ey

Pompey's Bishop 'grateful' after heart surgery

Colby Bishop has described the months that followed his open heart surgery as "horrific" after making a goalscoring return to the Portsmouth team.




ey

Pudsey's 1000 Mile Challenge comes to Sheffield

Ellie Colton, Elliott Green, Simon Thake, Kat Cowan and Adam Oxley for Children in Need.




ey

Barnsley father's wedding day blunder

Neil Crossley from Barnsley forgot his daughter Amy when walking down the aisle




ey

Passport woes limit Barnsley 'Karate Kid'

Mayon's karate championship dreams ‘jeopardised’ due to pending passport application




ey

Father shares journey after son Joshua's murder in 2021

Michael Hall shares his journey since son's death, Georgia Stone reports.




ey

Where the money goes

BBC Children in Need makes a real difference to young people in Cambridgeshire.




ey

Burnley appoint Salford's Casper as academy boss

Burnley appoint Salford City director of football Chris Casper as their academy manager.




ey

'She's my world and my heart' - an adoption journey

Rachel says adopting her daughter has been exciting and scary but she wouldn't have it any other way.




ey

The American writing the Thames Valley's history

Jim Donahue is writing and photographing the Thames Valley's life and history.




ey

Mowbray eyes return after bowel cancer diagnosis

Former Sunderland and Birmingham City boss Tony Mowbray speaks about his battle with bowel cancer and hopes of returning to football.




ey

'Eyesore' fly-tipped waste in lay-by for months

The "disgusting huge white trailer has been there for ages now", reports one resident.




ey

From Honeybourne to the set of Children in Need

Hear from the incredible children ready to represent Worcestershire on TV.




ey

'They've made me realise ADHD isn't a barrier'

The Hub in Bromsgrove has helped Skye, 15, gain qualifications and realise she "can do anything".




ey

Guernsey property prices up in third 2024 quarter

The increase compares with a decrease during the the same period in 2023.




ey

Jersey house prices in biggest fall since 2002

The average home cost £581,000 at the end of September - down from £651,000 a year earlier.




ey

Council to sell four storey block of former flats

Douglas Council's 1930s development on Lord Street remains boarded after tenants were moved in 2022.




ey

Beach volleyball teen celebrates gold medal hat trick

Bournemouth schoolboy Lucas , 15, was called up to the England junior squad earlier this year.




ey

British sailor Hare eyes top-10 Vendee Globe finish

Dorset-based sailor Pip Hare says she now knows what it takes and how to prepare herself mentally for the iconic Vendee Globe.




ey

Hockey player 'proud' to be in Masters World Cup

Sabina Falcone-Healey is a member of the England women's over-45 squad.




ey

Driving champion, 20, eyes future success

Nicky Taylor has won the GB Clio Cup and wants to step up to the British Touring Cars Championship.




ey

Centre Hennessey signs 'long-term' Bath deal

Bath centre Louie Hennessey signs a new "long-term" contract with the Premiership club.




ey

An Open Letter to New Port Richey

Dear New Port Richey, Florida,

Hey there, it's been a while since we touched base. Soz about that. I've been away writing books and getting up to no good in the UK; you've been busy increasing your suburban sprawl to the point where there is now no clear boundary between you and the rest of the West Central Florida region (a.k.a. "the bit too far west of Disney").

Anyway, I thought we should probably catch up after you recently announced a new plan to arrest sex workers in the city limits. As I am arguably the city's best-known export, and certainly its best-known prostitute export, I'm surprised you didn't run this by me first. Because this plan of yours? I'm telling you this now, it ain't gonna work.

Just to catch up the rest of the folks reading this - the grandees of New Port Richey got tired of rigging elaborate stings to entrap sex wokers, so are giving cops free rein to arrest people who tick any three of eight "behaviours" off a list. These behaviours include asking if someone is a cop, getting into and out of cars at the same place by the road, trying to attract attention of drivers, and more.

You know who else asks if you're a cop? People who are trying to get help in an emergency. You know who else gets into and out of cars by the road every day? Students and workers waiting for their carpool. You know who tries to attract the attention of people driving by on US 19? Anti-abortion protestors. Last time I checked, New Port Richey had all of these in abundance.

That's the problem with these kinds of laws, you see. Profiling has a false positive rate greater than zero, and some of those false positives will no doubt lawyer up. Also, picking up people because you think they might possibly commit a crime in the future is not the same as detecting people who are actually breaking the law. It is - hm, how you say? - oh yeah, now I remember the word. "Unconstitutional." (My time in Florida's schools did not go to waste, as you can see.)

And while we're on the topic of what's legal and what's not, please explain to me what the point of criminalising sex workers is again? Because harassing people over a victimless crime seems like a pretty poor use of resources.

Back when I lived in Florida I knew a few women who were out there selling sex on the streets. Not one of them ever said, "you know what would change my life in a positive way? A mandatory minimum jail sentence and a thousand dollar fine." For the most part they were just trying to get by day to day, put food on the table, hoping maybe for something better someday. Jail is not that something better.

Remember how that Prohibition thing worked out with booze? The War on Drugs with drugs? Yeah, this is bound to backfire, too. The people you're trying to target - some of whom really are vulnerable - will be getting criminal records instead of a helping hand.

Meanwhile, the indoor sex workers like me who can easily dodge these ham-fisted vice moves will continue making money, because the truth is you can't stop the world's oldest profession.

Florida's an odd place, I'll grant you that, and it can be tough to set yourself apart when virtually every other town and city in the state has attracted international attention for doing strange stuff. Why, just down the road we have Clearwater, a place that's both the spiritual HQ of Scientology and the world HQ of Hooters restaurants. It's hard to compete with that kind of weird.

But this approach is not the way forward. Becoming well-known for something you didn't exactly plan on is kind of a bummer. I feel your pain. You know what? Sometimes you have to roll with the hand you're dealt. Like, maybe offering the sex workers passing through the Pasco County law enforcement system options other than going to jail? Or - if you're feeling like pushing the boat out a bit - letting adults mind their own business.

New Port Richey, you and me parted ways a while ago. But that doesn't mean there isn't still a part of you with me, and a part of me with you. I'd really appreciate it if you could do me a solid and reconsider this ill-thought idea. Otherwise I'm going to have to keep telling people I'm from this town, and from what I gather, that would probably rub you up the wrong way.

Sunshine and kisses,

Brooke




ey

“Walthamstow FC exist and they’re playing on Saturday, and that’s a start …”

Do you remember when bloggers just sometimes did short posts about things they had enjoyed and just wanted to share them? I know, I am such a boomer*. Anyway, here is one of those, with a couple more to follow...




ey

Linguistic Alchemy to unlock AutoHotkey

In the echoing halls of the Tower of Babel, myriad languages tangled, creating a confusion of tongues and leaving humans estranged.  Fast forward to the present day, professional translators stand as the modern-day heroes, bridging linguistic divides and fostering global connections.  Yet, these linguists often grapple with the technical juggernaut of AutoHotkey scripting. AutoHotkey, an … Continue reading Linguistic Alchemy to unlock AutoHotkey




ey

Internet of Things - protocols and access keys

I've just read this article from Mark O'Neill on the 10 concerns for the Internet of Things. Mark brings up some very interesting aspects and concerns. I'd like to comment on two of those: protocols and access keys.

His primary concern is protocol proliferation. I agree this is an issue. Mark explicitly mentions CoAP, MQTT, AMQP and XMPP. Interestingly he doesn't mention HTTP, which I have found to be heavily used by devices, especially the new generation of Raspberry Pi based systems. Many Arduino's also use HTTP.

I will admit to a strong bias. I think that MQTT is the best of these protocols for IoT devices, with CoAP a distant second.

Let's get XMPP out of the way. I love XMPP. I think its a fantastic protocol. Do I want to create XML packets on my Arduino? Er... nope. Even on 32-bit controllers, there is still the network traffic to consider: suppose I'm using a GPRS connection and I have thousands of devices deployed: minimizing network traffic is important for cost and efficiency, and XMPP was not designed for that.

AMQP is not an appropriate protocol for IoT devices and was not designed for that. It is designed for "the efficient exchange of information within and between enterprises". It was certainly not designed for lightweight, non-persistent, non-transactional systems. To that end, my own system (WSO2) will be providing efficient bridging for AMQP and MQTT to enable lightweight systems to get their data into wider enterprise contexts. I also demonstrated HTTP to MQTT bridging with the WSO2 ESB at the MQTT Interop held last week at EclipseCon.

How about CoAP vs MQTT. Firstly, CoAP is more appropriate to compare to MQTT-SN. It is UDP only, and designed to emulate a RESTful model over UDP. My biggest concern with CoAP is this: most people don't actually understand REST - they understand HTTP. If I had a dollar for every time I've come across supposedly RESTful interfaces that are really HTTP interfaces, I'd be a rich man! 

Interestingly, despite MQTT having been around for 10 years, the Google Trend shows that it has only recently hit the public notice:
However, as you can see, it has quickly overtaken CoAP. In terms of traffic, it is a clear winner: every Facebook mobile app uses MQTT to communicate with the Facebook servers.

The other area I'd like to comment on is access keys. I agree this is a big issue, and that is the reason I've been working on using OAuth2 access keys with MQTT and IoT devices. I recently gave talks about this at FOSDEM, QCon London, and EclipseCon.  The EclipseCon talk also covered a set of wider security concerns and the slides are available here. OAuth2 and OpenID Connect are important standards that have got incredible traction in a short period of time. They have evolved out of 10+ years of trying to solve the distributed, federated identity and access control problems of the Internet. 

In my presentation I strongly argued that passwords are bad for users, but worse for devices. Tokens are the correct model, and the OAuth2 token is the best available token to use at this point. There was considerable interest in the MQTT interop session on standardizing the use of OAuth2 tokens with the protocol. 

My personal prediction is that we will see MQTT and HTTP become the most-used IoT protocols, and I strongly urge (and hope) that OAuth2 tokens will become the de-facto model across both of these.







ey

Berkeley, UCLA, Harvard, MIT, Princeton, Stanford y Yale en Academic Earth

Si utilizás el buscador Google Chrome podés encontrar herramientas de mucho provecho. Acabo de toparme con la extensión en línea de Academic Earth, que ofrece el acceso gratuito a videos de los cursos y conferencias de las universidades más destacadas de Estados Unidos y en las materias más diversas. ENJOY KNOWLEDGE!

 
Podrás presenciar conferencias como, por ejemplo,
Language in the Brain, Mouth and the Hands
By Paul Bloom - Yale



Watch it on Academic Earth





ey

Teresa Ribera fait tanguer la Commission von der Leyen

<< Incompetence >>, << radicalisme environnemental >>... L'Espagnole, proposee au poste de vice-presidente de la Commission en charge de la Transition ecologique, est bousculee par les deputes europeens.




ey

El contenido es el rey: cómo escribir un libro

¿Te gustaría escribir un libro? ¿Alguna vez lo has intentado? Sé que escribir un libro puede parecer un reto formidable. Muchas personas se preguntan si […]

Origen





ey

British writer Samantha Harvey wins Booker Prize for space novel Orbital - Al Jazeera English

  1. British writer Samantha Harvey wins Booker Prize for space novel Orbital  Al Jazeera English
  2. Samantha Harvey’s ‘beautiful and ambitious’ Orbital wins Booker prize  The Guardian
  3. Samantha Harvey wins the Booker prize for “Orbital”  The Economist
  4. British writer Samantha Harvey’s space-station novel ‘Orbital’ wins 2024 Booker Prize  CNN
  5. Booker Prize Is Awarded to Samantha Harvey’s ‘Orbital’  The New York Times




ey

E-commerce growth prediction model based on grey Markov chain

In order to solve the problems of long prediction consumption time and many prediction iterations existing in traditional prediction models, an e-commerce growth prediction model based on grey Markov chain is proposed. The Scrapy crawler framework is used to collect a variety of e-commerce data from e-commerce websites, and the feedforward neural network model is used to clean the collected data. With the cleaned e-commerce data as the input vector and the e-commerce growth prediction results as the output vector, an e-commerce growth prediction model based on the grey Markov chain is built. The prediction model is improved by using the background value optimisation method. After training the model through the improved particle swarm optimisation algorithm, accurate e-commerce growth prediction results are obtained. The experimental results show that the maximum time consumption of e-commerce growth prediction of this model is only 0.032, and the number of iterations is small.




ey

An image encryption using hybrid grey wolf optimisation and chaotic map

Image encryption is a critical and attractive issue in digital image processing that has gained approval and interest of many researchers in the world. A proposed hybrid encryption method was implemented by using the combination of the Nahrain chaotic map with a well-known optimised algorithm namely the grey wolf optimisation (GWO). It was noted from analysing the results of the experiments conducted on the new hybrid algorithm, that it gave strong resistance against expected statistical invasion as well as brute force. Several statistical analyses were carried out and showed that the average entropy of the encrypted images is near to its ideal information entropy.




ey

Beyond utility: unpacking the enjoyment gap in e-government service use

E-government serves as a vital channel for citizen interactions with the public sector, where user enjoyment is of paramount importance. To date, few studies have comprehensively examined the determinants of citizen enjoyment in e-government. To address this research gap, we administered a survey and gathered data from 363 Australian residents using myGov for tax filing. Our analysis revealed a pronounced discrepancy between reported enjoyment and the intention to continue using the services. Although users demonstrated a strong intent to use e-government services, this intent did not uniformly align with enjoyment. Additionally, informed by self-determination theory, we developed and tested an e-government service enjoyment model to study the impacts of effort expectancy, technophilia, technology humanness, and engagement in fostering user enjoyment. Unexpectedly, the results showed that information privacy concerns, commonly seen as a deterrent in e-government adoption, did not significantly affect enjoyment. Our findings advance the discourse on e-government service improvement.




ey

Uncovering the keys to well-being: calling, mindfulness, and compassion among healthcare professionals in India amidst the post-COVID crisis

This study investigates the well-being of healthcare professionals in India, with a specific focus on the detrimental effects of the pandemic on their mental and physical health, including stress, burnout, and fatigue. This research examines the roles played by calling, mindfulness, and compassionate love as essential resources in promoting the well-being of healthcare professionals. Utilising structural equation modelling (SEM), the results reveal a significant cause and effect relationship between calling, mindfulness, and compassionate love and their influence on overall well-being. Furthermore, the study identifies a noteworthy parallel mediation effect, demonstrating that mindfulness and compassionate love serve as mediators in the relationship between calling and well-being. This research offers practitioners invaluable insights into the effective utilisation of mindfulness and compassionate love practices to enhance the overall well-being of healthcare professionals.




ey

Beyond Coursework: Developing Communities in an Online Program of Study

The nexus between paid work and study is important. Developing opportunities to facilitate this link is a key part of good course design especially in postgraduate programs. Strong communities of practice can also assist with improving links between research and practice. The online study environment affords some challenges to achieving these goals. The current study proposes that offering formalised interaction points— synchronous or asynchronous— during online study, is critical to facilitating the link between work and study. Twenty-five graduates of a postgraduate program were interviewed to explore their experiences of an online program of study. Three key themes emerged and are described in this paper: engaging with study, building a new framework for my practice, and implementing changes to my practice. Online learning programs need to embed opportunities for interaction that are meaningful and allow for development of ideas and discussion, aiming to take learning beyond the program of study.




ey

Key Factors for a Creative Environment in Saudi Arabian Higher Education Institutions

Aim/Purpose: This research explores the influence of organizational-level and individual-level creativity and innovation and the technology acceptance model toward the higher education creative environment that consists of research creativity and teaching creativity. Background: Creativity and innovation are essential pillars for higher education institutions (HEIs). The two terms are interconnected, where creativity is referring to finding better ideas to do the work, while innovation is referring to how to do and implement these creative ideas. Choosing the optimal creative process and the organizational support needed to develop it is an important goal in achieving a creative and inventive environment. For the success of the creative environment to ensure the improvement of higher education institutions, information technology as social networking sites plays a crucial part in the creative process within universities. However, assessing the creativity and innovation of Saudi higher education institutions has not been well recognized. Universities today serve as knowledge-based institutions because they are at the forefront of cutting-edge R&D and scientific innovations. Creating such a productive research environment in universities, however, necessitates a work culture that encourages employees to be more creative while also encouraging the creation of new ideas and innovations. Methodology: A survey instrument was utilized as a quantitative method for this research to gather data from the study sample on the influencing variables employed in the research framework. Respondent data were analyzed using a disjoint two-stage method using PLS-SEM path modelling. Contribution: The results of this research contribute to the theoretical and scientific literature by offering a model of creativity and innovation in higher education institutions. The model proposes an optimal blend of organizational, individual, and technology variables that contribute to the development of the Higher Education Creative Environment in HEIs via creativity in teaching and research and a culture of innovation. In another way, the proposed framework especially helps to comprehend the challenges regulating establishing teaching and research creativity in HEIs via the adoption of organizational, individual, and technology enablers identified as part of this study. Findings: According to the results, organizational factors such as organizational encouragement, freedom, and challenging work have a positive relationship with the higher education creative environment. However, realistic work pressure, a lack of organizational impediments, managerial encouragement, and work group support is insufficient to affect the creative environment in higher education in Saudi Arabia. Individual variables (creative thinking skills and expertise, for example) also have a positive impact on the higher education creative environment. In the higher education creative environment, however, the influence of intrinsic motivation is insignificant. Finally, technology factors such as social networking site adoption intention, perceived usefulness, and perceived ease of use have the potential to influence the higher education creative environment. Recommendations for Practitioners: On the practical front, the obvious recommendation of this research is that it enables top leadership in Saudi HEIs to rethink the norms of creativity and innovation in their institutions, thereby instilling a mindset guided by a flourishing culture of creativity in the HEI environment with a specific focus on creativity practices in research and teaching domains. Furthermore, to promote the environment’s creativity within Saudi Arabian HEIs, university leaders must consider the suggested Organizational, Individual, and Technology factors as key enablers of creativity and innovation, which will guide them in revisiting their strategic actions in terms of further augmenting the creative performance of their academic’s staff, thereby sustaining a culture of Higher Education Creative Environment (HECE). Recommendation for Researchers: This study addressed many organizational, individual, and technology variables that facilitate Saudi Arabian HECE accomplishment in the form of research and teaching creativity. Furthermore, fresh insights for Saudi public HEIs are revealed when the success aspects of the creative environment are considered. If academic leadership at Saudi HEIs is to encourage the creative environment in general and creativity in teaching and research, it would be suitable for them to highlight individual, organizational, and technology success elements. As a result, their HEIs will be able to produce more innovative research, products, and services that can support and meaningfully achieve national transformation initiatives, opening the path for a transition into a knowledge-based economy. Impact on Society: In fact, this research is based on a quantitative research method, and the findings were also significant especially considering the current global crises. It is clearly understood by this process that includes organizational, individual, and technology factors as key enablers of the creative performance of academic staff, thereby sustaining a culture of HECE. Future Research: While providing the research model, it is probable that this study overlooked any other crucial aspects influencing creativity and innovation. As a result, future research should look at additional variables that may impact HECE in Saudi Arabian HEIs. Furthermore, while this study focused on deriving HECE with a particular emphasis on research and teaching creativity as results, future research might look at deriving other creativity outcomes (e.g., entrepreneurial creativity) within the investigated HECE dimension.




ey

Honeybrid method for network security in a software defined network system

This research introduces a hybrid honeypot architecture to bolster security within software-defined networks (SDNs). By combining low-interaction and high-interaction honeypots, the proposed solution effectively identifies and mitigates cyber threats, including port scanning and man-in-the-middle attacks. The architecture is structured into multiple modules that focus on detecting open ports using Vilhala honeypots and simulating targeted and random attack scenarios. This hybrid approach enables comprehensive monitoring and detailed packet-level analysis, providing enhanced protection against advanced online threats. The study also conducts a comparative analysis of different attack detection methods using tools like KFSensor and networking shell commands. The results highlight the hybrid honeypot system's efficacy in filtering malicious traffic and detecting security breaches, making it a robust solution for safeguarding SDNs.




ey

Measuring information quality and success in business intelligence and analytics: key dimensions and impacts

The phenomenon of cloud computing and related innovations such as Big Data have given rise to many fundamental changes that are evident in information and data. Managing, measuring and developing business value from the plethora of this new data has significant impact on many corporate agendas, particularly in relation to the successful implementation of business intelligence and analytics (BI&A). However, although the influence of Big Data has fundamentally changed the IT application landscape, the metrics for measuring success and in particular, the quality of information, have not evolved. The measurement of information quality and the antecedent factors that influence information has also been identified as an area that has suffered from a lack of research in recent decades. Given the rapid increase in data volume and the growth and ubiquitous use of BI&A systems in organisations, there is an urgent need for accurate metrics to identify information quality.




ey

An English MOOC similar resource clustering method based on grey correlation

Due to the problems of low clustering accuracy and efficiency in traditional similar resource clustering methods, this paper studies an English MOOC similar resource clustering method based on grey correlation. Principal component analysis was used to extract similar resource features of English MOOC, and feature selection methods was used to pre-process similar resource features of English MOOC. On this basis, based on the grey correlation method, the pre-processed English MOOC similar resource features are standardised, and the correlation degree between different English MOOC similar resource features is calculated. The English MOOC similar resource correlation matrix is constructed to achieve English MOOC similar resource clustering. The experimental results show that the contour coefficient of the proposed method is closer to one, and the clustering accuracy of similar resources in English MOOC is as high as 94.2%, with a clustering time of only 22.3 ms.




ey

Risk assessment method of power grid construction project investment based on grey relational analysis

In view of the problems of low accuracy, long time consuming and low efficiency of the existing engineering investment risk assessment method; this paper puts forward the investment risk assessment method of power grid construction project based on grey correlation analysis. Firstly, classify the risks of power grid construction project; secondly, determine the primary index and secondary index of investment risk assessment of power grid construction project; then construct the correlation coefficient matrix of power grid project investment risk to calculate the correlation degree and weight of investment risk index; finally, adopt the grey correlation analysis method to construct investment risk assessment function to realise investment risk assessment. The experimental results show that the average accuracy of evaluating the investment risk of power grid construction projects using the method is 95.08%, and the maximum time consuming is 49 s, which proves that the method has high accuracy, short time consuming and high evaluation efficiency.




ey

A survey on predicting at-risk students through learning analytics

This paper analyses the adoption of learning analytics to predict at-risk students. A total of 233 research articles between 2004 and 2023 were collected from Scopus for this study. They were analysed in terms of the relevant types and sources of data, targets of prediction, learning analytics methods, and performance metrics. The results show that data related to students' academic performance, socio-demographics, and learning behaviours have been commonly collected. Most studies have addressed the identification of students who have a higher chance of poor academic performance or dropping out of their courses. Decision trees, random forests, and artificial neural networks are the most frequently used techniques for prediction, with ensemble methods gaining popularity in recent years. Classification accuracy, recall, sensitivity, and true positive rate are commonly used as performance metrics for evaluation. The results reveal the potential of learning analytics for informing timely and evidence-based support for at-risk students.




ey

Beyond The Low Hanging Fruit: Data Services and Archiving at the University of New Mexico

Open data is becoming increasingly important in research. While individual researchers are slowlybecoming aware of the value, funding agencies are taking the lead by requiring data be made available, and also by requiring data management plans to ensure the data is available in a useable form. Some journals also require that data be made available. However, in most cases, “available upon request” is considered sufficient. We describe a number of historical examples of data use and discovery, then describe two current test cases at the University of New Mexico. The lessons learned suggest that an instituional data services program needs to not only facilitate fulfilling the mandates of granting agencies but to realize the true value of open data. Librarians and institutional archives should actively collaborate with their researchers. We should also work to find ways to make open data enhance a researchers career. In the long run, better quality data and metadata will result if researchers are engaged and willing participants in the dissemination of their data.




ey

Sarbanes-Oxley Act of 2002 and IT Education




ey

Exploring the Key Informational, Ethical and Legal Concerns to the Development of Population Genomic Databases for Pharmacogenomic Research




ey

Journey to the Center of the Core: Computers and the Internet in the Core Curriculum  




ey

A Memory Optimized Public-Key Crypto Algorithm Using Modified Modular Exponentiation (MME)  




ey

Video Learning Object Application System: Beyond the Static Reusability




ey

Honeypot through Web (Honeyd@WEB): The Emerging of Security Application Integration 




ey

The Cultural Impact of Information Systems – Through the Eyes of Hofstede – A Critical Journey




ey

Strategic Knowledge of Computer Applications: The Key to Efficient Computer Use