Senin, 23 Maret 2020

Low-pass filter module 8th-order filtering Cut-off frequency 1KHz In-band ripple less than 1dB Stopband rejection

Low-pass filter module 8th-order filtering Cut-off frequency 1KHz In-band ripple less than 1dB Stopband rejection


The best product you are looking for is "Low-pass filter module 8th-order filtering Cut-off frequency 1KHz In-band ripple less than 1dB Stopband rejection". This product is available and ready to be purchased. Get attractive discounts every time you shop in our store (aliexpress.com). Aliexpress also provides a coupon of $ 3 for the first buyer to shop there. don't forget to bookmark our store page so you can go shopping again anytime..
Product Details
Name Details
Buy now just US $28.10 US $25.01
Discount 11%
Product id 33028677582
Vendor
Category Demo board - Demo board

Buy Now On Aliexpress

AD8314 Module 45dB RF Detector Controller 100MHz-2.7GHz RF Signal Measurement Function demo board

AD8314 Module 45dB RF Detector Controller 100MHz-2.7GHz RF Signal Measurement Function demo board


The best product you are looking for is "AD8314 Module 45dB RF Detector Controller 100MHz-2.7GHz RF Signal Measurement Function demo board". This product is available and ready to be purchased. Get attractive discounts every time you shop in our store (aliexpress.com). Aliexpress also provides a coupon of $ 3 for the first buyer to shop there. don't forget to bookmark our store page so you can go shopping again anytime..
Product Details
Name Details
Buy now just US $19.37 US $15.30
Discount 21%
Product id 33036233916
Vendor
Category Demo board - Demo board

Buy Now On Aliexpress

No more laptops phones in Public Service Commission hearings

When the Alabama Public Service Commission held public hearings last week on a $1.1 billion expansion proposal from Alabama Power, it did so under a new media plan that prohibits attendees from recording its formal public hearings, posting to social media during the hearings or even using digital devices, including phones or laptops during those proceedings.

The new policies, enacted earlier this month, do not apply to regular meetings of the commission but do apply to formal hearings such as the one last week.

Commissioners voted 3-0 to approve the new media plan on March 3, the week before that hearing began. The media plan was not on the public agenda of that meeting but was added at the end by PSC executive director and Administrative Law Judge John Garner, who presides over formal PSC hearings.

The new policies went into effect immediately on an interim basis, despite not being previously announced or available for public comment. The public can submit written comments on the plan through April 3 before the commission votes on whether to adopt the new media plan permanently at a future meeting.

At that meeting, Garner said the new media policies mirror those in use by the Alabama Supreme Court and Court of Criminal Appeals to limit the use of cameras or social media during trials.

The policies state that "No live audio or video broadcasting or social-media updates of formal hearings are permitted from inside the hearing room," and "Digital devices may not be used in the hearing room while formal hearing is in session except by attorneys appearing before the Court and their support staff."

PSC Commissioners Jeremy Oden and Chip Beeker and President Twinkle Cavanaugh voted in favor of the changes without additional discussion. The full video of the meeting is embedded below.

The new policies were enforced during last week's marathon hearing on the Alabama Power expansion, where Alabama Power witnesses testified for two days in favor of the expansion, and intervening groups called witnesses on the third day to testify in opposition.

John Free, the PSC's director of electricity policy, said the commission's new rules were less restrictive than the PSC's previous policies on live streaming, as the commission had previously blocked all recording of public hearings. Now, interested parties can request permission to record or photograph hearings if they do so at least five days in advance, and if all the involved parties consent to allow the recording.

"The newly adopted Media Coverage Plan provides needed clarity and more importantly, preserves the integrity of the hearing process," Free said. "The objective of the Media Coverage Plan is to ensure that the public record that is compiled in formal hearings remains the focus of such formal proceedings."

The new policy is more restrictive on reporters, though, as there was previously no prohibition on posting social media updates or using laptops in the hearing room so long as it did not disrupt the proceedings. Alabama Media Group posted updates on the hearings during breaks between witnesses and from outside the hearing room during testimony.

Democratic PSC candidate Laura Casey said she applied for permission to record or live stream last week's hearing but was denied and told that not all parties had consented.

Casey said the new policies were an attempt by the commission to make it harder for the public to know what they are doing. Casey is facing Cavanaugh in November's general election for PSC President.

"Instead of simply live streaming the hearings themselves, they have made this a game of how secret they can keep their proceedings," Casey said in a news release. "The end result is that they are laser-focused on keeping the public in darkness."

Casey was ejected from a formal hearing of the Public Service Commission in November for live streaming the proceedings on her cell phone, and her cell phone was taken by state troopers until the hearing ended. She sued the commission in December, believing the Alabama Open Meetings Act specifically allowed her to live stream public hearings. A trial court judge disagreed, and Casey's suit was dismissed. She said she plans to appeal that decision.

Garner told AL.com's Kyle Whitmire that because the commissioners don't deliberate during the hearings, or even ask questions of witnesses, the hearings were not the same as public meetings covered by the Open Meetings Act. During last week's hearings, the commissioners sat in the gallery with the general audience instead of their usual positions on the dais.

Casey said asking questions of witnesses is part of the job expected of a Public Service Commissioner.

"Their job is to be elected to represent us, to ask questions," Casey said. "So when the commissioners not only don't ask questions at a hearing, but go a step further and say they can't ask questions at a hearing, who's running the show, and why did we elect three people?"

Casey said the Commission functions differently than trial courts and should have different rules. The PSC's role is to regulate utilities in the state on behalf of the people of Alabama, not to determine whether someone is guilty or innocent of a crime.

Casey and two others were ejected from the November hearing on Alabama Power's fee on customers with solar panels. Garner stopped that hearing multiple times to instruct state troopers, who provide security for the PSC, to eject people from the hearing room who were attempting to live stream the proceedings.

Casey said that live streaming such hearings is an important service for people who cannot travel to Montgomery to attend the hearings, which are held during the work week.

Free said the new policies "will not have any adverse impact on the public's ability to know what is going on inside the Public Service Commission."

"Formal hearings of the Commission will, as always, remain open to the public to attend and there will continue to be an official transcript of all that transpires during formal hearings made available to the public," Free said.

The transcripts are available through the docket search function of the PSC web site around 10 business days after a hearing has concluded.

The full video of the March 3 PSC meeting is embedded below. Garner begins discussing the new media policy at around the 29:45 mark.

Here's a look at the high-stakes hearing last week to decide the future of power generation in much of the state.

ASUS ZenBook Pro Duo Review: Every Laptop Should Have Two Screens

Minggu, 22 Maret 2020

Genuine Original NanoVNA Vector Network Analyser Antenna Analyser Shortwave MF HF VHF UHF Genius

Genuine Original NanoVNA Vector Network Analyser Antenna Analyser Shortwave MF HF VHF UHF Genius


The best product you are looking for is "Genuine Original NanoVNA Vector Network Analyser Antenna Analyser Shortwave MF HF VHF UHF Genius". This product is available and ready to be purchased. Get attractive discounts every time you shop in our store (aliexpress.com). Aliexpress also provides a coupon of $ 3 for the first buyer to shop there. don't forget to bookmark our store page so you can go shopping again anytime..
Product Details
Name Details
Buy now just US $28.88 US $
Discount -0%
Product id 10000003781717
Vendor
Category Demo board - Demo board

Buy Now On Aliexpress

Coronavirus And Folding@Home; More On How Your Computer Helps Medical Research

On Wednesday morning we asked the Hackaday community to donate their extra computer cycles for Coronavirus research. On Thursday morning the number of people contributing to Team Hackaday had doubled, and on Friday it had doubled again. Thank you for putting those computers to work in pursuit of drug therapies for COVID-19.

I'm writing today for two reasons, we want to keep up this trend, and also answer some of the most common questions out there. Folding@Home (FAH) is an initiative that simulates proteins associated with several diseases, searching for indicators that will help medical researchers identify treatments. These are complex problems and your efforts right now are incredibly important to finding treatments faster. FAH loads the research pipeline, generating a data set that researchers can then follow in every step of the process, from identifying which chemical compounds may be effective and how to deliver them, to testing they hypothesis and moving toward human trials.

First, here's the rundown on how easy it is to set your computer up to help with Folding@Home's Coronavirus effort:

  • Download and run the installer for Linux, Mac, or Windows. Some people reported they needed to us the alternate download links.
  • Choose any name to identify your efforts on the public ranking system
  • Use the Team Hackaday team number to contribute to our collective rankings: 44851
  • It's optional but I recommend getting your own passkey — it's a hash that uniquely identifies your efforts and you can get one emailed to you on the FAH Passkey page
  • Okay, let's answer some questions! First up, does this actually make a difference?

    Folding@Home Has a Record of Producing Results

    The Folding@Home project started back in 2000. Much has been accomplished over the course of the past 20 years and I encourage you to go and read the lengthy Examples of application in biomedical research section of the Wikipedia page which takes an in-depth look at the impacts.

    The effort has identified drug therapies for Alzheimer's and Huntington's diseases, it's been used in drug design for combating HIV and influenza (both are viral), and is used to study how cancer mutates. Now we have the chance to apply that to the COVID-19 virus. On an explain-it-like-I'm-five level, scientists are trying to simulate every possible combination of protein folding patterns, looking for locations that would let medicine grab hold and do some good.

    It's a huge challenge, similar to trying every combination on a padlock, but this lock takes a mind-bogglingly large number of combinations. Research scientists highlight where the most likely solutions lie, then use the mind-bogglingly huge power of the Folding@Home network and sets to work running the simulations. How powerful is the FAH network? Wikipedia lists it at 470 petaFLOPS as of early March 2020 which means 416 quadrillion floating point operations per second. That's 416 million billion math problems solved every second!

    But here's the best part of all of this, the project is non-profit and makes the data freely available to other researchers upon request.

    Can I Make Sure My Computer Only Works on the COVID-19 Problem?

    No, but you don't need to since the group is already prioritizing the coronavirus effort. Although the software does offer the option to work on a specific area of research, COVID-19 is not specifically listed. That is likely because this pandemic is fast moving and it's not worth trying to push a new version of the software just to add this setting. For now, leave this on the default of "Any" and your computer will work on COVID-19 whenever there are Work Units (WU) available.

    You can use the built-in web interface found at http://localhost:7396/ to see what problem your computer is currently working on. Here you can see the "Learn more…" screen from currently running instance. This week I have only seen one time that my computer was working on a different project.

    My Computer is Set Up, Why is it Idle Right Now?

    The FAH servers dish out those WUs as fast as they can, but right now the network is growing as more people add their computers to the network. When all of the staged WUs run out, your computer will be idle until more become available. This has nothing to do with you, project maintainers are working to keep this buffer full.

    Will This Lead to a Vaccine?

    I'm not an expert but I believe the answer is that this research seeks to identify pharmaceutical treatments and a better understanding of how the protiens in the virus work. This is not necessarily in pursuit of a vaccine.

    This is still incredibly important, it means that researchers are looking for drugs that can be used to treat patients who have the virus. Right now, COVID-19 is really good at evading our body's natural defenses — our immune system. If drug therapies are discovered that weaken the virus, it may lead to our immune system having a foothold to fight the infection.

    We need both a vaccine and drug therapies — consider the example of the seasonal flu where we have vaccines to protect people from infection and antiviral drugs to treat at-risk populations who have been infected. Research into both should be, and is, running in parallel.

    Use #44581 for Team Hackaday

    This effort is gamified, so join your fellow hackers on Team Hackaday by using team #44851 when you configure your Folding@Home software. When we first published, we had 21 active team members, by Friday afternoon there were 737. Can we make that 7000 by the end of the week?

    Your Computer Can Literally Help Fight Coronavirus - COVID-19!

    Jumat, 20 Maret 2020

    Colorado spends $2.4 million on emergency laptops for state employees who can work at home

    In a scramble to build up work-from-home infrastructure, Colorado's state government is spending about $2.4 million to purchase emergency laptops for remote employees, according to the governor's Office of Information Technology.

    There are some 30,000 people who work for the state, and while some of their jobs can't be done remotely — corrections officers, Colorado State Patrol troopers and some transportation staff, for example — it appears that many corners of state government are moving in that direction.

    image

    A spokeswoman for the Office of Information Technology said that 14 different state departments and offices requested new laptops, and that the state purchased nearly 1,800 of them, at a cost of $1,325 per unit. The laptops are made by the Chinese tech company Lenovo.

    The spokeswoman told The Denver Post that the IT office created a task force earlier this month to prepare for the COVID-19 crisis, and "to ensure state network and system continuity during the state's response."

    A statement from the office reads: "With additional social distancing measures in place, we understand that many residents will rely on important state services now more than ever. Together with our agency partners, OIT is committed to maintaining and protecting the state systems Coloradans need most.

    "OIT is closely monitoring state network bandwidth to ensure that we can support a growing remote workforce while maintaining business operations. Utilization is holding steady at a sustainable level with significant room to expand usage should more state employees move to teleworking in the coming weeks."

    In addition to the new laptops, OIT says it has spent $7,800 to increase its virtual private network (VPN) capacity from 10,000 to 30,000 users.

    Join our Facebook group for updates on coronavirus in Colorado.

    Kamis, 19 Maret 2020

    COVID-19 and Computer Security Part 2: Shoring Up Systems for Remote Workers

    As companies send employees home in an effort to curb the spread of COVID-19, cybersecurity experts are warning that telecommuting could be putting company assets and data at risk.

    There are a number of precautions that employees working from home should consider to ensure that sensitive data isn't compromised by cybercriminals taking advantage of the health crisis.

    One of the biggest problems is that employees working remotely often become relaxed and can let their guard down. In other cases, workers wrongly assume that when they work at home they have the same level of security protection as in the office.

    "Typically when employees are inside of the corporate network, the enterprise security stack will protect them," said Matias Katz, CEO of Byos.

    "But working from home exposes the employee's devices -- and through them, the company's network -- to threats that exist on dirty public WiFi networks," he told TechNewsWorld.

    New Opportunities for Cybercriminals

    One significant security problem is that with so much data hosted in remote server farms or the cloud, that data is only as safe as the connections that can gain access to it. In an office the systems can be better hardened, but allowing staff to work remotely can be akin to opening the gates to the barbarians.

    "There's no question that working outside the workplace can increase cyber risk," said Elad Shapira, head of research at Panorays.

    "For example, there will likely be more unmanageable devices being used to access company assets, which raises the likelihood of introducing compromised devices into a company's network," he told TechNewsWorld.

    In addition, by having more credentials that can access company assets, including the company's virtual private network, there's an even greater risk for every credential-related attack, such as credential stuffing and brute force.

    For these reasons, ensuring that security policies are consistent and applied throughout can be extremely challenging.

    "If procurement and security somehow were able to handle securing the few devices used for occasional remote work, they now have hundreds, if not thousands of devices they need to secure," warned Shapira.

    Companies may need to enforce two-factor authentication across all assets and for all employees.

    "Furthermore, many essential tasks are performed in the workplace face-to-face, including requests for financial transactions or IT service," said Shapira. "By moving these in-person transactions to email, the organization becomes much more susceptible to phishing and email scams."

    Mitigating the Risks

    During emergencies that may take the staff out of the office, the first thing an IT department should ensure is that employees are prepared and understand the risks of working remotely.

    "It is always best practices to anticipate remote workers and have policies, procedures, and governance to help mitigate risk," said Lou Morentin, VP of compliance and risk management for Cerberus Sentinel.

    "Many standards -- including HIPAA, ISO and HITRUST, for example -- require controls for remote workers," he told TechNewsWorld.

    "Anytime a remote workforce accesses company resources, it is recommended that a VPN connection be used to secure data in transit," Morentin added. "If possible, segregation of work connections from family traffic is recommended. Many modern consumer routers allow for segregated networks."

    The situation could be made worse if a home computer is being used to do office work remotely.

    "It depends, of course, on a number of factors," said Mark Foust, vice president of marketing for CloudJumper.

    "Microsoft's Windows Virtual Desktop functions as a Desktop as a Service secondary desktop from the Azure cloud -- and it's surfaced as a Platform as a Service and has a greatly reduced security footprint," he told TechNewsWorld.

    This could allow a way for the IT department to make separate company data from personal data on a personal computer.

    "This presents an ideal solution for many remote work scenarios," added Foust. "A secondary desktop, in WVD Azure, for example, is ideal for security and business continuity."

    Tools to Protect Employees and Data

    A number of tools and protocols are worthy of consideration to help remote workers protect sensitive data.

    "Single sign on and multifactor authentication are critical technologies for the remote workforce, as well as minimizing risk for the business," said Ralph Martino, vice president of product strategy at Stealthbits.

    "These together allow the remote workforce to connect to business applications in the cloud, or on-prem using one password," he told TechNewsWorld.

    "When the remote worker is terminated, the business can terminate access across a series of applications, minimizing the risk of misuse of an account that doesn't get de-provisioned, and this provides greater security and compliance for the enabling the remote workforce," Martino added.

    As someone who has been working remotely for nearly a decade, Paul Bischoff, privacy advocate and researcher at Comparitech suggested a number of tools.

    "For digitizing physical paperwork and getting signatures, I use a document scanner (TinyScanner), PDF editor (Adobe Fill and Sign), and DocuSign," he told TechNewsWorld.

    "Wave is my preferred accounting and invoicing tool, while Slack is my day-to-day office chat room," Bischoff added.

    "A good backup service is essential so that remote employees don't lose work, and Zoom is a solid professional-grade video conferencing tool," he noted.

    To VPN or Not to VPN

    Many corporations may want to roll out VPNs to more employees to access office resources and secure storage, but this shouldn't be seen as a hardened defense. There are many shortcomings to VPNs that users may not readily consider.

    "Some of the many device threats that VPNs can't protect against are eavesdropping, exploits, and lateral spreading of attackers and malware," said Byos' Katz.

    "That's because VPNs only encrypt data in transit, but don't protect where the data is residing -- the user's device," he explained.

    "Once an attacker or malware gets into a device, they often go undetected, seizing or manipulating data with the ultimate goal of moving from the single remote laptop or tablet into the big prize: the company network and servers," warned Katz.

    Even with the best security in place, employees are just one of the many potential weak links in a chain.

    "It's one thing if a large organization, presumably with robust security processes in place, implements a work-from-home policy for its employees," said Panorays' Shapira.

    "What happens, however, when one of its supply chain partners does the same? In that case, the organization needs to be able to also check that its supply chain partners adhere to that same high level of security," he added.

    For this reason a comprehensive plan needs to be drawn up. While it could be too late for the current COVID-19 crisis, forward thinking will make it easier to send teams home to be safe from illness and secure from cyberthreats.

    "With the right tools, policies and procedures in place," said Shapira, "organizations can be assured that the cyber posture of their company and third parties remains strong, even outside the workplace." image

    imagePeter Suciu has been an ECT News Network reporter since 2012. His areas of focus include cybersecurity, mobile phones, displays, streaming media, pay TV and autonomous vehicles. He has written and edited for numerous publications and websites, including Newsweek, Wired and FoxNews.com. Email Peter.

    COVID-19: Canada unveils $82B emergency response package | Special coverage

    'Offensive capability': $1.3b for new cyber spies to go after hackers

    Australian security agencies believe China is behind the cyber raids on all levels of government, although the Morrison government has chose...