Related News Jharkhand court drops ‘donate Quran’ condition for bail to Ranchi woman over offensive post Advertising Advertising Delhi: At Rohingya camp, a festival under shadow of disease The massacre in Inn Din village in Rakhine state in September 2017 was a mass execution of Rohingyas by the Myanmar Army and armed locals. (AP Photo/Representational)The US has slapped sanctions against Myanmar’s chief of military and three other top officers for gross human rights violations, including killing of Rohingya Muslims and barred their entry into America. More Explained The massacre in Inn Din village in Rakhine state in September 2017 was a mass execution of Rohingyas by the Myanmar Army and armed locals. Two journalists were jailed for their coverage of the ethnic cleansing of Rohingya Muslims. They were released in May this year.A senior State Department official later told reporters that US remains deeply concerned about the human rights situation in Burma, especially in conflict-affected areas in Rakhine as well as other violence-affected areas across the country such as Kachin and Shan states.The official said that the release of the soldiers on the directions of Hlaing is a mockery of accountability for the military and its senior leadership.Numerous credible international investigations, including those conducted by the US and the United Nations, have detailed the gross disproportionate violence, including ethnic cleansing, committed by security forces before and after the Arakan Rohingya Salvation Army attacks on August 25, 2017, the official said. Advertising By PTI |Washington | Published: July 17, 2019 12:02:25 pm The US had in 2018 designated two other generals Lieutenant General Aung Kyaw Zaw and General Maung Maung Soe.The United States remains concerned that the Burmese government has taken no actions to hold accountable those responsible for human rights violations and abuses, he said, adding that there are continued reports of the military committing human rights violations and abuses throughout the country.Pompeo said that the recent disclosure that Hlaing ordered the release of soldiers responsible for the extrajudicial killings at Inn Din during the ethnic cleansing of Rohingyas is an example of the continued and severe lack of accountability for the military and its top leadership.Hlaing released the convicts after only months in prison, while the journalists who reported about the killings in Inn Din were jailed for more than 500 days, he said. ‘Truth, justice have prevailed’: PM Modi on Kulbhushan Jadhav verdict Salve hails verdict, says ICJ protected Jadhav from being executed Following the sanctions imposed on them on Tuesday, Commander-in-Chief Min Aung Hlaing, Deputy Commander-in-Chief Soe Win, Brigadier General Than Oo and Brigadier General Aung Aung along with their immediate family members have been banned from entering the United States.“With this announcement, the United States is the first government to publicly take action with respect to the most senior leadership of the Burmese military,” Mike Pompeo, US Secretary of State, said.“We designated these individuals based on credible information of these commanders’ involvement in gross violations of human rights,” he said. For Rohingya kids in Delhi, a chance to get lives back on track “For the sake of his own reputation and that of the country, Burma’s military must cease such atrocities, hold those responsible to account, and pursue a path of reform,” the official said Post Comment(s) Best Of Express As India builds houses, Myanmar to reach out to Rohingya in Bangladesh To date, the US has taken a number of actions to promote accountability for these atrocities, including the sanctioning of five Burmese generals and two military units for serious human rights violations in Rakhine, Kachin, and Shan states, the official said.These four senior officials are well-known in the international community for gross human rights violations across the country over the past decade, the US official said.Observing that the Myanmar’s military has a role to play as a national defence force, the State Department official said that however, under the command of Min Aung Hlaing, and often at his direct order, members of the Burmese military have committed appalling violations of human rights across the country. Explained: Kulbhushan Jadhav case file
Wrapping Up: Abuse of Power Connecting the Dots The key element in all of this is abuse of power. Whether we are talking about jail guards or executives, there are a lot of people who don’t do well when given power. Their limiters don’t work, and the result is that they push the envelope until a catastrophe occurs and they are fired.There should be controls and oversight to offset this behavior, but it is abundantly clear that those controls in many firms and government agencies currently aren’t doing the job. While we are focused on sexual harassment, we likely are missing other bad behaviors — like selling company assets or expense abuse — that go along with abuse of power.I’ll leave you with one more example of common power abuse, and that is carrying out vendettas: using your power to get revenge on someone you believe has done you harm, either inside or outside the company. This is extremely common among folks who abuse power, and it can create a vicious cycle and even escalate to violence.There is a good chance you may not be able to affect change in others, but — and trust me on this — abuse of power is a career ender, regardless of the path you take. Making sure you and your employees (if you are a manager or executive) don’t abuse power increasingly will be critical to preserving your career. In this age of social media, keeping such abuse secret soon may become impossible. What Varonis does is provide a solution that ensures that people who shouldn’t have access to internal data don’t have access, and that any attempt to violate the related policies, either by internal or external actors, are caught and stopped quickly.While much of the focus of late has been on protecting customer records, Varonis’ capability to both identify an attempted breach and ensure that it will fail is largely unmatched in the segment.Given Uber’s alleged theft of Google’s intellectual property was the basis for this column, and that it allegedly was an inside job — something I’ve argued is likely far more common than most firms realize — focusing on a product that could have prevented this theft or provided stronger evidence of it is why I’m making Varonis my product of the week. The last time I saw the rise of industrial espionage was in the early 1980s, when many Japanese technology firms made illegal moves to try to compete better with IBM. They were caught, and the monetary cost in terms of damages and penalties was massive — enough so that it mostly wiped out the practice outside of government-sponsored efforts from countries like China, North Korea and Russia.Over time, the security organizations that once were staffed and missioned to catch and stop this kind of activity were defunded. They went from being staffed by ex-spooks (basically specialists in catching or being spies) to being run by hourly workers who, in far too many cases, couldn’t even be hired as a beat cop.There is a lot of money in selling intellectual property. There is a huge advantage if you can get hold of it, in terms of meeting your objectives, advancing, and getting a huge bonus. The incentives are massive. There are state-level players active again with far greater resources and cyberhacking capabilities, along with a ton of employees who haven’t seen a raise since Carter was president. Expense Abuse Industrial Espionage I’m bringing back Varonis as my product of the week, because intellectual property theft almost cost me my job, and it is a company killer. Varonis has the best protection against IP theft (including customer and employee confidential records). It appears that one reason sexual harassment claims have gotten out of control is that human resource departments have been acting more to cover up problems like this than to correct them. This is largely because HR has the responsibility to make problems like this go away, but it currently lacks the authority either to fire or correct a misbehaving executive’s behavior. Even if it were possible, it’s likely that the career of the poor HR person who took such an action also would be over.HR is hardly alone in terms of losing authority to do its job. Whenever you have a mismatch of authority and responsibility, you have a crucible for wrongdoing. Currently, a lot of staff organizations — like security, HR and internal audit — are so far below what should be minimal staffing standards that I expect there are a lot of companies that are just as unaware they’re bleeding as Google was. We’ve seen a hint of this in the new Trump administration. Some members of his cabinet massively abused expense policies and either used government jets inappropriately or booked seats on private jets at huge premiums.These were treated as isolated cases, but the people involved came out of the private sector, and behavior like this is typically learned. It is very likely that this practice of abusing expense accounts and company assets came from the firms where they were working prior to joining the Trump administration.This suggests these practices are widespread, but because internal audit has been defunded, unlike government oversight, it likely isn’t being caught yet. Much like it has been with sexual harassment, I expect that all we are waiting for is the right post on social media to be picked up by a reporter, and suddenly we’ll have another wave of firings, and the firings for expense abuse likely will be far wider and deeper than the sexual harassment firings have been so far.This is because accounting and finance, unlike HR, have retained a great deal of power. Boards watch expenses far more aggressively than they do things like sexual harassment (though, if things continue on the sexual harassment front, that likely will change, and it should). As powerful men drop like flies due to their inability to resist abusing their authority, it’s clear that the problem is widespread. Similarly, it’s likely that we’ll find the problem of alleged industrial espionage is not limited to Uber. You see, when people misuse authority — and the sexual harassment problem is a massive misuse of authority — folks typically don’t just misuse it in one area.For some time, I’ve suspected that the harassment issues were just one aspect of a bigger problem. The allegations that Uber aggressively moved to steal intellectual property from Google and colluded to cover up evidence of the theft may be indicative of another area in which executives have been abusing their authority.Rather than wait for the next scandal to surface, I thought it would be interesting (since I’m an ex-internal auditor who has been through a cycle like this before) to look at the other areas where we likely will find that executives and others who wield authority have been doing scandalous things. I’ll close with my product of the week: one of the few security offerings that could prevent against a significant amount of this immoral behavior, Varonis. Rob Enderle has been an ECT News Network columnist since 2003. His areas of interest include AI, autonomous driving, drones, personal technology, emerging technology, regulation, litigation, M&E, and technology in politics. He has undergrad degrees in merchandising and manpower management, and an MBA in human resources, marketing and computer science. He is also a certified management accountant. Enderle currently is president and principal analyst of the Enderle Group. He formerly served as a senior research fellow at Giga Information Group and Forrester. Email Rob.
Risk Reduction Jonathan Terrasi has been an ECT News Network columnist since 2017. His main interests are computer security (particularly with the Linux desktop), encryption, and analysis of politics and current affairs. He is a full-time freelance writer and musician. His background includes providing technical commentaries and analyses in articles published by the Chicago Committee to Defend the Bill of Rights. It is newly minted conventional wisdom that not a single information security conference goes by without a presentation about the abysmal state of Internet of Things security. While this is a boon for researchers looking to make a name for themselves, this sorry state of affairs is definitely not beneficial for anyone who owns a connected device.IoT device owners aren’t the only ones fed up, though. Right behind them is Eldridge Alexander, manager of Duo Labs at Duo Security. Even better, he has a plan, and the experience to lend it some credibility.Before assuming his current role at Duo Security, Alexander held various IT posts at Google and Cloudflare. For him, the through-line that ties together his past and present IT work is the security gains that accrue from aligning all of a network’s security controls with the principle of zero-trust.”I’ve basically been living and breathing zero-trust for the last several years,” Alexander told LinuxInsider.Simply put, “zero-trust” is the idea that to the furthest extent possible, devices should not be trusted to be secure, and they should be treated as such. There are many ways zero-trust can manifest, as it is not so much a singular technique as a guiding principle, but the idea is to leave yourself as invulnerable to the compromise of any one device as possible.A recurring theme among his past few employers, this understandably has left its mark on Alexander, to the point where it positively permeates his plan for IoT security on home networks. His zeal for zero-trust comes to home networks at just the right time.Although consumer IoT adoption has been accelerating, zero-trust has yet to factor into most consumer networking tech, Alexander observed, and we’re getting to the point where we can’t afford for it not to.”Investigating not really new threats but increased amount of threats in IoT and home networks, I’ve been really interested in seeing how we could apply some of these very enterprise-focused principles and philosophies to home networks,” he noted. Network Segmentation IoT Security Standards? Alexander’s THOTCON presentation touched on the 5G connectivity that many predict IoT will integrate, but in exploring the viability of alternatives to his setup, Davis quickly gravitated toward Alexander’s proposal.Connecting to IoT devices via 5G certainly would keep them away from home users’ laptop- and smartphone-bearing networks, Davis acknowledged, but it would present other challenges. As anyone who has ever browsed Shodan can tell you, always-on devices with seldom-changed default credentials connected directly to the public Internet have their downsides.”Having your IoT devices isolated with your home-based devices is great, but there is still the possibly of the IoT devices being compromised,” Davis said. “If they are publicly accessible and have default credentials, they could then be used in DDoS attacks.”Enabling IoT for direct 5G Internet connections doesn’t necessarily improve the security of end-user devices, Davis cautioned. IoT owners will still need to send commands to their IoT devices from their laptops or smartphones, and all 5G does is change the protocol that is employed for doing so.”IoT devices using cellular 4G or 5G connections are another method of isolation,” he said, “but keep in mind, then the devices are relying even more on ZigBee, Z-Wave or Bluetooth Low Energy to communicate with other IoT devices in a home, which can lead to other security issues within those wireless protocols.”Indeed, Bluetooth Low Energy has its share of flaws, and at the end of the day protocols don’t impact security as much as the security of the devices that speak it.Regardless of how the information security community chooses to proceed, it is constructive to look to other points in the connectivity pipeline between IoT devices and user access to them for areas where attack surfaces can be reduced. Especially when weighed against the ease of inclusion for the necessary software, router manufacturers undoubtedly can do more to protect users in cases where IoT largely hasn’t so far.”I think a lot of the security burden is falling on the consumer who simply wants to plug in their device and not have to configure any particular security features,” Davis said. “I think the IoT device manufacturers and the consumer router and access point manufacturers can do a lot more to try to automatically secure devices and help consumers secure their networks.” In Alexander’s home IoT security schema, which he unveiled at Chicago’s THOTCON hacking conference this spring, zero-trust chiefly takes the form of network segmentation, a practice which enterprise networks long have relied on.In particular, he advocates for router manufacturers to provide a way for home users to create two separate SSIDs (one for each segment) either automatically or with a simple user-driven GUI, akin to the one already included for basic network provisioning (think your 192.168.1.1 Web GUI).One would be the exclusive host for desktop and mobile end-user devices, while the other would contain only the home’s IoT devices, and never the twain shall meet.Critically, Alexander’s solution largely bypasses the IoT manufacturers themselves, which is by design. It’s not because IoT manufacturers should be exempted from improving their development practices — on the contrary, they should be expected to do their part. It’s because they haven’t proven able to move fast enough to meet consumer security needs.”My thoughts and talk here is kind of in response to our current state of the world, and my expectations of any hope for the IoT manufacturers is long term, whereas for router manufacturers and home network equipment it is more short term,” he said.Router manufacturers have been much more responsive to consumer security needs, in Alexander’s view. However, anyone who has ever tried updating router firmware can point to the minimal attention these incremental patches often receive from developers as a counterclaim.Aside from that issue, router manufacturers typically integrate new features like updated 802.11 and WPA specifications fairly quickly, if for no other reason than to give consumers the latest and greatest tech.”I think a lot of [router] companies are going to be open to implementing good, secure things, because they know as well as the security community does … that these IoT devices aren’t going to get better, and these are going to be threats to our networks,” Alexander said.So how would home routers actually implement network segmentation in practice? According to Alexander’s vision, unless confident consumers wanted to strike out on their own and tackle advanced configuration options, their router simply would establish two SSIDs on router setup. In describing this scenario, he dubbed the SSIDs “Eldridge” and “Eldridge IoT,” along the lines of the more traditional “Home” and “Home-Guest” convention.The two SSIDs are just the initial and most visible (to the consumer) part of the structure. The real power comes from the deployment of VLANs respective to each SSID. The one containing the IoT devices, “Eldridge IoT” in this case, would not allow devices on it to send any packets to the primary VLAN (on “Eldridge”).Meanwhile, the primary VLAN either would be allowed to communicate with the IoT VLAN directly or, preferably, would relay commands through an IoT configuration and management service on the router itself. This latter management service also could take care of basic IoT device setup to obviate as much direct user intervention as possible.The router “would also spin up an app service such as Mozilla Web Things or Home Assistant, or something custom by the vendor, and it would make that be the proxy gateway,” Alexander said. “You would rarely need to actually talk from the primary Eldridge VLAN over into the Eldridge IoT VLAN. You would actually just talk to the Web interface that would then communicate over to the IoT VLAN on your behalf.”By creating a distinct VLAN exclusively for IoT devices, this configuration would insulate home user laptops, smartphones, and other sensitive devices on the primary VLAN from compromise of one of their IoT devices. This is because any rogue IoT device would be blocked from sending any packets to the primary VLAN at the data link layer of the OSI pyramid, which it should have no easy way to circumvent.It would be in router manufacturers’ interests to enable this functionality, said Alexander, since it would offer them a signature feature. If bundled in a home router, it would provide consumers with a security feature that a growing number of them actually would benefit from, all while asking very little of them in the way of technical expertise. It ostensibly would be turned on along with the router.”I think that’s a valuable incentive to the router manufacturers for distinguishing themselves in a crowded marketplace,” Alexander said. “Between Linksys and Belkin and some of the other manufacturers, there’s not a whole lot of [distinction] between pricing, so offering home assistant and security is a great [distinction] that they could potentially use.” There is some promise in these proposed security controls, but it’s doubtful that router manufacturers actually would equip consumer routers to deliver them, said Shawn Davis, director of forensics at Edelson and adjunct industry professor at the Illinois Institute of Technology.Specifically, VLAN tagging is not supported in almost any home router devices on the market, he told LinuxInsider, and segmenting IoT from the primary network would be impossible without it.”Most router manufacturers at the consumer level don’t support reading VLAN tags, and most IoT devices don’t support VLAN tagging, unfortunately,” Davis said.”They both could easily bake in that functionality at the software level. Then, if all IoT manufacturers could agree to tag all IoT devices with a particular VLAN ID, and all consumer routers could agree to route that particular tag straight to the Internet, that could be an easy way for consumers to have all of their IoT devices automatically isolated from their personal devices,” he explained.VLAN tagging is not restricted by any hardware limitations, as Davis pointed out, but is merely a matter of enabling the software to handle it. Just because the manufacturers can switch on VLAN tagging in software, that doesn’t mean it will be an easy matter to convince them to do so.It’s unlikely that router manufacturers will be willing to do so for their home router lines and, unsurprisingly, it has to do with money, he said.”A lot of the major companies produce consumer as well as corporate routers,” Davis noted. “I think they could easily include VLAN functionality in consumer routers but often don’t in order to justify the cost increase for feature-rich business level hardware.”Most router manufacturers see advanced functionality like VLAN tagging as meriting enterprise pricing due to the careful development that it requires to meet businesses’ stricter operational requirements. On top of that, considering the low average technical literacy of home users, router manufacturers have reason to think that power user features in home routers simply wouldn’t be used, or would be misconfigured.”Aside from the pricing tier differences,” Davis said, “they also might be thinking, ‘Well, if we bake in VLANs and other enterprise-based features, most consumers might not even know how to configure them, so why even bother?'”Beyond cajoling router makers to enable VLAN tagging and any other enterprise-grade features needed to realize Alexander’s setup, success also would hinge on each manufacturer’s implementation of the features, both in form and function, Davis emphasized.”I think each manufacturer would have different flows in their GUIs for setting up isolated VLANs, which wouldn’t be the easiest for consumers to follow when switching across different brands,” he said. “I think if IoT security was more standards-based or automatic by default between devices and routers, overall security in consumer devices would greatly improve.”Securing both of these concessions from router manufacturers would likely come down to ratifying standards across the industry, whether formally or informally, as Davis sees it.”The different standards boards could potentially get together and try to pitch an IoT security standard to the router and IoT device manufacturers, and try to get them to include it in their products,” he said. “Aside from a new standard, there could potentially be a consortium where a few of the major manufacturers include advanced IoT device isolation in the hopes that others would follow suit.”
Reviewed by James Ives, M.Psych. (Editor)Oct 5 2018A study from the Thoracic Oncology Research Group (TORG), Division of Pulmonary and Critical Care, Medical University of South Carolina, aimed to examine the adherence to annual low-dose computed tomography (LDCT) screening after baseline LDCT within the Veteran Health Administration Lung Cancer Screening Demonstration Project (LCDSDP). The study will be presented at the CHEST Annual Meeting 2018 in San Antonio, and a discussion highlighting the latest updates made since the CHEST Lung Cancer Screening Guidelines will take place.The original project was conducted from July 1, 2013, through June 30, 2015, at eight geographically diverse veterans affairs hospitals. Screening was performed in current and former smokers (quit within the past 15 years) ages 55-80 with at least a 30-pack year smoking history. Researchers utilized data generated from the LCDSDP and 18 months following its completion stored in the BHA Corporate Data Warehouse. Adherence to screening was defined as it was in the National Lung Screening Trial as having undergone a follow-up LDCT within 15 months from baseline scan.Related StoriesLiving with advanced breast cancerNew protein target for deadly ovarian cancerBacteria in the birth canal linked to lower risk of ovarian cancerA total of 2,106 veterans underwent a baseline LDCT across all sites; 60 percent had scans negative for nodules greater than or equal to 4 mm in size and repeat annual LDCT was recommended. In this group with a negative baseline scan, 149 were considered no longer eligible for screening because they had been diagnosed with lung cancer, were undergoing evaluation for cancer, no longer met the target age or years of cessation, were considered to have other life-limiting disease or were no longer interested in participating. Of the 1,120 remaining eligible for repeat annual LDCT, 880 went on to undergo the follow-up scan, yielding a 77.6 percent adherence rate from annual screening in those with a normal baseline scan.”Our study demonstrates that even within the context of a well-designed, implemented and guideline-adherent LDCT screening program, adherence is not optimal and does not reach the reported 95 percent of the NLST when the baseline scan is negative,” says lead researcher Dr. Paul B. Brasher. “Both mortality benefit and cost-efficacy are likely to suffer without better adherence.”Further results from these two studies will be shared at CHEST Annual Meeting 2018 in San Antonio on Tuesday, Oct. 9, 8:45 a.m. to 9:00 a.m., at the Henry B. Gonzalez Convention Centre, Room 207A. The study abstracts can be viewed on theSource: https://www.chestnet.org/News/Press-Releases/2018/10/Adherence-to-annual-lung-cancer-screening-needs-improvement
Reviewed by James Ives, M.Psych. (Editor)Jan 24 2019Providing clean injecting equipment through needle and syringe programs is a highly cost-effective way of preventing hepatitis C (HCV) transmission among people who inject drugs and could save millions of pounds in infection treatment costs in the UK, according to research led by the University of Bristol and London School of Hygiene & Tropical Medicine.Hepatitis C is a blood-borne virus that can seriously damage the liver and cause death if left untreated. Over 200,000 people are infected with HCV in the UK and over 90% of new infections are acquired through injecting drugs. Needle and syringe programs provide sterile injecting equipment and other prevention and support services. In the UK, they are delivered through pharmacies, mobile vans and specialist agencies.The research, funded by the National Institute for Health Research (NIHR) and published in the journal Addiction today, is the first study to evaluate the cost-effectiveness of needle and syringe programs in Western Europe.Using data from three cities with different levels of HCV infection among people who inject drugs – Bristol (45%), Dundee (26%) and Walsall (18%) – the researchers estimated the costs of existing needle and syringe programs in each city, used mathematical models to estimate their impact on the spread of HCV infection, then estimated the cost-effectiveness of the programs in each city. They projected how the spread of HCV would increase if all needle and syringe programs were stopped for the first 10 years of a 50-year time period (2016-2065).In all three areas, current needle and syringe programs resulted in lower healthcare and treatment costs compared to if the programs were stopped. There were estimated cost-savings of £159,712 in Bristol and £2.5 million in Dundee.There were also projected reductions in the number of HCV infections – by 8% in Bristol and Walsall and 40% in Dundee between 2016 and 2065 – and improvements in the quality of life among people who inject drugs. Gains in quality adjusted life years (QALYs), a measure of life years saved and their quality of life, were 502 in Bristol, 195 in Dundee and 192 in Walsall.The researchers also found that needle and syringe programs would continue to be cost-effective if HCV treatment rates increased or treatment costs reduced, because of their effectiveness in preventing re-infection.Related StoriesAMSBIO offers new, best-in-class CAR-T cell range for research and immunotherapyMetabolic enzyme tied to obesity and fatty liver diseaseMathematical model helps quantify metastatic cell behaviorDr Zoe Ward, from the NIHR Health Protection Research Unit in Evaluation of Interventions at the University of Bristol and co-lead author of the study, said: “We have evaluated the impact and cost-effectiveness of needle and syringe programs in the UK for the first time. The results are clear. Needle and syringe programs not only reduce the number of new HCV infections among people who inject drugs and improve their quality of life, they are also low-cost, excellent value for money and, in some areas, save money, which is good news for our cash-strapped local authorities. We hope that Public Health England and local government commissioners and policy makers will take note and continue to commission needle and syringe programs, which are currently under threat of funding cuts.”In a related study from the same project, the researchers found that opioid substitution therapy, such as methadone, halved the risk of acquiring HCV infection among people who inject drugs, and combining opioid substitution therapy with high-coverage needle and syringe provision (providing at least one sterile needle for each injection), led to a 74% reduction in risk.Sedona Sweeney, from the London School of Hygiene & Tropical Medicine, who led the economic evaluation, said: “Access to this type of data can be so important in helping policy makers make tough decisions about how to invest in public services. Our results very clearly indicate that needle and syringe programmes are likely to be a strong investment choice – not only in the UK but also other parts of the world where there are similar levels of hepatitis C infection among people who inject drugs.”It is imperative that countries follow the recommendations of the World Health Organization by scaling up provision of needle and syringe programs and opioid substitution therapy. Our findings provide important new evidence to demonstrate that not only could this lead to fewer people being infected with this potentially life-changing virus, but could also save money for other local services, which means better health and social care for everyone.”Source: http://www.bristol.ac.uk/
Hib vaccination is a critical component of the pentavalent vaccine, which was introduced in 2011. Although we tend to focus on short term consequences of immunization, this study shows that the effect of Hib vaccination on schooling and cognitive development can be significant. Denying children vaccines is effectively denying them access to these benefits that persist through their lives”Ramanan Laxminarayan, Study Co-author and CDDEP director Reviewed by James Ives, M.Psych. (Editor)Jun 13 2019India accounts for the highest number of Haemophilus influenzae type b (Hib) cases and Hib- associated deaths in the world. The bacterial pathogen killed an estimated 15,600 Indian children aged 1-59 months in 2015. In a majority of cases, Hib causes pneumonia and bacterial meningitis, which can lead to long-term consequences in children under age five such as stunting, decreased productivity and schooling outcomes, and increased risk of other diseases. Hib immunization was incorporated into the pentavalent vaccine in India in 2011 and now protects 88 percent of Indian children under age two, although the Hib burden remains high. While the long-term negative effects of Hib infection in high-income countries are known, little evidence exists on the associated outcomes of Hib infection in low- and middle- income countries.To investigate the associations between Hib vaccination status and anthropometric, cognitive, and schooling outcomes among Indian children, researchers examined Z-scores of height- for-age (HAZ) and BMI-for-age (BMIZ), percentage scores of English, mathematics, reading, and Peabody Picture Vocabulary tests, and highest schooling grade attainment among 1,824 Hib-vaccinated and unvaccinated children. Propensity score matching was used to control for systematic differences between the two groups.Researchers analyzed data on reported vaccination receipts, household socioeconomic characteristics, and child anthropometric, cognitive, and schooling outcomes in India from a cohort of children enrolled in the Young Lives Survey (YLS), a longitudinal study assessing childhood poverty. Anthropometric, cognition, and schooling indicators were evaluated across Hib-vaccination groups using the 2013 and 2016 YLS surveys.The study found that at ages 11-12 years, Hib-vaccinated children had significantly higher HAZ scores (an increase of 0.25, P <0.001), significantly higher English and Mathematics test scores (an increase of 4.09 and 4.78 percentage points, P <0.001), and higher schooling attainment (0.16 more grades, P <0.05) than matched Hib-unvaccinated children. Similarly, at ages 14-15 years, Hib-vaccinated children had 0.18 higher HAZ scores (P <0.001), significantly higher English and Mathematics test scores (an increase of 3.63 and 3.22 percentage points, P <0.001), and higher schooling attainment (0.15 more grades, P <0.05) than matched Hib-unvaccinated children. In a second model adjusted for public healthcare access indicators, all associations remained statistically significant, except for schooling attainment.Overall, results indicate that Hib vaccination prior to age six is associated with improved long-term health, cognition, and schooling outcomes among children in India, which also implies an associated economic gain. Related StoriesWhy Mattresses Could be a Health Threat to Sleeping ChildrenRepurposing a heart drug could increase survival rate of children with ependymomaNovel vaccine against bee sting allergy successfully testedThe study titled, "Haemophilus influenzae type b vaccination and anthropometric, cognitive, and schooling outcomes among Indian children" was published on June 10, 2019 in Annals of the New York Academy of Sciences and is available online here.Source:Center for Disease Dynamics, Economics & PolicyJournal reference: Nandi, A. et al. (2019) Haemophilus influenzae type b vaccination and anthropometric, cognitive, and schooling outcomes among Indian children. Annals of the New York Academy of Sciences. doi.org/10.1111/nyas.14127.
Credit: Cytonn Photography on Unsplash The data was collected by researchers from Aalto University in Finland and the University of Cambridge. Volunteers from over 200 countries took the typing test, which is freely available online. Participants were asked to transcribe randomised sentences, and their accuracy and speed were assessed by the researchers.Unsurprisingly, the researchers found that faster typists make fewer mistakes. However, they also found that the fastest typists also performed between 40 and 70 percent of keystrokes using rollover typing, in which the next key is pressed down before the previous key is lifted. The strategy is well-known in the gaming community but has not been observed in a typing study. The results will be presented later this month at the ACM CHI Conference on Human Factors in Computing Systems in Montréal.”Crowdsourcing experiments that allow us to analyse how people interact with computers on a large scale are instrumental for identifying solution principles for the design of next-generation user interfaces,” said study co-author Dr. Per Ola Kristensson from Cambridge’s Department of Engineering.Most of our knowledge of how people type is based on studies from the typewriter era. Now, decades after the typewriter was replaced by computers, people make different types of mistakes. For example, errors where one letter is replaced by another are now more common, whereas in the typewriter era typists often added or omitted characters. The researchers found that users who had previously taken a typing course actually had a similar typing behaviour as those who had never taken such a course, in terms of how fast they type, how they use their hands and the errors they make—even though they use fewer fingers.The researchers found that users display different typing styles, characterised by how they use their hands and fingers, the use of rollover, tapping speeds, and typing accuracy. Another difference is that modern users use their hands differently. “Modern keyboards allow us to type keys with different fingers of the same hand with much less force than what was possible with typewriters,” said co-author Anna Feit from Aalto University. “This partially explains why self-taught typists using fewer than ten fingers can be as fast as touch typists, which was probably not the case in the typewriter era.”The average user in the study typed 52 words per minute, much slower than the professionally trained typists in the 70s and 80s, who typically reached 60-90 words per minute. However, performance varied largely. “The fastest users in our study typed 120 words per minute, which is amazing given that this is a controlled study with randomised phrases,” said co-author Dr. Antti Oulasvirta, also from Aalto. “Many informal tests allow users to practice the sentences, resulting in unrealistically high performance.” The largest-ever dataset on typing speeds and styles, based on 136 million keystrokes from 168,000 volunteers, finds that the fastest typists not only make fewer errors, but they often type the next key before the previous one has been released. This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. Ten fingers not needed for fast typing, study shows Provided by University of Cambridge The typing test showed that the majority of computer users type around 30-60 words per minute but some reach over 120. Credit: Aalto University Explore further Play The test was taken by people from over 200 countries of whom 68 percent were from the US. Credit: Aalto University For example, some users could be classified as ”careless typists” who move their fingers quickly but have to correct many mistakes; and others as attentive error-free typists, who gain speed by moving hands and fingers in parallel, pressing the next key before the first one is released.It is now possible to classify users’ typing behaviour based on the observed keystroke timings which does not require the storage of the text that users have typed. Such information can be useful for example for spell checkers, or to create new personalised training programmes for typing.”You do not need to change to the touch typing system if you want to type faster,” said Feit. “A few simple exercises can help you to improve your own typing technique.” PausePlay% buffered00:0000:00UnmuteMuteDisable captionsEnable captionsSettingsCaptionsDisabledQuality0SpeedNormalCaptionsGo back to previous menuQualityGo back to previous menuSpeedGo back to previous menu0.5×0.75×Normal1.25×1.5×1.75×2×Exit fullscreenEnter fullscreen Citation: What makes a faster typist? (2018, April 5) retrieved 18 July 2019 from https://phys.org/news/2018-04-faster-typist.html More information: The anonymised dataset is available at the project homepage: userinterfaces.aalto.fi/136Mkeystrokes/ What can we learn from analyzing 136 million keystrokes? Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. doi.org/10.1145/3173574.3174220
These kinds of incentives could also lead to loss of personal autonomy, particularly in cases where companies prescribe the devices and the brands that support their programs. When a person’s right to choose is impinged upon, these devices start to shape our private and social lives.Is this happening in Australia?Similar incentives to those offered by John Hancock Insurance are already available from Australian insurance firms.To be eligible for premium discounts and rewards, you need only to complete regular online health assessments, join partnered gyms, use a prescribed fitness tracker and the associated health program, or show a body mass index of lower than, or equivalent to, 28. Some insurers also request a complete blood test to be stored on their files.Aside from being used to determine premium costs, what other uses this data is put to is unknown.Genetic discrimination by insurers has previously been identified in Australia. This means that people with identifiable health conditions, or predispositions to future risk, are charged increased premiums, excluded from certain covers or refused insurance outright. In 2017, an Australian parliamentary enquiry was held into discrimination by insurers regarding predictive genetic information and the use of medical information. A moratorium was imposed on the use of predictive genetic information by life insurers. Other recommendations included the development of standards and protocols around storage of medical files and access by insurers, and disclosure to consumers about any requests made for medical information. Where is the consumer advantage?In the new era of information capital, it’s essential that we better understand what data government and companies are collecting, how it’s being used and who it might be shared with.This can be a lot of work. Look at what’s happening with My Health Record: you must explicitly opt out to prevent your data from being used for secondary purposes, such as to inform research, policy and planning. The new Data Sharing and Release Legislation will play help determine how data can be shared and and consumer data rights.Like all forms of capital, information capital has the ability to shape advantage. In this case, those in the top tier receive the economic and social benefits, while those in the bottom tier are punished with higher costs, possible exclusion and maybe even less access to treatments in the future. So, information capital is creating an advantage that almost certainly will not be passed on here. Citation: An insurance discount for your fitness data is a bad deal in the long run (2018, October 4) retrieved 17 July 2019 from https://phys.org/news/2018-10-discount-bad.html Big life insurer shifts to activity tracking in health push This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. Explore further It’s another example of the new era of information capital, in which companies commercially benefit from users’ data. Aside from health data, companies around the world currently make money from tracking location information, purchasing patterns, sleep data, and social interests.According to French sociologist Pierre Bourdieu, those in society who hold capital can grow advantage and pass it on. But it doesn’t always follow that accumulated advantage is put to ethical use, or that the benefits are passed on to serve the greater good.When it comes to information capital, often the result is the opposite. And often advantage is gained in the first place by what can only be deemed as perverse incentives.What is a perverse incentive?A perverse incentive refers to the unintended consequences, or harms, of a reward that’s on offer.For example, a company might suggest that the adoption of a fitness tracking program is positive because it will produce health benefits for the individual and the community. But, in the long term, these incentives could create economic inequities, or serve to frame some groups negatively.Consider if a fitness tracking program offered by an insurer was linked with an employer. If data about who adopted the fitness tracking program and who didn’t was made public, employers might offer additional rewards and benefits to those who take part. One consequence of this could be that people who choose not to participate in the program are stigmatised, or portrayed as social deviants through noncompliance. A culture of competition for rewards could emerge.In the brave new world of information capital, sharing data collected from wearables and other technologies could be a slippery slope towards the kind of social hierarchy evident in China’s much-criticised social credit system. This article is republished from The Conversation under a Creative Commons license. Read the original article. Provided by The Conversation In the brave new world of information capital, data collected from wearables and other technologies could be a slippery slope to a new social hierarchy. Credit: Shutterstock John Hancock Insurance, the US division of Canadian insurance company Manulife, came under scrutiny last month for offering lower premiums to individuals who agreed to share their fitness tracking data with the company.
Credit: CC0 Public Domain Bloomberg reported Samsung phone users are unable to delete the Facebook app. Instead, they are only given an option to disable the app on their smartphone.Among users cited in the report was Nick Winke, a photographer who attempted and failed to delete Facebook’s app from his Galaxy S8 smartphone.”It just absolutely baffles me that if I wanted to completely get rid of Facebook that it essentially would still be on my phone, which brings up more questions,” Winke told Bloomberg.Samsung and Facebook could not be immediately reached for comment. In a statement to Bloomberg, Facebook said the disabled version acts as if it’s been deleted and doesn’t continue to collect data.Facebook has endured scrutiny over how it handles user data since the political consulting firm Cambridge Analytica was accused of improperly accessing Facebook accounts.Last month, the New York Times reported Facebook offered tech giants such as Netflix and Amazon broader access to user data such as friends’ list and private messages without users’ permission. Facebook said any features introduced in partnership with companies required users’ permission.Both Spotify and Netflix denied the ability to access Facebook users’ private messages. (c)2019 USA TodayDistributed by Tribune Content Agency, LLC. Explore further Local official sues Facebook over data misuse Citation: Some Samsung phone owners can’t delete Facebook app, report says (2019, January 16) retrieved 17 July 2019 from https://phys.org/news/2019-01-samsung-owners-delete-facebook-app.html Dropping Facebook may be tougher than it appears for Samsung smartphone owners. This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.
Originally published on Live Science.by Taboolaby TaboolaSponsored LinksSponsored LinksPromoted LinksPromoted LinksYou May LikeVikings: Free Online GamePlay this for 1 min and see why everyone is addicted!Vikings: Free Online GameUndoSoGoodlyThey Were Named The Most Beautiful Twins In The World, Wait Till You See Them TodaySoGoodlyUndoTruthFinder People Search SubscriptionOne Thing All Liars Have in Common, Brace YourselfTruthFinder People Search SubscriptionUndoKelley Blue Book2019 Lexus Vehicles Worth Buying for Their Resale ValueKelley Blue BookUndoGundry MD Total Restore SupplementU.S. Cardiologist: It’s Like a Pressure Wash for Your InsidesGundry MD Total Restore SupplementUndoLivestlyThe List Of Dog Breeds To Avoid At All CostsLivestlyUndo Strange Love: 10 Animals with Truly Weird Courtship Rituals 13 Extremely Weird Animal Feet The 10 Strangest Animal Discoveries Headbutting Tiny Worms Are Really, Really LoudThis rapid strike produces a loud ‘pop’ comparable to those made by snapping shrimps, one of the most intense biological sounds measured at sea.Volume 0%Press shift question mark to access a list of keyboard shortcutsKeyboard Shortcutsplay/pauseincrease volumedecrease volumeseek forwardsseek backwardstoggle captionstoggle fullscreenmute/unmuteseek to %SPACE↑↓→←cfm0-9接下来播放Better Bug Sprays?01:33 facebook twitter 发邮件 reddit 链接https://www.livescience.com/65945-tiny-worms-emit-loud-noise.html?jwsource=cl已复制直播00:0000:3500:35Your Recommended Playlist01:33Better Bug Sprays?01:08Why Do French Fries Taste So Bad When They’re Cold?04:24Sperm Whale Befriends Underwater Robot00:29Robot Jumps Like a Grasshopper, Rolls Like a Ball02:31Surgical Robotics00:29Video – Giggly Robot关闭 Tiny, feisty worms that live off the coast of Japan fight by headbutting each other — and they aren’t quiet about it. During these feuds, the worms emit one of the loudest sounds in the ocean, according to a new study. The source of the underwater hullabaloo is a nearly transparent segmented worm called the Leocratides kimuraorum, which lives inside sponges 279 to 554 feet (85 to 169 meters) deep off the coast of Japan. [The 12 Weirdest Animal Discoveries]Advertisement These wigglies are just a tad more than an inch (29 millimeters) long and have lengthy tentacles and a big mouth (literally). These seemingly quiet creatures revealed their true nature under the spotlight in the lab. A group of researchers used an instrument called a hydrophone to record 15 pops that were emitted from three kimuraorums as they were fighting. In a marine feud researchers dub “mouth-fighting,” the worms approached each other headfirst with their mouths open. During such encounters, the worms’ pharynx muscles expand rapidly, creating a cavitation bubble that collapses and produces a loud “pop” while the worms launch into each other. The researchers found that these pops can reach 157 decibels in the water (which is a different measurement than decibels in the air). From right next to the water tank, the pops sounded like humans snapping their fingers, lead author Goto Ryutaro, an assitant professor at Kyoto University told Live Science. “Though they probably sound louder if you hear them in the water.” The worms are as loud as snapping shrimps, which are one of the biggest noisemakers in the ocean, the authors wrote. What’s more, they found that these worms did not make any noise when simply disturbed, they only did so when they were fighting. They “may use mouth-fighting to defend territory or living chambers from other worms,” the authors wrote July 8 in the journal Current Biology. “A loud pop may be a byproduct of the rapid mouth attack, but it may also aid intraspecific communication.” A loud noise could somehow determine the victor of the fight or even reveal the whereabouts of nearby worms, they wrote.
RELATED The Supreme Court Thursday termed as “horrible” and “scary” details placed before it about the investigation into the case of Muzzafarpur shelter home where several girls were allegedly raped and sexually abused.A bench headed by Justice Madan B Lokur perused the status report filed by the CBI and said “what is this going on? This is horrible“.The apex court also took note of the allegations referred by CBI against shelter home owner Brajesh Thakur and issued notice to him to explain why he should not be transferred to a jail outside the state.The CBI in its report had alleged that Thakur is an influential person and a mobile phone was recovered from him inside the jail where he is currently lodged under judicial custody.The bench also comprising Justices S Abdul Nazeer and Deepak Gupta noted that Thakur is an influential personThe top court also asked Bihar and he CBI to explain the delay in tracing the whereabouts of ex-minister Manju Verma’s husband Chandrashekhar Verma.It had asked the Bihar Police to investigate the former minister and her husband in connection with the recovery of huge quantity of ammunition from them.Verma had to resign as the minister of Social Welfare from the Bihar government in the wake of the Muzzafarpur shelter home sexual abuse case.The bench also made it clear that the CBI team investigating the case should not be changed and posted the matter for hearing on October 30.The apex court had on September 18 stayed a Patna High Court order to set up a fresh CBI team to probe the case, saying such a move would not only be detrimental to the ongoing investigation but also to victims.It had said that there was no reason now to change the existing investigating team, which was set up by the CBI Director, and directed the investigation to continue under the same team which was set up on July 30.Earlier, the bench had said that the investigation seems to be going in the right direction and had also asked the Income Tax Department to look into assets of the NGO which was running the shelter home and its owner Thakur.The apex court had also noted that no allegations were made against the team probing the case with regard to the manner in which the investigation was being conducted.Over 30 girls were allegedly raped at the shelter home.The alleged sexual exploitation of the girls was first highlighted in an audit report submitted by the Tata Institute of Social Sciences (TISS) to the state’s social welfare department.In all, the sexual abuse of 34 of the 42 inmates was confirmed in their medical examination. The TISS audit report had said that many girls at the shelter home had complained of sexual abuse.An FIR was lodged against 11 people, including Thakur, on May 31. The probe was later taken over by the CBI.A special investigation team was formed to probe the complaints. The NGO running the shelter home in Muzaffarpur was blacklisted and the girls were shifted to shelter homes in Patna and Madhubani. Women staff members of the shelter home and Thakur were among those who were arrested by the police in connection with the case.The apex court had earlier taken cognizance of the matter after it received a letter from one Ranvijay Kumar, who had expressed concern that the alleged victims were subjected to media interviews. gender crime against women COMMENTS Bihar SHARE SHARE EMAIL Bihar govt takes over children shelters following abuse probe October 25, 2018 sexual harassment Published on SHARE Officers of the CBI and the Central Forensic Science Laboratory at the shelter home in Muzaffarpur. (File photo) – PTI COMMENT The top court also asks Bihar and CBI to explain delay in tracing whereabouts of ex-minister Manju Verma’s husband Chandrashekhar Verma
Jagan Mohan Reddy Telangana SHARE ‘Would be a potent force while seeking special category status’ In another important development in the formation of a Federal Front, K.T. Rama Rao, Telangana Rashtra Samithi working president, and YSRCP chief, Y.S. Jagan Mohan Reddy, held preliminary parleys here today.The Federal Front mooted by Telangana Chief Minister and TRS supremo, K Chandrasekhar Rao, seeks to forge a coalition of non-BJP, non-Congress regional parties.The meeting of sons of two regional party chiefs, KCR and late Y.S. Rajasekhara Raddy, is being seen as a major step towards strengthening the formation of the Front.K.T. Rama Rao called on Jagan Mohan Reddy at the latter’s residence near Lotus Pond and held a closed door discussion for more than 90 minutes, attended by leaders of both parties.Interacting with the media after their meeting, both the leaders said they were keen to work together to give regional parties a greater say at the Centre.While political analysts see this as a meeting that could focus on taking on the TDP chief and AP Chief Minister N Chandrababu Naidu, in the ensuing Assembly and Parliament elections, both leaders did not mention him during the briefing.The meeting assumes importance in the backdrop of the bitter elections fought in Telangana, where TRS routed the Maha Kutami, an alliance of Congress, TDP, TJS and Leftists, and Naidu was singled out as an opponent of Telangana.After the rout in the elections, TRS chief KCR made it clear that his party would give a ‘return gift’ and play a crucial role in the upcoming elections in Andhra Pradesh. AIMIM leader Asaduddin Owaisi, too, had said he would support Jagan against Naidu.Describing the meeting held today as preliminary, taking one step at a time, and not going into details about the talks, both the leaders said KCR sought a meeting to discuss the Federal Front. Today’s meeting would be followed by another one between KCR and Jagan at Amaravati, to take the Front agenda forward.One of the significant political issues is the denial of Special Category status to AP following the bifurcation of AP and Telangana. And this has also resulted in the TDP-BJP alliance in AP falling through, and political polarisation.Jagan said strong numbers from Telugu states could make a big difference in Centre-State relations. In order to secure special category status for Andhra Pradesh, 25 seats from Andhra Pradesh and 17 from Telangana could make for a strong force. The special category status assured during bifurcation has, thus far, been denied by the NDA Government. SHARE SHARE EMAIL parties and movements COMMENTS January 16, 2019 national elections COMMENT Published on
May 26, 2019 YSR Congress Party President and Andhra Pradesh Chief Minister-designate YS Jaganmohan Reddy addressing a press conference in New Delhi on Sunday – PTI Published on Jagan meets Modi; hints at chances of AP getting special category status grim Andhra Pradesh SHARE Andhra Pradesh Chief Minister-designate YS Jaganmohan Reddy has said that his Government will probe the land scams in and around the Amaravati Capital region. The new government will look into Polavaram project works as well and go for reverse tendering, if needed.He alleged that powers-that-be and benamis resorted to ‘insider trading’ as the former Chief Minister was privy to the information where the new capital was going to be located.Addressing his maiden press conference in New Delhi on Sunday after clinching the Assembly elections, he said the government will dig into the land purchases and allotments and go for ‘reverse tendering’ with regard to some projects, if needed, after reviewing them.The YSRCP President flew to New Delhi on Sunday.SCS demandHe said the NDA was sitting pretty with comfortable majority and didn’t require the support of his 22 MPs. “I expected them to win about 250 seats so that they would require our help,” he said.Telangana Chief Minister K Chandrashekar Rao has extended support to AP’s SCS demand, Reddy said. “With a combined strength of 31 MPs (YSRCP’s 22 MPs and nine of TRS), we can fight for our rights effectively,” he said.Debt burdenHe said the debt burden of the State had gone up to ₹2.58 lakh crore from ₹97,000 crore in 2014, when the State was divided. “The interest burden stands at ₹20,000 crore. In all, debt servicing is put at ₹40,000 crore, annually. The economy is in precarious condition. It is surviving on overdraft,” he said.He said his government will start reviewing the performance of different Departments and would come out with a White Paper.On poll promises, he said he will honour all the promises made in the manifesto. On prohibition of liquor, he said the State will implement it in phases and “by the time I go to the polls in 2024, I will complete the implementation”. SHARE SHARE EMAIL RELATED COMMENT state politics COMMENTS
Other Videos from India 26:36 Sat, 13 Jul, 2019 20 Years of Kargil: A ground report from Tololing in Drass 01:59 Sat, 13 Jul, 2019 First prototype of Brahmos-NG will be ready by 2024 00:41 Sat, 13 Jul, 2019 Watch: Car performs stunt at Delhi’s Vijay Chowk 03:16 Sat, 13 Jul, 2019 Pakistan removes 5 Pro-Khalistani leaders from Kartarpur corridor panel 02:13 Sat, 13 Jul, 2019 Enter the Growler: S-400 missile ground report from Moscow 01:52 Sat, 13 Jul, 2019 UP law panel drafts stringent law for mob lynching, recommends life term 03:31 Fri, 12 Jul, 2019 Delhi: Farmers of Khera Khurd shift their tubewells due to depleting water levels 09:13 Fri, 12 Jul, 2019 BJP is using money power: Abhishek Manu Singhvi on Karnataka crisis Load More Other Video CategoriesIndiaSportsWorldMoviesSo SorryTelevision
Andhra Pradesh: YS Jagan Mohan Reddy govt presents its first budgetThe YS Jagan Mohan Reddy government on Friday presented its first Budget in the Andhra Pradesh Legislature with a total outlay of Rs 2.27 lakh crore for 2019-20.advertisement Press Trust of India AmravatiJuly 12, 2019UPDATED: July 12, 2019 22:02 IST Andhra Pradesh CM Jagan Mohan Reddy. (Image: Twitter)The YS Jagan Mohan Reddy government on Friday presented its first Budget in the Andhra Pradesh Legislature with a total outlay of Rs 2.27 lakh crore for 2019-20.In February, the then Telugu Desam Party government had presented a Rs 2.26 lakh crore vote-on-account budget ahead of the general elections.The revised estimates for 2018-19 showed a cut of over Rs 29,000 crore in the budget, against the Rs 1.19 lakh crore estimates presented in March last year.Finance Minister Buggana Rajendranath, who presented his budget, estimated that the revenue deficit would be Rs 1,778.52 crore and the fiscal deficit Rs 35,260.58 crore.The huge revenue deficit continues to be a cause for concern as the state, reeling under an acute financial crisis, is faced with a mounting expenditure bill with the introduction of numerous new doles for different sections.As per the figures given by the Finance Minister, the revenue deficit in 2018-19 was estimated to be Rs 11,654.91 crore, down from Rs 16,151.68 crore in the previous year.Of the total expenditure of Rs 2,27,974.99 crore proposed in the 2019-20 Budget, revenue expenditure estimated alone would be Rs 1,80,475.94 crore, Finance Minister Buggana Rajendranath said.Capital expenditure was estimated at Rs 32,293.39 crore, including Rs 8,994 crore towards principal repayment of public debt.Incidentally, the states debt burden soared to Rs 2,58,928 crore by the end of the 2019 fiscal.”This government has inherited probably one of the worst financial positions ever inherited in the history of our country.The debt of the residuary state at the time of bifurcation (in June 2014), which was Rs 1,30,654 crore, reached a whopping Rs 2,58,928 crore by 2018-19, Buggana Rajendranath said.Further, over Rs 10,000 crore was borrowed through various corporations and diverted for spending by government.Another Rs 18,000 crore worth bills were kept pending, he added.”With all these liabilities, as soon as we came into the government, we were told that there was a resource gap of around Rs 45,000 crore to fulfill the commitments under.Vote-on-Account budget presented in February.This resource gap is further amplified by the budget necessary for our new programmes, Buggana Rajendra also said.The demand for Special Category Status to Andhra Pradesh thus gained significance, the Minister noted.”The Andhra Pradesh Reorganisation Act, 2014 was passed only after Special Category Status was promised and this was not the case with any other bifurcation.Andhra Pradesh is the only state that is demanding Special Category Status for reasons beyond its control, as bifurcation has severely deteriorated the finances of the state,” the minister pointed out.Also, Andhra Pradesh was the only state whose Special Category Status was approved by the Union Cabinet but has been pending for implementation, he said.”Therefore, I am appealing to the Prime Minister and Government of India that Andhra Pradesh be given Special Category Status,” the Finance Minister said.Summing up his presentation, Buggana Rajendranath quoted the great political philosopher Chanakya, saying the latters”Chaturvidha Vikasa” (four-pronged development) would be the goal of their government.”Achieving the desired target,sustaining the achievement, expanding the sustained achievements, ensuring expanded results…are useful for all, the minister said, quoting ChanakyaALSO READ | Lok Sabha clears bill to set up central, tribal universities in Andhra PradeshALSO WATCH | Nataka in Karnataka: Rahul Gandhi breaks his silence, says BJP using money power to topple govtsFor the latest World Cup news, live scores and fixtures for World Cup 2019, log on to indiatoday.in/sports. Like us on Facebook or follow us on Twitter for World Cup news, scores and updates.Get real-time alerts and all the news on your phone with the all-new India Today app. Download from Post your comment Do You Like This Story? Awesome! Now share the story Too bad. Tell us what you didn’t like in the comments Posted byKritika Kashyap Tags :Follow Y S Jagan Mohan ReddyFollow Telugu Desam Party (TDP)Follow budget 2019-20Follow Andhra PradeshFollow Buggana Rajendranath Reddy Next
Next Amit Shah directs officers to provide assistance to flood-affected statesAfter reviewing the meeting, Amit Shah directed the senior officers to take every possible measure to deal with the situation arising out of South-West Monsoon in the country and to extend all necessary assistance to the flood-affected states.advertisement Asian News International New DelhiJuly 13, 2019UPDATED: July 13, 2019 23:30 IST Home Minister Amit Shah today chaired a high level meeting to review the current flood situation. (Photo: ANI)Union Home Minister Amit Shah on Saturday chaired a high-level meeting to review the current flood situation in different parts of the country and preparedness of the states and Central ministries concerned to deal with the situation.After reviewing the meeting, Amit Shah directed the senior officers to take every possible measure to deal with the situation arising out of South-West Monsoon in the country and to extend all necessary assistance to the flood-affected states.India Metrological Department (IMD) officers told Shah that during the last 3-4 days, Assam and Bihar have received extremely heavy downpour. Heavy rainfall is expected in these two states during the next 48 hours.Director General of National Disaster Response Force (NDRF) apprised that 73 NDRF teams have been pre-positioned in vulnerable areas of flood affected states along with all necessary equipment.These teams are in addition to the teams kept on alert at battalion headquarter and Regional Response Centers (RRC). NDRF teams have also rescued about 750 persons in Assam and Bihar.Central Water Commission (CWC) informed that Brahmaputra, Beki, Jiabharali, Katakhal and Barak rivers in Assam and Kamla, Bagmati, Mahananda, Gandak rivers in Bihar are flowing above a danger mark. Following which, both IMD and CWC are issuing forecast bulletins at regular intervals.Control rooms in MHA, NDRF, IMD and CWC are keeping a close watch on the situation on round the clock basis.Nityanand Rai, Minister of State for Home Affairs said that Shah has directed the Disaster Management Department to stay in touch with the flood-prone states and take up necessary measures and remain alert to deal with floods.Also Read | Assam floods: Sheshnag in trouble as Brahmaputra water hisses over danger mark in GuwahatiAlso Read | 2 dead, 390 houses submerged in Mizoram floodAlso Watch | In Depth: Decoding the link between floods and droughtsFor the latest World Cup news, live scores and fixtures for World Cup 2019, log on to indiatoday.in/sports. Like us on Facebook or follow us on Twitter for World Cup news, scores and updates.Get real-time alerts and all the news on your phone with the all-new India Today app. Download from Post your comment Do You Like This Story? Awesome! Now share the story Too bad. Tell us what you didn’t like in the comments Posted byChanchal Chauhan
Supreme Court declines stay on Maratha reservation for nowA bench headed by Chief Justice Ranjan Gogoi did not stay the Bombay High Court court order upholding the constitutional validity of the Maratha quota law, but made it clear that the aspect allowing the reservation for Marathas with a retrospective effect from 2014 would not be made operational.advertisement Next Press Trust of India New DelhiJuly 12, 2019UPDATED: July 12, 2019 18:49 IST The Maratha Reservation Bill was passed by the Maharashtra legislature on November 30 last year. (File Photo)The Supreme Court sought the Maharashtra government’s response on Friday on pleas challenging a Bombay High Court order that upheld the grant of reservations to the Maratha community in education and jobs.A bench headed by Chief Justice Ranjan Gogoi did not stay the Bombay High Court court order upholding the constitutional validity of the Maratha quota law, but made it clear that the aspect allowing the reservation for Marathas with a retrospective effect from 2014 would not be made operational.The bench was hearing two appeals, including one filed by J Laxman Rao Patil challenging the high court order that upheld the constitutional validity of the quota for the Maratha community in education and government jobs in Maharashtra.ALSO READ | Bombay High Court upholds Maratha quota, says cut it from 16% to 12%ALSO WATCH | Maratha quota: Appeasement politics by Maharashtra govt?For the latest World Cup news, live scores and fixtures for World Cup 2019, log on to indiatoday.in/sports. Like us on Facebook or follow us on Twitter for World Cup news, scores and updates.Get real-time alerts and all the news on your phone with the all-new India Today app. Download from Post your comment Do You Like This Story? Awesome! Now share the story Too bad. Tell us what you didn’t like in the comments Posted bySnigdha Choudhury