere, Inc.
  • Lockheed Martin Corporation
  • Luxtera, Inc.
  • Mks Instruments, Inc.
  • Microcontinuum, Inc.
  • Nkt Photonics A/S
  • Neophotonics Corporation
  • Opalux Inc.
  • Photonic Lattice, Inc.
  • Technica Optical Components, Llc
  • Teraxion

For more information about this report visit

About Research and Markets
Research and Markets is the world’s leading source for international market research reports and market data. We provide you with the latest data on international and regional markets, key industries, the top companies, new products and the latest trends.

Media Contact:

Research and Markets
Laura Wood, Senior Manager

For E.S.T Office Hours Call +1-917-300-0470
For U.S./CAN Toll Free Call +1-800-526-8630
For GMT Office Hours Call +353-1-416-8900

U.S. Fax: 646-607-1907
Fax (outside U.S.): +353-1-481-1716

View original content:—analysis–forecast—2017-to-2021-focus-on-type-applications-and-region-300506503.html

SOURCE Research and Markets

Related Links

Consumo de chá cresce no país e loja virtual CaféLand aposta nas opções em cápsulas para Nespresso

RIO DE JANEIRO, 18 de agosto de 2017 /PRNewswire/ — A grande diversidade de folhas, flores e raízes usadas para fazer diferentes tipos de chá tem chamado cada vez mais atenção pela riqueza de nutrientes que podem influenciar o organismo humano. Para além do conhecimento tradicional, pesquisas recentes vêm estudando os benefícios dos chás, como o fortalecimento do sistema imunológico, a diminuição da ansiedade, a melhora da digestão, o controle da pressão arterial e a queima calórica.

Tudo isso associado à crescente busca por uma alimentação mais natural e saudável intensificaram o hábito do consumo da bebida no Brasil. Levantamento do Instituto Euromonitor mostra que as vendas de chá no Brasil vêm aumentando: apenas entre 2010 e 2012, este mercado cresceu quase 30%, de US$ 288 milhões, em 2010, para US$ 373 milhões, em 2012.

Este impulso tem feito multiplicar o surgimento de diversos novos sabores e versões do produto, como os chás em cápsulas. Nesse caso, a praticidade é a palavra-chave: na loja virtual CaféLand (, por exemplo, é possível encontrar cápsulas de chá compatíveis com as máquinas Nespresso, para quem quer ter uma bebida perfeita e quentinha a qualquer hora.

Chá verde com hortelã, camomila com erva doce, capim limão com menta, chá mate com especiarias, Citrus Twist Tea – um mix de laranja, rosa silvestre, maçã, camomila, capim cidreira, hibisco e jasmin – e chá tropical, com hibisco, capim limão, laranja e abacaxi (a partir de R$ 14,12 cada caixa com 10 cápsulas) são apenas algumas das opções disponíveis na CaféLand.

Para dar uma força a quem está começando a se preparar para o verão, a loja virtual ainda criou o Combo Chá Emagrecedor Aroma, com 20 cápsulas do chá de Frutas Vermelhas, um mix de hibisco, rosa canina, laranja e maçã, e 10 cápsulas do Chá Detox, com chá verde, maçã com canela, carqueja e abacaxi (R$ 35,80 o kit). Além de prático, os chás em cápsulas compatíveis com máquinas de espresso oferecem variedade de sabores para conquistar até os paladares mais exigentes.

Mais informações:
Priorité Comunicação –
Telefone: 55 21 2284-2189 –

Foto –

FONTE CaféLand


Related Links

Kennametal To Participate In Non-Deal Roadshow Hosted By Seaport Global Securities On August 24, 2017

PITTSBURGH, Aug. 18, 2017 /PRNewswire/ — Kennametal Inc. (NYSE: KMT) announced today they will participate in a non-deal roadshow hosted by Seaport Global Securities on Thursday, August 24, 2017 in Denver.   In attendance will be Chuck Byrnes, President, Industrial Business and Kelly Boyer, Vice President, Investor Relations. The presentation slides will be available on the company’s website on August 23, 2017.  Once on the homepage, select “About Us”, “Investor Relations” and then “Events”. 

Global Internet of Things (IOT) In Oil and Gas (O&G) Market 2017-2026 – Market is Anticipated to Grow to $30.57 Billion

Global IoT in O&G market is anticipated to grow to $30.57 billion by 2026

It is expected to be mainly driven by shortage of skilled labor, increasing number of cyber-attacks, aging infrastructure, and need to increase operational efficiency, which will act as key drivers for the growth of this market.

Prices of crude oil and gas are fluctuating constantly owing to which, the oil and gas industry is currently facing a challenging environment. To predict their future business plan precisely and improve profitability, O&G companies need to improve their operational efficiencies across all the different segments of value chain. This has led to the adoption of IoT solutions by oil and gas industry. In addition to that, factors such as aging infrastructure and manpower will also be a major contributor to the increase in IoT use.

Companies such as British Petroleum (BP), Apache Corporation, and Saudi Aramco among others have started leveraging on IoT solutions such as platforms and analytics. Recent numerous partnerships between IoT and O&G companies along with several product launches of IoT solutions for oil and gas industries is a clear indicator that there will be an increase in demand for IoT solutions by O&G industry.

Analytics accounted for a major market share in comparison to other IoT solution platform in terms of value. It accounted for approximately 76% share in total IoT in O&G market for 2016. Analytics and platforms are expected to witness a high growth rate owing to increase in use of sensors and devices will drive the need for device management and data analytics among others, the oil and gas industry being asset intensive industry with more than half of the infrastructure is aging, and increase in use of new advanced technologies for exploration, among others.

Upstream application held a major share in terms of market value in 2016 among all the mentioned application types.  In the coming future, upstream application is expected to grow owing to the use of advanced technologies during exploration and drilling phase such as hydraulic manufacturing and 3D seismic technologies among others, boom in the U.S. for shale oil production, reduction of capital expenditures on new projects for exploration and drilling and increasing rig uptime among others.

North America dominated the global IoT in O&G market in 2016 and accounted for approximately 38% of the global IoT in O&G market. Furthermore, owing to various factors such as growth in production rate of unconventional energy sources such as shale oil and tight oil, among others, recent announcement for expansion of pipelines and offshore shipping to transport oil is expected to drive the midstream market in the U.S., and high level of awareness, knowledge coupled with technical advancements in the region among others.

Key Topics Covered:

Executive Summary

1 Research Scope and Methodology

2 Market Dynamics

3 Competitive Insights

4 Industry Attractiveness

5 Industry Analysis

7 Global IoT in oil and gas Industry by Solutions

8 Global IoT in oil and gas Industry by Application

9 Global IoT in oil and gas Industry by Region

10 Company Profiles

  • ABB Ltd.
  • AGT International
  • C3 IoT
  • Carriots S.L.
  • Cisco Systems
  • Davra Networks
  • Eurotech SpA
  • General Electric Company
  • Honeywell International Inc.
  • Intel Corporation
  • International Business Machines Corporation
  • Kore Telematics
  • Microsoft Corporation
  • Numerex Corp.
  • Parametric Technology (PTC)
  • Pertex Management and Technology Consulting LLC
  • SAP SE
  • Schneider Electric
  • Siemens AG
  • Telit
  • Wind River

For more information about this report visit

Media Contact:

Research and Markets
Laura Wood, Senior Manager

For E.S.T Office Hours Call +1-917-300-0470
For U.S./CAN Toll Free Call +1-800-526-8630
For GMT Office Hours Call +353-1-416-8900

U.S. Fax: 646-607-1907
Fax (outside U.S.): +353-1-481-1716

View original content:—market-is-anticipated-to-grow-to-3057-billion-300506501.html

SOURCE Research and Markets

Related Links

Save Filter