Havyard hopes to bolster business with R&D project

first_imgNorwegian ship technology company Havyard has chosen Kristian Steinsvik to steer the company’s new research and development initiative.Steinsvik will be responsible for the direction and structure of the development work and will contribute his expertise in various projects. He has a master’s in engineering from the Norwegian University of Science and Technology, with hydrodynamics as his field of expertise.He has worked as a researcher in Marintek, which is now part of SINTEF, and as an engineer in Det Norske Veritas where he was also involved in research work. He is now looking forward to boosting Havyard’s R&D activities by coordinating the Group’s development work.Believing this new initiative will have several benefits, Steinsvik commented: “The fact that several business areas and disciplines are coming together to exchange knowledge and ideas will have an effect in itself. We will continue with the projects that we are ready to start on already now. And we will also take steps to ensure a more long-term perspective in this work.”“We also need to look at our services and tools – for example creating a calculation tool that will enable us to work much faster, or developing services internally that we have previously had to hire from external suppliers.“Several long-term projects are already under way. To mention just a few examples, Havyard Design & Solutions has developed design concepts in new segments, a new bow and stern concept, and a complete simulator for the ships we develop. Now we will gather the knowledge in the Group, draw on each other’s expertise and help to ensure further growth and development.”CEO Geir Johan Bakke says: “There are certain threats in the current market situation, but there are also opportunities. We are now gathering our development work in one group, which will free up resources for innovation and fresh ideas.”last_img read more

Government funding for fishing industry lifejackets

first_imgThe company offers the following fully approved solutions: McMurdo FastFind 220: the world’s firstGalileo-enabled PLB, a small and light personal safety device that whenactivated transmits a message over the 406MHz band, which is monitored by theCospas-Sarsat system, and provides precise location data, from anywhere on theplanet, to the nearest search and rescue authorities.Crewfit XD Wipe Clean lifejacket: which offersthe ultimate in comfort and performance, and includes a wipe-clean cover toensure longevity when worn continuously in the harshest of environments. Itcomes with the choice of 150N or 275N bladder. rewfit 150N Wipe Clean: a lower-cost alternativetraditional lifejacket, with 150N bladder as standard, also featuring a wipeclean cover for mucky conditions. “The industry only has untilthe end of the month to apply, so time is of the essence,” said Waterman. The scheme is being administeredby Seafish, the public body set up to raise standards and improve efficiency inthe fishing industry, in cooperation with the Maritime & Coastguard Agency(MCA) and Trinity House. As the global leader in maritimesafety and survival equipment, Survitec is pleased to endorse the SeafishScheme. Survitec will provide all dataneeded by the Seafish scheme and help to guide applicants through the process. Under the terms of the scheme,owners of UK-registered vessels can apply for a refund of a £200 against thecost of purchasing lifejackets fitted with Personal Locator Beacons (PLBs).Additionally, owners can apply for the cost of adding a PLB to   previously purchased lifejackets withfunding assistance. Pictures of ‘Crewsaver’ products on location. Southampton, UK.(Image Courtesy: Lloyd Images) Lifesaving equipment specialistSurvitec is encouraging owners of UK-registered commercial fishing vessels totake part in a scheme to improve safety and eliminate predictable fatalitiesacross the fishing industry. Applications must be received by31st March 2020, and successful applicants will receive confirmation ofeligibility and a claim form. “As a supplier of a range oftrusted and fully-type approved lifejackets and PLBs, we are happy to be thefirst port of call to commercial fishing vessel owners wishing to takeadvantage of the offer. We can also supply and fit PLB’s to currently ownedCrewsaver lifejackets as an additional service. Our sales team will be happy toadvise on the appropriate choice of equipment.” “Seafarers employed in thefishing industry are working in one of, if not the most dangerous maritimesectors, so this initiative can help towards significantly reducing the risksthat the nation’s fishermen encounter every day,” said Chris Waterman,Business Development Manager, Survitec. The funding applies to alltype-approved lifejackets and PLBs, and owners must apply through Seafish,before purchasing the equipment. The application should include a productspecification, a quote from the supplier, and the number of items required toequip all crew onboard the vessel. Sea News, March 13 Author: Baibhav Mishralast_img read more

Luton Town 50/50 Matchday Draw winners

first_imgThe winning numbers were as follows.£850.00 – white ticket number 27081 won by Barrie Peck.Signed Bristol City home shirt – red ticket number 26791 won by James Ford.Supporters aged 16+ are be able to purchase a Matchday Draw ticket from ticket sellers located throughout Ashton Gate for just £1, who will be distinguishable by their purple Bristol City Robins Foundation tabards.The winning tickets are announced at half-time via the PA system and on the @RobinsFound Twitter, while the drawn numbers will also feature on the big screens inside Ashton Gate.last_img read more

Warriors vs. Spurs: Time, TV channel, how to watch online

first_imgWith their internal drama seemingly behind them, the Warriors will travel to San Antonio on Sunday to play the Spurs.Stuck in a mini-rut, the Warriors (12-5, first in Pacific division) have dropped four of their last six games, including to the Mavericks on Saturday. For most teams, that struggle will occur at least a couple of times in a season. For the Warriors, it’s a little bit out of the ordinary.  Some of their struggles can be attributed to the loss of Steph Curry, who has missed the last four games with an injured groin and is expected to be out against the Spurs as well. Quinn Cook and Andre Igoudala have both started in Curry’s place during his absence. Golden State also suffered a 21-point loss to the Rockets last week and is only 4-4 on the road this season. The Spurs (7-7, T-2nd in Southwest Division) have incurred some struggles of their own as of late. They have dropped five of their last six, including three straight, after opening the season 6-2. Amid the team’s struggles, DeMar DeRozan has still played very well, averaging 25.6 points per game this season and 27 PPG over the three-game losing streak.MORE:  Watch NBA live and on-demand on fuboTV (7-day free trial)Warriors vs. SpursTime: 7:00 p.m. ET, Sunday, Nov. 18 Location: AT&T Center, San Antonio, TexasTV: NBATVStreaming: fuboTV (7-day free trial)last_img read more

Glasgow Warriors sign Brandon Thomson from the Stormers

first_imgGlasgow Warriors have announced the signing of Brandon Thomson from South African side the Stormers on a two-year-deal.The 22-year-old signed a short-term loan deal with the Warriors at the start of 2017 as cover for players on international duty and who had injuries.Thomson played three times for Glasgow, scoring a try on his debut against Ulster and will now return to Scotstoun for the next two seasons.The fly-half, whose father is Scottish, becomes Dave Rennie’s seventh signing of the summer following Huw Jones, Callum Gibbins, Oli Kebble, Adam Hastings, Lelia Masaga and Samuela Vunisa to Scotstoun. The South African will be part of a new-look Warriors side following former head coach Gregor Townsend’s departure to the Scotland national team.Speaking on their official website, he said: “I’m very excited to be heading back to Scotstoun. I really enjoyed my short stint there earlier in the year and I’m looking forward to many more good times.“The relationships I built in Glasgow was definitely a big contributing factor to going back, they are a great bunch of guys and made me feel at home right from the start.“The crowds at Scotstoun are absolutely amazing. I can’t wait to play in front of the Warriors supporters again.”last_img read more

Clingmans Dome Tower Rehabilitation Project Begins

first_imgGreat Smoky Mountains National Park officials announced that the Clingmans Dome Observation Tower will be closed beginning Wednesday, August 23 through the remainder of the 2017 season to complete rehabilitation work thanks to funding received from a Partners in Preservation (PIP) grant. The $ 250,000 grant was awarded last summer to the Friends of the Smokies on behalf of the park after being one of the top nine, most voted for parks in the Partners in Preservation: National Parks Campaign in 2016.Straddling the North Carolina and Tennessee state line at 6,643 feet, the tower is a prominent landmark and destination as the highest point in the park. The rehabilitation work will consist of repairing the worst deteriorated areas on the concrete columns and walls, stabilizing support walls at the base of the ramp, and repointing some stone masonry. To accomplish this work in a timely manner and for the safety of our visitors the tower will be closed for the duration of the project.While visitors will not be able to climb the tower for views out over the surrounding tree tops, the Clingmans Dome parking overlook will be open and offers outstanding mountain top views. The visitor contact station and store, the trail to the tower, and all access to the trailheads in the vicinity will remain open. Visitors should expect some construction traffic in the vicinity of the contact station and along the trail.The observation tower is a precedent-setting design of the National Park Service’s Mission 66 program, which transformed park planning, management, and architecture and fundamentally altered the visitor experience in national parks. Since 1959, millions of visitors have climbed the tower, where they can see distances of up to 100 miles over the surrounding mountains and valleys. Some minimal preservation work today on the tower will ensure that visitors continue to experience this unique structure spiraling up from the highest point in the park.For more information about the Clingmans Dome Tower, please visit he park website at https://www.nps.gov/grsm/planyourvisit/clingmansdome.htm.About Partners in Preservation: Partners in Preservation is a program in which American Express, in partnership with the National Trust for Historic Preservation, awards preservation grants to historic places across the country. Since 2006, Partners in Preservation, a community-based partnership, has committed $16 million in preservation funding to nearly 200 diverse sites in eight different cities across the country.Through this partnership, American Express and the National Trust for Historic Preservation seek to increase the public’s awareness of the importance of historic preservation in the United States and to preserve America’s historic and cultural places. The program also hopes to inspire long-term support from local citizens for the historic places at the heart of their communities.last_img read more

Breaking News in the Industry: January 25, 2018

first_imgTen burglars stole $500K in luxury items from California storeSan Diego police say 10 burglars pried open a door at the Hermès store in Fashion Valley in the predawn hours early Saturday and made off with $500,000 worth of luxury goods before driving off. The group arrived at the mall, off Friars Road, shortly after 4:15 .a.m. in three vehicles sporting paper license plates. They used a pry bar to open the front door of the store and hurriedly grabbed purses, jewelry and clothing, said police investigations Lt. Dan Smyth. They were in the store for only two minutes before they ran back to their parked cars — a white Chevy Suburban and two blue sedans — and drove off. “It was a large number of high ticket items. Ten males went inside and grabbed everything they could grab,” he said. All the suspects were wearing hooded sweatshirts and gloves and their faces were covered with masks or bandannas. Police say they are looking into whether the theft is related to a statewide series involving high-end department stories, including a March 2017 burglary at the Fashion Valley in Neiman Marcus. In that case, a large group of males “swarmed the store” after breaking through glass doors, Smyth said. The group mostly took purses, with $100,000 to $120,000 worth of merchandise being taken. Smyth said they are trying to obtain surveillance footage from the Hermès store. “We are working with their security system there and sometimes it is not all free-flowing because of technical difficulties,” he said. Police are asking anyone with information about the case to call police at (619) 692-4800 or the Crime Stoppers’ anonymous tip line at (888) 580-8477. [Source: The San Diego Union-Tribune]Woman arrested for shoplifting twice in two days, blames diabetesA Louisiana woman who was arrested twice in the same weekend for shoplifting told police she stole a large quantity of food because she is diabetic. Forty-two-year-old Amy Stevens was caught on surveillance footage stuffing two packs of ground meat, one pack of ribs, and one pack of frozen fish into her purse at a grocery store. Thibodaux Police Department officers tracked Stevens down at her Fern Street home on January 20 and arrested her for the theft. On January 21, a manager of a grocery store attempted to stop Stevens before she could leave the store with food concealed under her jacket. A struggle ensued, and Stevens dropped four packs of steaks on the ground after she elbowed the manager in the face, according to the TPD. She ran out of the store without the steaks, and she also left behind her purse, which contained her identification. Officers caught up to Stevens later that same day and placed her under arrest again. Stevens told investigators that she stole the food because she is diabetic, according to the TPD. She was booked into the Lafourche Parish Detention Center for theft and is currently being held on a $1,000 bond.  [Source: WGNO News]Four “Paper Team” crew members charged in brazen shopping center robberies [Viral Video]They called themselves the “Paper Team” crew and posted photos and videos on Facebook and YouTube of thousands of dollars of electronics and clothing stolen from stores throughout southeastern Wisconsin. Charges were filed Tuesday against four Milwaukee men accused of stealing more than $70,000 in merchandise, mostly cellphones, by brazenly walking into stores, cutting the phones from security cables and then fleeing in stolen vehicles. In some crimes, the men punched and hit store employees who tried to stop them stealing items and in one case cut the hand of an employee with a knife used to sever security cables connected to iPhones. Charged with multiple felony retail theft, robbery and bail jumping counts were Charles L. Porter, 24, known as “Young Yellow” and “Yellow Boy;” Kendall J. Strickland, 24; Tyron Richardson, 17, known as “Young Bull” and “Tater;” and Devonte Thomas, 17, known as “Lil Wook.” The gang of thieves hit stores ranging from Macy’s, Kohl’s, TJ Maxx and Sak’s Off 5th Avenue to Verizon, Sprint, AT&T and Best Buy in Glendale, Wauwatosa, Cudahy, Brown Deer, Greenfield, Oak Creek, Milwaukee, West Allis, Franklin, Fox Point, Brookfield and Germantown between November and January.- Sponsor – In a few instances police chased after the thieves traveling at high speeds in stolen vehicles. Two of the men were ultimately captured in chases. Thomas was apprehended on Jan. 10 while driving a stolen gray Mazda with Ohio license plates stolen from a Hertz rental center in Milwaukee, which he crashed into a curb and fire hydrant and then fled on foot.  Seven hours later Richardson was arrested the same way — while driving a black Volkswagen Passat stolen from the same Hertz rental store. He fled Milwaukee police while driving approximately 65 mph on city streets, blowing through 22 stop signs and four red lights before crashing into a vehicle on W. Olive St. and smacking into a home. Strickland and Porter are accused of continuing the grab and run thefts after Richardson and Thomas were arrested, cutting security cables of iPads, iPhones and Samsung phones at several stores. Richardson told authorities he stole the phones because he could sell each for a couple of hundred dollars. In other thefts, the men are accused of grabbing armfuls of clothing before running out of stores without paying for the merchandise. At Kohl’s in Glendale on Nov. 29 they filled shopping carts with Nike clothing before pushing the carts out of the store and getting into a stolen vehicle. The next day they grabbed numerous coats at TJ Maxx in Wauwatosa and put them into a cart before leaving the store. The four were seen in numerous surveillance videos inside and outside the stores and were seen on social media wearing stolen items or wearing the same clothing they wore during the thefts and robberies, according to the complaint. Arrest warrants have been issued for Porter and Strickland.  [Source: Journal-Sentinel]Police bring charges against fiveInvestigators with the Richlands, Virginia, police department obtained indictments against five individuals during the Jan. 16 term of grand jury. The indictments served last week were for 22 separate charges the majority of which are felonies.  Brian Russell Maggard is charged with credit card theft, credit card fraud and receiving goods from credit card fraud.  Joseph Adam Marshall was indicted for conspiracy, credit card theft, credit card fraud, and receiving goods from credit card fraud. Crystal Gayle Kegley also known as Crystal Gayle Miller was indicted for conspiracy, credit card theft, credit card fraud, and receiving goods from credit card fraud.  Tina Louise Reynolds was indicted on charges of credit card theft, credit card fraud and receiving goods from credit card fraud. Indictments were obtained against Brian Keith Mustard for DUI – 3rd Conviction w/i 5 Years, driving with a suspended license, after a DWI conviction, refusal of blood test, third refusal of bloodbreath test within 10 years, unlawfully attempting to purchase a firearm while under a protective order, concealed weapon  and violating a protective order.  An indictment was also handed down against James Ivan Odum for possession of a firearm while under a protective order.  [Source: SWVA News]Retailers are so wary of fraud they’re rejecting real customersRetailers are so worried about fraudulent purchases online, many say they’re rejecting legitimate transactions out of fear that they may be fake. Sixty-seven percent of retailers have online security measures that are quick to cancel any transaction that raises suspicion, according to a survey by Experian, a global information-services company. When gauging all businesses — a group that also includes banks and telecommunications companies — that figure rises to 71 percent. The concerns are causing companies to leave money on the table, as they go to ever-greater lengths to prevent hacking attacks and internet security breaches.Companies have a strong incentive to err on the side of caution: Shares of Chipotle Mexican Grill Inc. plummeted last year after it disclosed a data breach, while the news that hackers stole the personal information of millions from Equifax Inc. sparked a class action lawsuit and outrage across the U.S.“There is no silver bullet when it comes to stopping fraud,” said Kathleen Peters, senior vice president of global fraud and identity at Experian. “Retailers really have to find this way to show consumers that they’re protecting them and balance that with an online experience that’s not too heavy-handed.” While only 5 percent of data breach incidents involve the retail sector, according to a Verizon report last year, the incidents are highly visible since they generally involve well-known brands. At the same time, instances of fraud seem to be on the rise: 63 percent of businesses told Experian their losses from fraud in the last 12 months were the same or higher than a year earlier. The study was based on interviews with 5,500 consumers and 500 business executives in 11 world markets. Companies are contending with criminals who are becoming more organized and creative in the ways they impersonate legitimate customers online, Peters said. The best way to counter this is to develop technology that lets them better identify legitimate customers. Creating layered security that protects customers without making transactions more cumbersome is still no easy task, she said. “They’re in this position because people are moving online quickly and the retail experience is changing,” she said.  [Source: Bloomberg]Canada Goose targets counterfeitersCanada Goose, the luxury winter coat company, is attempting to crack down on counterfeiters that are cutting into its market. The Toronto-based manufacturer has filed a lawsuit in federal court in Chicago, aimed at Chinese counterfeiters that sell fake Canada Goose goods across hundreds of unauthorized websites. It remains to be seen how effective the crackdown will be. “It’s really difficult. The police do it, the federal authorities will go after them, but it’s really difficult because they pop up and they go away pretty quickly,” Steve Bernas of the Better Business Bureau says. Demand for genuine Canada Goose attire is high at Wicker Park’s Mildblend shop. “Michael Jordan shoes, Louis Vuitton, Chanel, where people are always replicating that, and it seems like Canada Goose is taking the top seat as the thing to be replicated,” Matthew Kerr says. Some tips to avoid being fooled: Look for the hologram polar bear label sewn in the inside; counterfeit fur looks scraggly, tangled and sometimes dirty. On the trademark label, look for bigger leaves as an indicator of fraud and misspelled words. Canada Goose licensed retailers are listed on the company’s website. [Source: CBS Chicago News] Stay UpdatedGet critical information for loss prevention professionals, security and retail management delivered right to your inbox.  Sign up nowlast_img read more

How to Create the Best Mobile Device Management Policy

first_imgmark gentile Related Posts Why IoT Apps are Eating Device Interfaces Role of Mobile App Analytics In-App Engagement Tags:#mobile#Op-Ed center_img Many corporations now allow their workers to bring their own devices such as cellphones and tablets to the office. But this can backfire if the appropriate mobile device management (MDM) policies are not properly enacted. As an InformationWeek Analytics 2011 Strategic Security Survey has found, only one in three respondents deploy MDM as part of a comprehensive security policy, a point also noticed by Forrester Research.Although some organizations have resorted to prohibiting employees’ use of their own devices for work-related activities, the trend line is moving in the opposite direction and a far better plan is to figure out the best MDM policy as soon as possible. Setting up Your Mobile Device Management PoliciesCurrently, many companies have not yet set up security policies specific to employee-owned devices, or if they have, the standards are bare-boned and lack the necessary stringency. For employee-liable devices, what’s required is a set of well thought out, consistent and properly applied MDM policies.Some organizations start out by deploying policies to employee-owned devices through Microsoft Exchange ActiveSync, which offers limited security policy capability. But to implement secure and compliant polices, an MDM solution with an agent resident on the device is required to accommodate features such as in-house deployment of enterprise applications, documents and media to control user access to enterprise applications and data, and, comprehensive hardware, software and health reporting.To select the proper MDM solution, an organization should ask each vendor questions such as:• Does it integrate with industry standard management platforms?• Can employee-owned devices be readily identified and grouped to assign policies?• How does the end-user obtain the MDM device agent for the device?• Are there mechanisms for IT to control which users are allowed to enroll the device in MDM?• How are policies applied to the device and how are conflicts resolved?• With lost/stolen devices, how is lock and wipe confirmation handled and reported?• Availability of compliance reports?Companies that take the time to ensure that only authenticated devices are allowed to connect to the network and establish and enforce MDM policies will be the most successful in integrating employee-owned devices into the network.Mark Gentile is the founder, president and chief executive officer of Odyssey Software, an MDM vendor. Before this he led the design, development, and implementation of mobile enterprise applications for many Fortune 500 companies across North America.Beyond MDMThe growing popularity of bringing personal devices to work ultimately will require IT management to make MDM a core part of their management strategy, as they do now with other assets of the organization. For example, it’s been reported that some enterprises have added to solid MDM platforms with custom, mobile versions of internal applications, say, for instance, to find other employees, or to calendar meetings, or establishing an internal page in which users can download corporate applications.Of course, implementing a sound MDM policy that regards what’s best for the organization’s application and data security is a must-have as more personal mobile devices continues to proliferate across enterprises. But it should be acknowledged that such policies are living structures that must be responsive to the needs and productivity capabilities of the workforce. What it Takes to Build a Highly Secure FinTech … The Rise and Rise of Mobile Payment Technologylast_img read more

Revisiting SaaS Security Controls at Intel

first_imgSaaS is not new. It has been used for both business and personal use for some time and for a few years in its cloud form. So what sort of security changes are required to use SaaS in the enterprise? What SaaS challenges is Intel IT encountering? Why now? In this blog I share some real-life SaaS experiences, as a cloud and mobile security engineer at Intel, as well as my view of SaaS security.Matching Strategy to the Current EnvironmentThe emergence of new and large use cases triggered Intel IT to reignite our SaaS architecture and look for more security solutions for the SaaS cloud space. Previously at Intel, use cases for cloud-based SaaS were small and limited to a few users. But the new use cases involved thousands of users, mainstream apps such as data repositories and collaboration, and big business models such as CRM. These large use cases required us to reexamine our SaaS strategy, architecture, and controls to protect those mass deployments. As documented in our recent white paper, these controls center mainly on data protection, authentication and access control, and logs and alerts. We strive to enforce these controls without negatively impacting the user experience and the time to market of SaaS solutions. The paper also discusses how we manage shadow IT—users accessing SaaS services without IT awareness.How We Handle Cloud Traffic InspectionWhile the white paper summarizes our SaaS security controls, I’d like to delve a bit deeper into cloud inspection.As is often the case, the right approach wasn’t immediately apparent. We needed to examine the advantages and disadvantages of the various choices – sometimes a complicated process. We investigated two ways we could inspect activity and data:Cloud proxy. In this approach, we would pass all the traffic through a cloud proxy, which inspects the traffic and can also encrypt specific fields, a valuable process in controlling the traffic and information being passed to the cloud provider. The downside of this solution is that the traffic is directed through the cloud proxy, which might cause performance issues in massive cloud implementations, where the cloud provider has many presence points around the globe. Cloud proxies can also impact the application modules, in cases where reverse proxy is being used.Cloud provider APIs. This option uses the cloud provider’s APIs, an approach that allows inspection of user activity, data, and various attributes. The benefit of such an implementation is that it happens behind the scenes and doesn’t impact the user experience (because it is a “system-to-system” connection). But the downside of using APIs is that not all cloud providers offer the same set of APIs. Also, the use cases between SaaS providers can differ—requiring more time to fine-tune each implementation.We reached the conclusion that each solution needs to match the specific use case security requirements. Some SaaS implementations’ security requires more control, some less. Therefore we believe it is important to have a toolset where you can mix and match the needed security controls. And yes, you need to test it! I’d like to hear from other IT professionals. How are you handling SaaS deployments? What controls have you implemented? What best-known methods have you developed, and what are some remaining pain points? If you are looking for more information on our SaaS security solutions and more, check out the 2015-2016 Intel IT Annual Performance Report. I’d be happy to answer your questions and pass along our own SaaS security best practices. Please share your thoughts and insights with me – and your other IT colleagues on the IT Peer Network – by leaving a comment below. Join the conversation!last_img read more

123