secure

Edgescan Helps Aon Clients Stay Cyber Secure

Edgescan and Aon deliver global 'fullstack' vulnerability management




secure

Car Loans of America Wants You to Feel Financially Secure during the 2020 Novel Coronavirus [COVID-19] Pandemic

During this time of crisis, many people are beginning to experience the strain a worldwide pandemic can have on our collective financial wellbeing. Knowing what options are available and where one can find emergency funding is a must.




secure

Secure Futures Brings Affordable On-Site Solar Power To Schools and Businesses in North Carolina

Company certified as one of only three providers authorized to offer distributed solar energy with no capital cost




secure

Terralogic Solutions Inc. Joins BlackBerry QNX Channel Partner Program to Deliver Safety-Critical and Secure Software Solutions

Terralogic Solutions Inc. supports the design and development of secure, mission-critical embedded solutions using BlackBerry QNX technologies




secure

Interracial Match: Join The World's Largest and Secured Interracial Dating Platform

Interracialmatch: Love Me Love My Color




secure

Blockchain Management Company BlocWatch Secures $5.5 Million Funding Round

Funds will be deployed to help BlocWatch expand its blockchain management platform used for enterprise implementations of Hyperledger Fabric, Ethereum, and Corda.




secure

DIGITALSPEC Secures GSA MOBIS Schedule Contract

DSPEC selected and qualified as a GSA MOBIS contractor to provide management and consulting services that improve federal agency performance and help meet the government's mission goals.




secure

ARA Applauds Congress on Moving SECURE Act Forward, Urges Quick Action

Years in the making, the Setting Every Community Up for Retirement Enhancement (SECURE) Act was included in one of the two "minibus" appropriations bills that fund the federal government for the rest of the 2020 fiscal year




secure

Funding Secured to Redevelop Vacant Pontiac Property as Cannabis Campus

Titan Funding has secured funding for acquisition of a 327,000-square-foot property to be redeveloped as a Cannabis Campus




secure

The Most Secure Hardware Wallet is now on Indiegogo | Sleek, Secure, Simple

The HASHWallet Indiegogo campaign is out! Sign up and get 30% off and Free Vault service.




secure

NECA Legislative Top Three 12/13/19: NECA Contractor Helps Secure Win for Small Businesses

This week in government affairs: NECA opposes bill to raise top tax rate for pass-throughs, NECA member testifies before the house small business committee and NECA Wins in NDAA.




secure

NECA Legislative Top Three 12/20/19: NECA Secures Major Wins: Cadillac Tax Repeal, 529s and more!

1. NECA Wins in Year-End Funding Bills

On December 17, 2019, Congress passed two funding bills, H.R. 1158, FY2020 Consolidated National Security Appropriations Package and H.R. 1865, FY2020 Consolidated Domestic and International Assistance Package, both resulting in big wins for NECA contractors.

NECA’s Look Ahead: In addition to ensuring the full operation of the federal government for the remainder of Fiscal Year 2020, several of NECA’s top legislative priorities were included:

  • Full repeal of the Affordable Care Act’s (ACA’s) 40 percent “Cadillac Tax”

  • Allowing 529 savings accounts to be used for costs associated with Department of Labor (DOL) registered apprenticeship programs

  • Seven-year reauthorization of the Terrorism Risk Insurance Program

  • Extension of the National Flood Insurance Program

  • Full repeal of health insurance tax (HIT) and the medical device excise tax

  • Seven-year authorization of the U.S. Export-Import Bank

  • An extension of 179D energy efficiency tax deduction retrospectively from 2017 and prospectively through 2020

  • $1 billion for Better Utilizing Investments to Leverage Development (BUILD) grants

Summaries of the package can be found below:

Full Package Summary – H.R. 1158

Full Package Summary – H.R. 1865

Division Q – Summary (Revenue Provision Amendment)

2. USMCA Passes the House

On December 19, 2019, the House passed, in a 385 to 41 vote, the NECA-supported United States-Mexico-Canada Agreement (USMCA), H.R. 5430, to replace the North American Free Trade Agreement (NAFTA).

NECA’s Look Ahead: Now that the USMCA has passed the House, it will move to the Senate. Under the Trade Promotion Authority (TPA), the bill procedurally spends up to 15 legislative session days in the Senate Finance Committee. Then, there are up to 15 session days for the Senate to vote on the floor. With Impeachment Articles passed from the House taking precedent, USMCA is unlikely to see a Senate vote any time before late February.

3. Impeachment Update

On December 18, 2019, the House of Representatives took up impeachment procedure and  passed H. Res. 755 – “Impeaching Donald John Trump, President of the United States, for high crimes and misdemeanors” by a vote of  230 – 197, 1 for Article I and by a vote of 229 – 197, 1 for Article II.

NECA’s Look Ahead: It remains unclear when the two articles of impeachment will reach the Senate. When they do arrive to the Senate, it is expected that the Senate will begin the trail immediately.  




secure

NECA Legislative Top Three 4/10/20: NECA Secures Paycheck Protection Program Qualifications and Additional Funding

1. Administration Calls for Additional Funding for PPP

One of the most popular programs created in the CARES Act, the Paycheck Protection Program (PPP), has released over $70 billion to small businesses to help them remain viable during this pandemic. Due to the large demand, the Administration has requested additional funding for that program in a letter to Congressional leaders.

NECA’s look Ahead: Senate Democrats requested an additional $250 billion for hospitals and local governments in addition to funding for the PPP while Republican leaders argued that funding for the PPP is the only account that requires additional immediate funding at this time. The Senate adjourned on April 9, 2020 unable to pass additional funding for the PPP under unanimous consent.

2. Treasury Guidance Clarifies Qualifications for PPP Borrowers

With the passage of the CARES Act, many agencies have been scrambling to enact the reforms and programs developed in rapid time. One such program, the Paycheck Protection Program, which allows substantial loans to be granted under favorable terms by the Small Business Administration, came under scrutiny for potentially requiring businesses to meet both size and revenue requirements instead of just the size requirements (under 500 employees) originally required. While this scrutiny came from an over-cautious interpretation of an earlier guidance, the Treasury Department offered additional guidance to make it clear to borrowers that they may meet either the revenue standards listed under a given NAICS code or qualify by having less than 500 employees. 

NECA’s Look Ahead: NECA worked with key leaders once the CARES Act was signed into law to attain greater clarity on this issue for our contractors. This new change will give NECA contractors the predictability they need to move forward with the new SBA loan program. We will continue to monitor the implementation of the CARES Act and continue to maintain in constant conversation with Congressional staff and agency officials to communicate the needs of our members. 

3. DOD Releases Rule on Payment to Small Business Contractors

Earlier this week the Department of Defense (DOD) released a final rule on the defining and implementation of accelerated payments to classified small businesses under DOD contracts. The rule (DFARS Case 2018–D068) which finalizes the implementation of a section from 2019’s National Defense Authorization Act urges the federal government to pay small business contractors within 15 days of the receipt of a proper invoice. While this is only a goal for the federal government and not a direct mandate, which NECA advocated for in the past, we view this final rule and its upcoming full implementation as a positive step forward.

NECA’s Look Ahead: We encourage NECA contractors to read the final rule and monitor its implementation on DOD contracts. With your feedback and on-the-ground experiences, we will be better able to make lawmakers and agency officials aware of its progress.




secure

Alfresco introduces secure enterprise viewer for annotations

The Enterprise Viewer enables users to view all types of content (documents, images, audio and video) and collaborate using powerful editing tools and chat windows




secure

Ikes Fire Spreads Naturally As Crews Work To Secure Planning Area Perimeter

Warm, dry weather conditions have led to additional growth on the Ikes Fire, which is now approximately 1,535 acres and 20% contained. Smoke settled into the Grand Canyon overnight as temperatures cooled but smoke may begin to lift as temperatures warm up throughout the day. https://www.nps.gov/grca/learn/news/ikes-fire-spreads-crews-secure-planning-area-20190815.htm




secure

How to secure a website and be foolproof against surprises

The internet is an excellent resource for all kinds of information. However, with all of its advantages, there are also some things that you need to pay attention too. Knowing how to secure a website is a must, and anyone with an online identity needs to pay attention to this. As the internet can also […]




secure

Robust Trajectory and Transmit Power Optimization for Secure UAV-Enabled Cognitive Radio Networks. (arXiv:2005.03091v1 [cs.IT])

Cognitive radio is a promising technology to improve spectral efficiency. However, the secure performance of a secondary network achieved by using physical layer security techniques is limited by its transmit power and channel fading. In order to tackle this issue, a cognitive unmanned aerial vehicle (UAV) communication network is studied by exploiting the high flexibility of a UAV and the possibility of establishing line-of-sight links. The average secrecy rate of the secondary network is maximized by robustly optimizing the UAV's trajectory and transmit power. Our problem formulation takes into account two practical inaccurate location estimation cases, namely, the worst case and the outage-constrained case. In order to solve those challenging non-convex problems, an iterative algorithm based on $mathcal{S}$-Procedure is proposed for the worst case while an iterative algorithm based on Bernstein-type inequalities is proposed for the outage-constrained case. The proposed algorithms can obtain effective suboptimal solutions of the corresponding problems. Our simulation results demonstrate that the algorithm under the outage-constrained case can achieve a higher average secrecy rate with a low computational complexity compared to that of the algorithm under the worst case. Moreover, the proposed schemes can improve the secure communication performance significantly compared to other benchmark schemes.




secure

Is My WordPress Site Secure? 13 Tips for Locking Down Your WordPress Site

WordPress powers 35% of all websites, which makes WordPress sites a go-to target for hackers. If you’re like most WordPress site owners, you’re probably asking the same question: Is my WordPress site secure? While you can’t guarantee site security, you can take several steps to improve and maximize your WordPress security. Keep reading to learn […]

The post Is My WordPress Site Secure? 13 Tips for Locking Down Your WordPress Site appeared first on WebFX Blog.




secure

Apparatus for controlling processor execution in a secure environment

Various embodiments described herein relate to apparatus for executing software in a secure computing environment. A secure processor can be used and configured to request a context swap from a first context to a second context when switching execution from a first portion of software to a second portion of software. A context manager, which can be in communication with the secure processor, can be configured to receive and initiate a requested context swap. A trust vector verifier, which can be in communication with the secure processor and the context manager, can be configured to load a trust vector descriptor upon command from a context manager.




secure

Secured wireless access system and related method

The disclosure is directed to a system and method for establishing a secured wireless connection allowing the exchange of information between a wireless device and aircraft equipment. The secured wireless access system may require a user controlling the wireless device to interact with an onboard interface to initiate a connection. The user may be further required to enter a randomly generated security passcode to pair the mobile device to the aircraft equipment. Further security measures may be implemented, such as tiered user access levels restricting certain equipment and/or information based upon a user identity of the user requesting access.




secure

Secure control mechanism for distributed photovoltaic system

A system for controlling photovoltaic electricity production equipment having photovoltaic modules each equipped with a DC/DC microconverter connected to a DC bus, a DC bus manager, and an inverter for converting the direct current from the photovoltaic panels into alternative current intended for an electrical distribution network. Power is injected into the DC bus when the voltage of the DC bus is less than a minimum voltage until the minimum voltage is reached. Each of the microconverters injects a maximum power from the photovoltaic modules into the DC bus when the voltage of the DC bus is between a first voltage and a second voltage. The injecting of power from the photovoltaic modules into the DC bus is stopped when the voltage of the DC bus is less than a low threshold voltage or greater than a high threshold voltage.




secure

Methods and apparatus for constructing a secure and flexible operating system

The present disclosure provides methods and apparatus for constructing a secure and flexible operating system. The presently disclosed system executes different user applications in different operating systems on different virtual machines. Each user application communicates with other processes via the hypertext transfer protocol (HTTP). In particular, each user application's user interface is implemented in a web browser that is running in its own operating system on its own virtual machine, and each user application interacts with the user interface by exchanging HTTP messages between the virtual machines.




secure

Mobile electronic device configured to establish secure wireless communication

The invention relates to a method for configuring a mobile device capable of reproducing, for a user, multimedia content previously provided by a remote content server. The invention relates to using a client installed on said electronic device to relay authentication requests between a card, preferably complying with the provisions of the Mobile Commerce Extension standard, and an authentication server that is accessible via an access point.




secure

System and methods for UICC-based secure communication

A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to a remote management server; receiving from the management server an authentication management function and an encryption key generator for execution by a secure element and an encryption engine for execution by a secure device processor, sending a request to establish a communication session with a remote device; and communicating with the remote device via a channel established using an application server. The secure element and the secure device processor authenticate each other using a mutual authentication keyset. The secure element, the secure device processor and the device processor each have a security level associated therewith; the security level associated with the secure device processor is intermediate between that of the secure element and that of the device processor. Other embodiments are disclosed.




secure

Method and system for secured remote provisioning of a universal integrated circuit card of a user equipment

The present invention provides a method and system for secured remote provisioning of a universal integrated circuit card of a user equipment. A system includes a user equipment for initiating a request for remote provisioning of an universal integrated circuit card (UICC) in the user equipment, where the request for remote provisioning includes a machine identifier (MID) associated with the user equipment and a public land mobile network (PLMN) identifier (ID) associated with an network operator. The system also includes at least one shared key management server for dynamically generating security keys and an operator shared key using the security keys, the MID. Moreover, the system includes an operator network for generating a subscription key using the operator shared key and an international mobile subscriber identity (IMSI), and provisioning the IMSI in a secured manner to the UICC of the user equipment using the security keys.




secure

System and method for securely communicating with electronic meters

An infrastructure for securely communicating with electronic meters is described, which enables secure communication between a utility and a meter located at a customer, over a communication link or connection such as via a network. This enables messages to be sent from the utility to the meter and vice versa in a secure manner. The network provides a communication medium for communicating via the C12.22 protocol for secure metering. A cryptographic backend is used to cryptographically process messages to be sent to the meter and to similarly cryptographically process messages sent from the meter. By providing appropriate cryptographic measures such as key management, confidentiality and authentication, the meter can only interpret and process messages from a legitimate utility and the utility can ensure that the messages it receives are from a legitimate meter and contain legitimate information.




secure

System and method of lawful access to secure communications

The present disclosure relates to systems and methods for secure communications. In some aspects, one or more values used to generate an encryption key used to encrypt a packet are stored in a header of the packet. The packet is transmitted with the encrypted data portion in a communication. In some aspects, one or more values used to generate an encryption key are received. The encryption key is regenerated using the one or more values.




secure

Punch assembly with quick attach punch point and stripper plate removably secure thereon

A punch assembly for a turret punch press having a two piece reciprocally movable punch member that has a punch point insert removably attached to a punch driver that allows replacement of the punch point insert without the need to extract the punch member from its punch guide. A locking assembly having four vertical guideways containing slider strips for coupling the punch point insert to the punch driver ensures precision registration of the punch point insert with its driver.




secure

Secure electronic entity for time certification

The invention concerns a secure electronic entity (11) containing a time measuring unit (18) and comprising a unit (21) for certifying an information concerning a date or a time interval, the certifying unit (21) receiving from the time measuring unit (18) data concerning the date or the time interval and producing certification data of the information concerning a date or a time interval addressed to and external entity. The invention is applicable in particular to microcircuit cards.




secure

Cruable U-NII wireless radio with secure, integral antenna connection via SM BIOS in U-NII wireless ready device

A method that utilizes software and hardware mechanisms to meet the FCC requirement for a U-NII antenna to be an integral part of the device in which it operates, while providing wireless ready U-NII devices and CRUable U-NII radios. Enhancements are made to the software BIOS, including the inclusion of a table of approved radio-antenna PCI ID pairs to create an authentication scheme that verifies and authenticates the radio and antenna combination as being an FCC-approved unique coupling during boot-up of the system. The BIOS also comprises an OEM field that stores an encrypted secret key utilized to complete a second check of the radio model placed in the device. During boot up of the device, the PCI ID pairs from the BIOS are compared against the PCI ID of the radio and the secret key is checked against the radio model. Only a system with an approved combination of radio and antenna is allowed to complete the boot process, indicating an FCC approved device-antenna-radio combination under the “integral” requirement.




secure

System and method for upgrading the functionality of a controlling device in a secure manner

Secure access to a database of upgrade data is provided by storing an encryption key value in a cable used to interconnect a first device and a second device that is associated with the database of upgrade data. The second device allows access to the database of upgrade data via the cable only when the cable is first positively authenticated by the second device through use of the encryption key value stored in the cable.




secure

Electromagnetic interface secured by using an indirect compression force to slidably engage first and second force transfer features

In an example embodiment, an electromagnetic interface can comprise: a first component comprising a first waveguide channel, a first interface surface, and a first force transfer feature; a second component comprising a second waveguide channel, a second interface surface, and a second force transfer feature; and a fastener that can be configured to force the first force transfer feature in sliding engagement with the second force transfer feature. The first and second force transfer features can be configured to interoperate to create an indirect force holding the first interface surface in contact with the second interface surface and holding the first waveguide channel in alignment with the second waveguide channel.




secure

Demountable pin and collet assembly and method to securely fasten a ranging arm to a longwall shearer using such assembly

A pin-and-collet assembly, a longwall shearer comprising a ranging arm attached to a lifting bracket with such assembly, a method for the secure fastening of one piece to another, such as securely fastening the ranging arm to the lifting bracket of a longwall shearer using such assembly as a bushing, and a method for longwall mining of ore, such as trona, using such longwall shearer. This assembly is easy to install, does not have to be tightened during longwall operation of an ore panel, and is also demountable when it is time to stop the longwall mining operation and time to remove/replace the ranging arm for maintenance and/or when the end of the ore panel is reached.




secure

Spacer molds with releasable securement

A mold for forming a temporary prosthesis has at least two mold members at least partially separable from each other. The at least two mold members cooperatively define a generally enclosed interior cavity for forming the temporary prosthesis. The mold has a securement structure mounted on the at least two mold members for securing the at least two mold members to each other during the forming of the temporary prosthesis. The securement structure is removable from the at least two mold members by hand and without the use of a tool.




secure

Locking insert mechanism and receiver to secure personal weapons, valuables and other items

A personal security apparatus to house weapons, valuables, and/or items requiring concealment includes a lockable insert mechanism to securely house items and at least one receiving apparatus adapted to mount the insert mechanism into or onto various structures and a lockable access door that provides convenient, rapid access to the items contained in the personal security apparatus and further prevents access by unauthorized persons.




secure

Secure raceway with lockable access

A system for securing an access opening of a cable raceway using a single padlock includes a cover having a securing wall and opposed first and second sidewalls, which form a channel for accommodating at least a portion of the cable raceway with the securing wall covering the access opening. First and second insert bars engage the first and second sidewalls and a lock bar engages the first and second insert bars and may be locked in an engaged position to prevent the first and second insert bars from being disengaged with the cover and to secure the cover about the cable raceway preventing access to the access opening.




secure

Secure data transfer with compute stick

Systems, apparatus and methods may provide for creating a communication path through a secure data interface that includes an electronic device control channel between a small form factor computing apparatus such as a compute stick and an external display. A second communication path may be established between a trusted execution environment region of the external display and a trusted execution environment region of the compute stick such that data may be securely transmitted between the compute stick and the external display through the first and second communication paths.




secure

Technique for maintaining secure network connections

A technique for maintaining secure network connections is disclosed. In one particular exemplary embodiment, the technique may be realized as a method for maintaining secure network connections. The method may comprise detecting a change of address associated with a first network element. The method may also comprise updating at least one first security configuration at the first network element. The method may further comprise transmitting at least one secure message from the first network element to a second network element, wherein the at least one secure message comprises information associated with the change of address. And the method may comprise updating at least one second security configuration at the second network element based at least in part on the at least one secure message.




secure

Secure and efficient authentication using plug-in hardware compatible with desktops, laptops and/or smart mobile communication devices such as iPhones

A portable apparatus is removably and communicatively connectable to a network device to communicate authentication or authorization credentials of a user in connection with the user logging into or entering into a transaction with a network site. The apparatus includes a communications port to connect and disconnect the apparatus to and from the network device and to establish a communication link with the network device when connected thereto. A processor receives a secure message from the network security server via the port. The message has a PIN for authenticating the user to the network site, and is readable only by the apparatus. The processor either transfers, via the port, the received PIN to an application associated with the network site that is executing on the network device or causes the apparatus to display the received PIN for manual transfer to the application associated with the network site.




secure

Control interface activated restraining system to secure a rider's footwear to a foot support

A restraining system is configured to secure and release a rider's footwear to a vehicle footrest in response to inputs to a control interface. The vehicle is typically a motorcycle or bicycle. In the case of a motorcycle, a rider's boot is restrained to a motorcycle foot peg by the action of a restraining device. Exemplary restraining device embodiments include an electromagnet or a mechanical latch. The control interface may be located on the motorcycle handlebar or on the rider's helmet. The rider can provide the inputs directly to the control interface. Alternatively, the inputs may be received from a wireless source.




secure

SECURE SHORT-DISTANCE-BASED COMMUNICATION AND VALIDATION SYSTEM FOR ZONE-BASED VALIDATION

A secure short-distance-based communication and validation system validates users in a validation area. The system may include multiple zones in the validation area and beacons in each zone. A run-time mobile device identifier and keys that may be location-specific, device-specific and time-specific are generated and utilized for secure communication between mobile devices and a zone computer in a zone. The validation area may be in a vehicle, and validation may include deducting a fare.




secure

Threading a saddle latigo strap to secure a saddle

A saddle latigo strap is threaded to secure a saddle. A body portion of a saddle latigo is looped through a permanent saddle rigging. A first end of the saddle latigo having a tapered portion is inserted through a second end. Notches of the body portion are engaged with holes of the first end to secure the saddle.




secure

High traffic flow robotic portal for secure access

Electro-mechanical and electronically controlled access devices are described for controlling access to a building, premises or area in a secure manner such that a subject who is deemed ineligible for access will be barred entry and may be optionally retained. The devices can contain multiple rotatable door panels, which can be positioned behind one another. The door panels can be controlled by mechanized arms or other control devices in order to control the passage through the device. The direction of flow through a device according to these embodiments is electronically controlled and may be changed at any point in time. At any instant in time, the flow through the device is unidirectional. Multiple devices can be stacked together to form clusters, which can be controlled according to traffic, time of day, or other factors.




secure

Funeral urn with independent and secured attached compartments

A funerary urn includes a receptacle (1) that has an opening (4) that is equipped with a removable sealing partition (11) for introducing ashes. The urn is equipped with side walls (3), a lower wall (2), and an upper wall (5), with one of the walls being removable in order to open and close the urn, the urn also including first and second inside compartments (6, 7) that each has an access element that is independent of the other and separate from the opening (4) for introducing ashes. The first compartment is equipped with a window (8) toward the outside, and the second compartment is completely concealed. The urn is designed for the perpetuation of memory because it makes it possible to preserve an emotional and material trace of the deceased individual thanks to independent compartments of the receptacle receiving the ashes.




secure

Lock assembly having secured setscrew configuration to prevent unauthorized handle removal

A lock assembly includes a coupling mechanism connected to a spindle assembly. The coupling mechanism has an outer sleeve having a longitudinal interior opening that extends along a first axis. An operator handle includes a proximal lock core opening, and a distal shaft portion having an axial opening configured to receive the outer sleeve. The distal shaft portion and the outer sleeve are configured to define a through path oriented across the longitudinal interior opening of the outer sleeve. A portion of the through path at the outer sleeve is configured to threadably receive a setscrew to fasten the operator handle to the outer sleeve. A keyed lock core has a tailpiece that is positioned in the longitudinal interior opening of the outer sleeve to obstruct the through path and block access to the setscrew via the through path to prevent unauthorized removal of the operator handle.




secure

Means to secure a lens into lens frame of a snow goggle

This invention relates to a means of securing a lens member into a snow goggle frame member, wherein the goggle frame member includes first insertion apertures, with first locating blocks at front edge, the lens member has a lens secured thereon, the lens includes first troughs to receive a corresponding first block therein, a pair of first rails are formed at respective sides of the first trough, each first rail has a first notch which includes a pair of second notches thereat, retainers are secured to the goggle frame and lens frame respectively, one end of the first insertion aperture includes a first insertion post at one end and a first insertion section at the other end thereof to receive the first insertion post therein, the first insertion section is then inserted into the first notch. The goggle may be replaced with various lenses and secured firmly.




secure

A PATIENT TUBE SECUREMENT APPARATUS FOR SECURING A PATIENT TUBE TO A PATIENT

A patient tube securement apparatus is disclosed that may be used for oral or nasal intubation of a patient. The apparatus may comprise an endotracheal tube securement apparatus for securing an endotracheal tube to a patient, the apparatus comprising a dermal patch arranged to be positioned on the skin of the patient, and at least one tube holder on the dermal patch.The apparatus may comprise a patient tube securement apparatus for securing a patient tube to a patient, the apparatus comprising a dermal patch arranged to be positioned on the skin of the patient, and at least one tube holder on the dermal patch.Examples are provided in which the tube holder is adjustably mounted on the dermal patch such that the position of the tube holder on the dermal patch can be adjusted without removing the dermal patch from the skin of the patient.




secure

New niche practice Realest secure landmark instruction

South Coast surveying practice, Realest have been instructed alongside joint agents Lambert Smith Hampton to market The Director General’s House in Southampton. The iconic building which was given its name as the former residence of the Director General of the Ordnance Survey, is located at the head of London Road fronting The Avenue and Rockstone Place.




secure

Savills secures sale of office block with planning permission for 60 new flats

The South Coast Development Team at Savills has successfully sold Southbrook Rise, the former council offices in Southampton, with planning permission for 60 flats.




secure

Northern Irish bid to secure collection of Titanic wreck artefacts

A £14 MILLION bid to buy a collection of more than 5,500 artefacts from the Titanic wreck site and bring them to Northern Ireland has been launched.