Stogran pulls out of NDP leadership race blaming party insiders

first_imgTORONTO – One of the candidates for the NDP leadership race is quitting, blaming party insiders who he says don’t want to see him win.Pat Stogran posted a video Saturday on YouTube, saying the inside workings of the NDP are “fundamentally flawed.”“The fight to take on politics incorporated while also trying to take on the insiders of a political party that has no desire to see me win has proven insurmountable,” he said in the five-minute video.He also said the party has put “major obstacles” in place for candidates trying to grow the party’s base from the grassroots.Stogran is a retired Canadian Armed Forces colonel who served for over 30 years, including in Afghanistan, and said serving for the greater good was his “calling in life.”He acquired a reputation for being outspoken as the former federal veterans ombudsman under the former Conservative government.He announced his bid to run in the NDP’s leadership race in April.But in his video, Stogran said, “As I enter my golden years, I came to the conclusion that my love for family far outweighs my love for politics, especially selfish, incompetent politics.”Stogran said the NDP will never form a government until the party itself is reformed and he doesn’t see any possibility of reform.NDP National Director Robert Fox issued a statement saying the party has treated all leadership candidates the same.“We believe the rules are fair and favour an open race. We welcome new ideas as the discussion around party renewal is a key focus of this leadership race,” Fox said.Stogran said he resigns with “huge sadness” from the race, and thanked his supporters and campaign team that stood behind him in his effort “to defeat politics incorporated.”Fellow leadership candidates took to Twitter to send best wishes to Stogran.MP Peter Julian tweeted, “Sad to learn that @PatStogranNDP is withdrawing from the #NDPldr race – thank you for your contribution to the debate.”MP Charlie Angus also tweeted, “Sorry to hear @PatStogran leaving the #ndpldr race. He served Canada with passion. He is an important voice for change. I wish him the best.”There are now five official candidates in the race to succeed current leader Tom Mulcair, who didn’t survive a leadership review.last_img read more

Read More »

Doctors demand arrest of miscreants who ransacked hospital

first_imgKolkata: A team of doctors under the banner of Bengal Nursing Home and Hospital association on Monday met senior police officers in the district demanding arrest of the hooligans, who had ransacked a portion of a private nursing home in Duttapukar area of North 24-Parganas.The district police are yet to arrest the culprits, who had carried out the attack triggering tension among the patients undergoing treatment. The incident occurred on last Saturday when a group of people went on rampage, ransacking Seva Sadan nursing home in Duttapukur. Police reached the spot and brought the situation under control. Also Read – Speeding Jaguar crashes into Merc, 2 B’deshi bystanders killedIt was alleged that the miscreants also looted some important documents and a cheque book.Police said one Sourav Pal (26), a resident of Kalachandpara area was taken to the nursing home after he complained of fever. The doctors in the nursing home urged the family members of the victim to shift the patient to a city hospital as his condition deteriorated following his admission on June 24. But the family members allegedly turned a deaf ear to the appeal of the nursing home authorities. On July 4, the nursing home authorities forced the family members of the patient to take him to RG Kar Medical College and Hospital. The patient died in RG Kar Medical College and Hospital on Sunday after being treated for the past few days. Also Read – Naihati: 10 councillors return to TMC from BJPThe incident had triggered violence when some of the family members of the victim backed by some local hooligans attacked the staff members of the nursing home. The nursing home authorities lodged a specific complaint at the local police station against 5 persons, who had led the attack.A team of doctors led by Dr Goutam Mistri and Dr NB Kanjilal met the district police officers and urged them to arrest the accused. A detailed probe has been initiated.last_img read more

Read More »

Passwords Are Slowly Becoming a Thing of the Past

first_img Opinions expressed by Entrepreneur contributors are their own. Between the time you sit down at your desk in the morning and the moment you shut down your computer in the evening, how many times do you think you input a password for an account, program or device? A recent survey found the average person has 27 logins that require a password and uses more than half of them in a given day.Is this really the most convenient and secure strategy for handling confidential information in the workplace?Related: Password Statistics: The Bad, the Worse and the Ugly (Infographic)The cumbersome nature of passwords.How many different passwords do you think you have? Most people fall into one of two camps. They either have one password that they use across all accounts and platforms, or they have a different password for every account. The problem is that neither of these approaches is very good.If you only use one password, you’re putting yourself at risk for being compromised. If you use different passwords, you constantly have to guess and reset pass codes just to log into various accounts.In the office setting, poor password behavior leads to heightened security threats and lost productivity. As a result, your IT department likely spends hundreds of hours a year dealing with password related issues and all of the negative byproducts that result from them. So, whether you realize it or not, passwords are possibly holding your business back.But what if someone told you that traditional passwords are going by the wayside? If you study new trends and developments in security technology, it looks as if this may be the case in the very near future. And from a small business perspective, the ramifications could be significant.Related: How to Create a Super Strong Password (Infographic)Replacing passwords in the office.“Passwords have served us well, there’s no doubt about that,” computer scientist Joel Lee explains. “However, they aren’t perfect. Not by a long shot. In fact, the concept of a password has one glaring flaw that can never be fixed: passwords are all or nothing.”See, if someone has the password, they have access to everything that’s inside. “In essence, password protection is security through obscurity, a security practice that’s universally lambasted as weak and ineffective,” Lee says. It’s like having a padlock on a safe. All someone needs is a pair of bolt cutters and they can have whatever is inside.”It makes much more sense to develop security infrastructures that don’t rely on singular security challenges. Instead, businesses would be wise to invest in security technologies that require persistent identity measures. One idea that’s growing in popularity is the concept of using behavioral inputs.“Simply put, [behavioral inputs are] the way you interact with your device; how you hold and use your mouse, make keystrokes, how quickly you move line-to-line or from page to page,” digital signature expert David Vergara explains. “These actions, analyzed and learned, over time, are interpolated through algorithms to establish a unique pattern of each user to determine if it’s the same user requesting access or potential fraud (behavioral authentication).”In the case of a behavioral input system, security can ramp up authentication measures if the user’s actions don’t seem to line up with the expected behavior.We’re also seeing a lot of anticipated growth in biometric security. One specific area that’s growing in popularity is the use of voice recognition. As IT pro David Lewis points out, Barclays Bank became one of the first major corporations to adopt voice recognition technology for its telephone banking customers (instead of standard pin codes) in August of 2016.“Voice recognition, a form of biometric software, is a more secure form of banking protection because our voices are unique. Each voice has a set of around 100 characteristics,” Lewis says. “Half of those are physical characteristics — shape of the mouth and throat — and the other half are behavioral characteristics of sound and words used.”When a customer’s “voice print” has been captured, the Barclays system can then use it to match against other phone calls in the future. Despite what some may assume, it’s impossible to mimic a voice and cheat the system.Aside from fingerprint scanning and voice recognition software, other (less frequently used) forms of biometric security include iris recognition, vein-pattern detection and even heart beat detection. Businesses with high level security needs can be expected to adopt some of these security formats in the very near future.Related: Swallow This ‘Password’ Pill to Unlock Your Digital DevicesInvest in advanced security.It’s easy to cling to the status quo, even when it comes to something as important as security. You’d rather do something you’re comfortable with than rock the boat and risk messing something up. But unfortunately, you won’t be able to sit still much longer. Changes are coming and businesses like yours will need to adapt.From a financial perspective, the cost to upgrade your existing approach to cyber security and password integrity could be high. Solutions such as voice recognition and iris detection software are still quite expensive and will remain that way until the tech companies reach economies of scale. With that being said, the long-term pay off for an investment in advanced password security is much higher than the upfront cost.If you make decisions in your organization, make it a priority to conduct more research in this area and learn more about your opportunities. If you aren’t a decision maker, it may be up to you to educate the appropriate parties and bring them up to speed on the current security landscape and where your organization fits into the picture. Growing a business sometimes requires thinking outside the box. 6 min read Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global May 3, 2017 Register Now »last_img read more

Read More »

Ebiten 18 a 2D game library in Go is here with experimental

first_imgThe Go team has released version 1.8 of its 2D game library called Ebiten, yesterday. Ebiten 1.8 comes with new features such as experimental WebAssembly Port, newly added APIs, and bug fixes among other updates. Ebiten is a very simple 2D game library in Go that offers 2D graphics (Geometry/Color matrix transformation, Various composition modes, Offscreen rendering, Fullscreen, Text rendering), input and audio support. Experimental WebAssembly Port The Go team has added a WebAssembly port to Ebiten 1.8, but this is still in the experimental phase. This new feature compiles to a single WebAssembly module including the Go runtime for goroutine scheduling, garbage collection, maps, and other Go essentials, that results in a module of at least 2MB, or 500KB when compressed. WebAssembly refers to a binary instruction format for a stack-based virtual machine. It is designed for the compilation of high-level languages such as C/ C++/Rust. This helps with easily deploying the apps on client and server applications. New APIs added New APIs have been added for different features such as polygon, TPS, Vsync, Package audio, and Package ebitenutil, in Ebiten 1.8. For polygon, type DrawTrianglesOptions API has been added which represents options to render triangles on an image. Another API type Vertex has also been added that represents a vertex passed to DrawTriangles. For TPS, func CurrentTPS() float64 API is added that returns the current TPS and represents the number of update functions called in a second. Another added API, func MaxTPS() int: returns the current maximum TPS. Also, func SetMaxTPS(tps int) API is added that sets the maximum TPS (ticks per second) and represents the number of the updating function called per second. For Vsync, func IsVsyncEnabled() bool API returns a boolean value that indicates if the game is using the display’s vsync. Another func SetVsyncEnabled(enabled bool) API sets a boolean value that indicates if the game uses the display’s vsync. For Package audio, the func (c *Context) IsReady() bool API returns a boolean value that indicates whether the audio is ready or not.  For Package ebitenutil, func DebugPrintAt(image *ebiten.Image, str string, x, y int) API draws the string str on the image at (x, y) position. Bug Fixes The bug causing multi monitors issue has been fixed. Also, issues related to macOS 10.14 Mojave has been fixed. For more information, check out the official release notes. Read Next GitHub is bringing back Game Off, its sixth annual game building competition, in November Microsoft announces Project xCloud, a new Xbox game streaming service, on the heels of Google’s Stream news last week Now you can play Assassin’s Creed in Chrome thanks to Google’s new game streaming servicelast_img read more

Read More »