uri Trump picks Kristi Noem for Homeland Security Secretary: report By www.thehindu.com Published On :: Tue, 12 Nov 2024 19:38:20 +0530 Noem faced widespread backlash in April when she wrote in a memoir that she shot to death an "untrainable" dog that she "hated" on her family farm Full Article U.S. Elections
uri Tirupati witnesses brisk sale of white pumpkins during Deepavali season By www.thehindu.com Published On :: Fri, 01 Nov 2024 16:18:53 +0530 Not just pumpkins, but flowers such as marigold and chrysanthemum also saw a roaring business this season, to be adorned to the shopping outlets and vehicles Full Article Andhra Pradesh
uri A.P. HC restores Indukuri Raghu Raju’s membership of the Legislative Council By www.thehindu.com Published On :: Wed, 06 Nov 2024 20:27:59 +0530 Full Article Andhra Pradesh
uri Tourism Minister releases book on Andhra Pradesh at Rajamahendravaram By www.thehindu.com Published On :: Fri, 08 Nov 2024 20:09:47 +0530 Full Article Andhra Pradesh
uri Magali Koenig : courir apres la pluie / direction editoriale, Geraldine Lay, Pierre Starobinski. [Accompagne de], Les yeux dans le samovar / Blaise Hofmann By darius.uleth.ca Published On :: [Arles] : Actes Sud, [2022] Full Article
uri Morale and the Italian army during the First World War [electronic resource] / Vanda Wilcox. By darius.uleth.ca Published On :: Cambridge : Cambridge University Press , 2016. Full Article
uri State, Society and Mobilization in Europe during the First World War [electronic resource] / edited by John Horne. By darius.uleth.ca Published On :: Cambridge : Cambridge University Press , 1997. Full Article
uri Nanocubic cobalt-containing Prussian blue analogue-derived carbon-coated CoFe alloy nanoparticles for noninvasive uric acid sensing By pubs.rsc.org Published On :: Anal. Methods, 2024, Advance ArticleDOI: 10.1039/D4AY00121D, PaperYunting Qin, Dan Xiao, Xilan Gao, Xicui Zhang, Yanxue XuThis work describes an electrochemical sensor for the fast noninvasive detection of uric acid (UA) in saliva.To cite this article before page numbers are assigned, use the DOI form of citation above.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
uri Rapid and green quantification of phloridzin and trilobatin in Lithocarpus litseifolius (Hance) Chun (sweet tea) using an online pressurized liquid extraction high-performance liquid chromatography at equal absorption wavelength method By pubs.rsc.org Published On :: Anal. Methods, 2024, Advance ArticleDOI: 10.1039/D4AY00170B, PaperZhengming Qian, Qinggui Lei, Dan Tang, Guoying Tan, Qi Huang, Fucai Zhou, Wenhao WangSweet tea is a functional herbal tea with anti-inflammatory, anti-diabetic, and other effects, in which phloridzin and trilobatin are two functional compounds.To cite this article before page numbers are assigned, use the DOI form of citation above.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
uri Caffeine quantification in dietary supplements using high-throughput on-line solid phase extraction coupled to Venturi easy ambient sonic-spray ionization mass spectrometry By pubs.rsc.org Published On :: Anal. Methods, 2024, Advance ArticleDOI: 10.1039/D4AY00333K, PaperDavid Ulisses Tega, Luan Felipe Campos Oliveira, Patrick Cesar Ferreira, Bruna Beatriz Soldera, Heliara Dalva Lopes Nascimento, Marcos Nogueira Eberlin, Alessandra SussuliniOptimization of a LC-V-EASI-MS system. Employment of LC-V-EASI-MS and online SPE to enhance analytical performance for caffeine determination reaching 90 s per sample.To cite this article before page numbers are assigned, use the DOI form of citation above.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
uri A complementary method with PFBBr-derivatization based on a GC-EI-MS platform for the simultaneous quantitation of short-, medium- and long-chain fatty acids in murine plasma and feces samples By pubs.rsc.org Published On :: Anal. Methods, 2024, 16,2330-2339DOI: 10.1039/D3AY02271D, PaperHong-Xu Zhou, Qing Jiang, Xin He, Xian Fu, Jun-Yan LiuFatty acids (FAs) are essential molecules in all organisms and are involved in various physiological and pathophysiological processes.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
uri The preparation of a boronate affinity-based controlled oriented imprinting coating on a silica nanoparticle surface for the separation and purification of shikimic acid in herbal medicine By pubs.rsc.org Published On :: Anal. Methods, 2024, Advance ArticleDOI: 10.1039/D4AY00219A, PaperYumin Yang, Daojin Li, Bingqian LiuShikimic acid (SA) is one of the most effective drugs against the A (H1N1) virus and has high medicinal value.To cite this article before page numbers are assigned, use the DOI form of citation above.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
uri QR codes for security in vehicles By www.thehindubusinessline.com Published On :: Tue, 03 Sep 2013 16:32:33 +0530 Full Article R Dinakaran
uri Rational design and in vitro testing of new urease inhibitors to prevent urinary catheter blockage By pubs.rsc.org Published On :: RSC Med. Chem., 2024, 15,3597-3608DOI: 10.1039/D4MD00378K, Research Article Open Access   This article is licensed under a Creative Commons Attribution 3.0 Unported Licence.Rachel A. Heylen, Nicola Cusick, Tom White, Emily J. Owen, Bethany L. Patenall, Martin Alm, Peter Thomsen, Maisem Laabei, A. Toby A. JenkinsIn silico identification of urease inhibitors based on thiourea, tested to determine IC50 and tested on a catheterised in vitro bladder model, showing efficacy in reducing catheter blockage.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
uri Miniaturized click chemistry and direct screening facilitate the discovery of triazole piperazine SARS-CoV-2 Mpro inhibitors with improved metabolic stability By pubs.rsc.org Published On :: RSC Med. Chem., 2024, Advance ArticleDOI: 10.1039/D4MD00555D, Research ArticleShenghua Gao, Letian Song, Bing Ye, Mianling Yang, Junyi Li, Manyu Gu, Ann E. Tollefson, Karoly Toth, Peng Zhan, Xinyong LiuThe continuous mutational nature of SARS-CoV-2 and its inter-species' similarities emphasize the urgent need to design and develop more direct-acting antiviral agents against highly infectious variants.To cite this article before page numbers are assigned, use the DOI form of citation above.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
uri Agro-tourism push needs industry-specific policies, say farmers By www.thehindu.com Published On :: Wed, 06 Nov 2024 18:37:41 +0530 Full Article Tiruchirapalli
uri Case filed against actor Kasthuri over remarks on Telugu community By www.thehindu.com Published On :: Wed, 06 Nov 2024 19:46:03 +0530 Full Article Tiruchirapalli
uri Ernakulam Express to stop at Muthupettai during Kandhoori festival By www.thehindu.com Published On :: Thu, 07 Nov 2024 18:51:18 +0530 Full Article Tiruchirapalli
uri Students and agriculture officials grapple with logistical, technical issues during digital crop survey By www.thehindu.com Published On :: Sat, 09 Nov 2024 20:32:48 +0530 Full Article Tiruchirapalli
uri 567: Full Stack Dev, Load Bearing Developer, and Being Zod Curious By shoptalkshow.com Published On :: Mon, 29 May 2023 09:00:16 +0000 What do you do if your computer dies? Chris applies to work at Luro, Dave applies at CodePen, Dave's Zod curious, TypeScript, sorting out a 10MB blog post, and how much do you miss jQuery? Full Article All Episodes full stack Jquery Zod
uri Why banks are branching furiously By www.thehindubusinessline.com Published On :: Sun, 13 Oct 2024 20:13:00 +0530 From financial inclusion to wooing back savings deposits, lenders have reasons to reject digital-only mode Full Article Current Account
uri The secret sauce behind ITC’s enduring restaurant brands By www.thehindubusinessline.com Published On :: Sun, 20 Oct 2024 10:45:54 +0530 The promise of an unchanged, consistent menu and supreme culinary artistry has drawn food lovers to ITC’s tables for decades Full Article Marketing
uri Police rule out communal angle in clash near Jahangirpuri temple By www.thehindu.com Published On :: Wed, 06 Nov 2024 00:15:57 +0530 Full Article Delhi
uri Haryana Congress to move court over ‘violations’ by BJP during Assembly poll By www.thehindu.com Published On :: Wed, 06 Nov 2024 12:43:15 +0530 Panel to gather information from party’s candidates about various violations Full Article Delhi
uri Leaves taken by doctors during RG Kar protest to be adjusted against their official quota: AIIMS Delhi By www.thehindu.com Published On :: Fri, 08 Nov 2024 01:12:12 +0530 Full Article Delhi
uri Delhi | The DAG is hosting an exhibition that celebrates MF Husain and his enduring legacy By www.thehindu.com Published On :: Sat, 09 Nov 2024 15:44:19 +0530 An exhibition in New Delhi’s DAG covers pivotal moments of legendary artist and painter MF Husain’s artistic journey Full Article Art
uri Security upped outside Canadian High Commission due to protest against temple attack By www.thehindu.com Published On :: Sun, 10 Nov 2024 16:13:43 +0530 The Hindu Sikh Global Forum members are marching towards the High Commission in the Chanakyapuri area Full Article Delhi
uri ARRL VEC Services Update During Systems Disruption By www.arrl.org Published On :: Wed, 30 Oct 2024 14:43:00 -0500 Updated 10/30/2024ARRL previously reported that we are responding to a serious incident involving access to our network and headquarters-based systems. Several services have been affected, including those administered by the ARRL Volunteer Examiner Coordinator (ARRL VEC).Exam Registrations and Materials. ARRL Volunteer Examiners (VEs) should continue to submit exam registrations and material re... Full Article
uri ARRL Recognizes University of Scranton During Amateur Radio Station Dedication By www.arrl.org Published On :: Thu, 31 Oct 2024 13:06:00 -0500 The University of Scranton in Pennsylvania has a new amateur radio station, W3USR. A dedication was held at the university’s Loyola Science Center on Friday, October 25, 2024, led by Dr. Nathaniel Frissell, W2NAF, an associate professor of physics and electrical engineering, and club advisor for the University of Scranton Amateur Radio Club.The new W3USR University of Scranton Amateur Radio Sta... Full Article
uri Strategies for an enduring legacy By www.thehindubusinessline.com Published On :: Sun, 01 Nov 2020 21:05:00 +0530 How firms can thrive in an era of social tension, economic nationalism and tech revolution Full Article Books
uri Karnataka agriculturists retailing forest honey, gluten-free flours, and more By www.thehindu.com Published On :: Thu, 12 Oct 2023 16:55:36 +0530 In part two of this series, we look at agriculturalists in the State retailing wild forest honey, gluten-free flours, ragi malt, and more Full Article Food
uri Tobacco Board authorises 100 million kg crop size for Karnataka during 2024-25 By www.thehindu.com Published On :: Mon, 18 Mar 2024 11:07:46 +0530 Registration process for upcoming crop season will commence on March 27 Full Article Agriculture
uri Eyebrows raised as Central team visits Anantapur to assess rabi drought during rainy kharif By www.thehindu.com Published On :: Wed, 19 Jun 2024 20:31:59 +0530 The team choosing mandals like Vidapanakallu and Vajrakarur which received excessive rain in June, draws flak from farmers and district officials alike; farmers worry as to how to present their drought woes to the officials who are visiting their fields which are now rain-fed and green Full Article Andhra Pradesh
uri Shoppers’ paradise lost? Singapore’s malls suffer as locals, tourists curb spending By www.thehindu.com Published On :: Tue, 07 Jun 2016 00:00:00 +0530 Full Article Mumbai Capital
uri BJP protecting SEBI chairperson Madhabi Puri Buch from answering to PAC: Congress By www.thehindu.com Published On :: Sat, 26 Oct 2024 23:00:46 +0530 Leader of the Opposition in the Lok Sabha Rahul Gandhi said Ms. Buch was being protected from giving answers to Parliament, from resigning as SEBI chief and from an investigation into her alleged links with the Adani Group companies. Ms. Buch had skipped the PAC meeting citing personal reasons Full Article India
uri Heavy rainfall forecast for Chennai, neighbouring districts till November 15 By www.thehindu.com Published On :: Mon, 11 Nov 2024 19:11:40 +0530 Chennai district collector has declared holiday for schools on November 12 owing to rain Full Article Chennai
uri Chennai and neighbouring districts to witness heavy rains till November 15 By www.thehindu.com Published On :: Tue, 12 Nov 2024 15:08:56 +0530 On Nov. 12, RMC, Chennai, upgraded its weather warning to orange alert, indicating a possibility of rainfall of very heavy intensity for 24 hours ending 8.30 a.m. on Nov. 13 in Chennai, Tiruvallur, and Chengalpattu districts Full Article Chennai
uri Thin free-standing liquid films manipulation: device design to turn on/off gravity in flow regimes for thickness map control and for material structuring By pubs.rsc.org Published On :: Soft Matter, 2024, Advance ArticleDOI: 10.1039/D4SM00951G, Paper Open Access   This article is licensed under a Creative Commons Attribution 3.0 Unported Licence.Paolo Iaccarino, Zhe Wang, Andrea Marfuggi, Simone Russo, Vincenzo Ferraro, Giuseppe Vitiello, Sara Coppola, Ernesto Di MaioWe design a device to control liquid film drainage, able to switch between viscous-capillary and viscous-gravity regimes to stabilize thickness and modify particle arrangement, offering potential for film studies and 2D structure fabrication.To cite this article before page numbers are assigned, use the DOI form of citation above.The content of this RSS Feed (c) The Royal Society of Chemistry Full Article
uri Iconography of Security By 24ways.org Published On :: Sat, 07 Dec 2019 12:00:00 +0000 Molly Wilson and Eileen Wagner battle the age old Christmas issues of right and wrong, good and evil, and how the messages we send through iconography design can impact the decisions users make around important issues of security. Are you icons wise men, or are they actually King Herod? Congratulations, you’re locked out! The paradox of security visuals Designers of technology are fortunate to have an established visual language at our fingertips. We try to use colors and symbols in a way that is consistent with people’s existing expectations. When a non-designer asks a designer to “make it intuitive,” what they’re really asking is, “please use elements people already know, even if the concept is new.” Lots of options for security icons We’re starting to see more consistency in the symbols that tech uses for privacy and security features, many of them built into robust, standardized icon sets and UI kits. To name a few: we collaborated with Adobe in 2018 to create the Vault UI Kit, which includes UI elements for security, like touch ID login and sending a secure copy of a file. Adobe has also released a UI kit for cookie banners. Activity log from the Vault Secure UI Kit, by Adobe and Simply Secure. Cookie banner, from the Cookie Banner UI Kit, by Adobe. Even UI kits that aren’t specialized in security and privacy include icons that can be used to communicate security concepts, like InVision’s Smart Home UI Kit. And, of course, nearly every icon set has security-related symbols, from Material Design to Iconic. Key, lock, unlock, shield, and warning icons from Iconic. A selection of security-related icons from Material Design. Security shields from a selection of Chinese apps, 2014. From a longer essay by Dan Grover. Many of these icons allude to physical analogies for the states and actions we’re trying to communicate. Locks and keys; shields for protection; warning signs and stop signs; happy faces and sad faces. Using these analogies helps build a bridge from the familiar, concrete world of door locks and keyrings to the unfamiliar, abstract realm of public- and private-key encryption. flickr/Jim Pennucci GPG Keychain, an open-source application for managing encryption keys. Image: tutsplus.com When concepts don’t match up Many of the concepts we’re working with are pairs of opposites. Locked or unlocked. Private or public. Trusted or untrusted. Blocked or allowed. Encouraged or discouraged. Good or evil. When those concept pairs appear simultaneously, however, we quickly run into UX problems. Take the following example. Security is good, right? When something is locked, that means you’re being responsible and careful, and nobody else can access it. It’s protected. That’s cause for celebration. Being locked and protected is a good state. “Congratulations, you’re locked out!” Whoops. If the user didn’t mean to lock something, or if the locked state is going to cause them any inconvenience, then extra security is definitely not good news. Another case in point: Trust is good, right? Something trusted is welcome in people’s lives. It’s allowed to enter, not blocked, and it’s there because people wanted it there. So trusting and allowing something is good. “Good job, you’ve downloaded malware!” Nope. Doesn’t work at all. What if we try the opposite colors and iconography? That’s even worse. Even though we, the designers, were trying both times to keep the user from downloading malware, the user’s actual behavior makes our design completely nonsensical. Researchers from Google and UC Berkeley identified this problem in a 2016 USENIX paper analyzing connection security indicators. They pointed out that, when somebody clicks through a warning to an “insecure” website, the browser will show a “neutral or positive indicator” in the URL bar – leading them to think that the website is now safe. Unlike our example above, this may not look like nonsense from the user point of view, but from a security standpoint, suddenly showing “safe/good” without any actual change in safety is a pretty dangerous move. The deeper issue Now, one could file these phenomena under “mismatching iconography,” but we think there is a deeper issue here that concerns security UI in particular. Security interface design pretty much always has at least a whiff of “right vs. wrong.” How did this moralizing creep into an ostensibly technical realm? Well, we usually have a pretty good idea what we’d like people to do with regards to security. Generally speaking, we’d like them to be more cautious than they are (at least, so long as we’re not trying to sneak around behind their backs with confusing consent forms and extracurricular data use). Our well-intentioned educational enthusiasm leads us to use little design nudges that foster better security practices, and that makes us reach into the realm of social and psychological signals. But these nudges can easily backfire and turn into total nonsense. Another example: NoScript “No UX designer would be dense enough to make these mistakes,” you might be thinking. Well, we recently did a redesign of the open-source content-blocking browser extension NoScript, and we can tell you from experience: finding the right visual language for pairs of opposites was a struggle. NoScript is a browser extension that helps you block potential malware from the websites you’re visiting. It needs to communicate a lot of states and actions to users. A single script can be blocked or allowed. A source of scripts can be trusted or untrusted. NoScript is a tool for the truly paranoid, so in general, wants to encourage blocking and not trusting. But: “An icon with a crossed-out item is usually BAD, and a sign without anything is usually GOOD. But of course, here blocking something is actually GOOD, while blocking nothing is actually BAD. So whichever indicators NoScript chooses, they should either aim to indicate system state [allow/block] or recommendation [good/bad], but not both. And in any case, NoScript should probably stay away from standard colors and icons.” So we ended up using hardly any of the many common security icons available. No shields, no alert! signs, no locked locks, no unlocked locks. And we completely avoided the red/green palette to keep from taking on unintended meaning. Navigating the paradox Security recommendations appear in most digital services are built nowadays. As we move into 2020, we expect to see a lot more conscious choice around colors, icons, and words related to security. For a start, Firefox already made a step in the right direction by streamlining indicators for SSL encryption as well as content blocking. (Spoilers: they avoided adding multiple dimensions of indicators, too!) The most important thing to keep in mind, as you’re choosing language around security and privacy features, is: don’t conflate social and technical concepts. Trusting your partner is good. Trusting a website? Well, could be good, could be bad. Locking your bike? Good idea. Locking a file? That depends. Think about the technical facts you’re trying to communicate. Then, and only then, consider if there’s also a behavioral nudge you want to send, and if you are, try to poke holes in your reasoning. Is there ever a case where your nudge could be dangerous? Colors, icons, and words give you a lot of control over how exactly people experience security and privacy features. Using them in a clear and consistent way will help people understand their choices and make more conscious decisions around security. About the author Molly Wilson is a designer by training and a teacher at heart: her passion is leveraging human-centered design to help make technology clear and understandable. She has been designing and leading programs in design thinking and innovation processes since 2010, first at the Stanford d.school in Palo Alto, CA and later at the Hasso-Plattner-Institut School of Design Thinking in Potsdam, Germany. Her work as an interaction designer has focused on complex products in finance, health, and education. Outside of work, talk to her about cross-cultural communication, feminism, DIY projects, and visual note-taking. Molly holds a master’s degree in Learning, Design, and Technology from Stanford University, and a bachelor’s degree magna cum laude in History of Science from Harvard University. See more about her work and projects at http://molly.is. Eileen Wagner is Simply Secure’s in-house logician. She advises teams and organizations on UX design, supports research and user testing, and produces open resources for the community. Her focus is on information architecture, content strategy, and interaction design. Sometimes she puts on her admin hat and makes sure her team has the required infrastructure to excel. She previously campaigned for open data and civic tech at the Open Knowledge Foundation Germany. There she helped establish the first public funding program for open source projects in Germany, the Prototype Fund. Her background is in analytic philosophy (BA Cambridge) and mathematical logic (MSc Amsterdam), and she won’t stop talking about barbershop music. More articles by Molly Wilson & Eileen Full Article Design security
uri Usability and Security; Better Together By 24ways.org Published On :: Sun, 22 Dec 2019 12:00:00 +0000 Divya Sasidharan calls into question the trade-offs often made between security and usability. Does a secure interface by necessity need to be hard to use? Or is it the choice we make based on years of habit? Snow has fallen, snow on snow. Security is often synonymous with poor usability. We assume that in order for something to be secure, it needs to by default appear impenetrable to disincentivize potential bad actors. While this premise is true in many instances like in the security of a bank, it relies on a fundamental assumption: that there is no room for choice. With the option to choose, a user almost inevitably picks a more usable system or adapts how they interact with it regardless of how insecure it may be. In the context of the web, passwords are a prime example of such behavior. Though passwords were implemented as a way to drastically reduce the risk of attack, they proved to be marginally effective. In the name of convenience, complex, more secure passwords were shirked in favor of easy to remember ones, and passwords were liberally reused across accounts. This example clearly illustrates that usability and security are not mutually exclusive. Rather, security depends on usability, and it is imperative to get user buy-in in order to properly secure our applications. Security and Usability; a tale of broken trust At its core, security is about fostering trust. In addition to protecting user accounts from malicious attacks, security protocols provide users with the peace of mind that their accounts and personal information is safe. Ironically, that peace of mind is incumbent on users using the security protocols in the first place, which further relies on them accepting that security is needed. With the increased frequency of cyber security threats and data breaches over the last couple of years, users have grown to be less trusting of security experts and their measures. Security experts have equally become less trusting of users, and see them as the “the weakest link in the chain”. This has led to more cumbersome security practices such as mandatory 2FA and constant re-login flows which bottlenecks users from accomplishing essential tasks. Because of this break down in trust, there is a natural inclination to shortcut security altogether. Build a culture of trust not fear Building trust among users requires empowering them to believe that their individual actions have a larger impact on the security of the overall organization. If a user understands that their behavior can put critical resources of an organization at risk, they will more likely behave with security in mind. For this to work, nuance is key. Deeming that every resource needs a similarly high number of checks and balances diminishes how users perceive security and adds unnecessary bottlenecks to user workflows. In order to lay the foundation for good security, it’s worth noting that risk analysis is the bedrock of security design. Instead of blindly implementing standard security measures recommended by the experts, a better approach is to tailor security protocols to meet specific use cases and adapt as much as possible to user workflows. Here are some examples of how to do just that: Risk based authentication Risk based authentication is a powerful way to perform a holistic assessment of the threats facing an organization. Risks occur at the intersection of vulnerability and threat. A high risk account is vulnerable and faces the very real threat of a potential breach. Generally, risk based authentication is about calculating a risk score associated with accounts and determining the proper approach to securing it. It takes into account a combination of the likelihood that that risk will materialize and the impact on the organization should the risk come to pass. With this system, an organization can easily adapt access to resources depending on how critical they are to the business; for instance, internal documentation may not warrant 2FA, while accessing business and financial records may. Dynamically adaptive auth Similar to risk based auth, dynamically adaptive auth adjusts to the current situation. Security can be strengthened and slackened as warranted, depending on how risky the access point is. A user accessing an account from a trusted device in a known location may be deemed low risk and therefore not in need of extra security layers. Likewise, a user exhibiting predictive patterns of use should be granted quick and easy access to resources. The ability to adapt authentication based on the most recent security profile of a user significantly improves the experience by reducing unnecessary friction. Conclusion Historically, security failed to take the user experience into account, putting the onus of securing accounts solely on users. Considering the fate of password security, we can neither rely on users nor stringent security mechanisms to keep our accounts safe. Instead, we should aim for security measures that give users the freedom to bypass them as needed while still protecting our accounts from attack. The fate of secure systems lies in the understanding that security is a process that must constantly adapt to face the shifting landscape of user behavior and potential threats. About the author Divya is a web developer who is passionate about open source and the web. She is currently a developer experience engineer at Netlify, and believes that there is a better workflow for building and deploying sites that doesn’t require a server—ask her about the JAMstack. You will most likely find her in the sunniest spot in the room with a cup of tea in hand. More articles by Divya Full Article UX security
uri Neeta Lulla on ‘Shaakuntalam’: Samantha Ruth Prabhu’s outfits are simple yet alluring By www.thehindu.com Published On :: Thu, 23 Mar 2023 15:24:25 +0530 Designer Neeta Lulla on the fairytale-like silhouettes for Samantha Ruth Prabhu’s mythological romance drama ‘Shaakuntalam’ Full Article Movies
uri Running during Ramadan By www.thehindu.com Published On :: Sat, 11 Jun 2016 16:12:57 +0530 Running during a fast can be physically challenging, but not impossible. Full Article Metroplus
uri Editorial. More action needed against substandard, spurious drugs By www.thehindubusinessline.com Published On :: Mon, 30 Sep 2024 21:22:34 +0530 Industry bodies should take the lead to protect the image of a sector that has at least 10,000 units and a market size of about $50 billion, growing in double digits Full Article Editorial
uri Editorial. RBI right in reining in usurious micro lending By www.thehindubusinessline.com Published On :: Wed, 23 Oct 2024 21:02:22 +0530 But sudden ‘cease and desist’ orders can also affect the bond markets from where NBFCs raise funds Full Article Editorial
uri Indian banks increased their overseas presence during 2023-24 : RBI Survey By www.thehindubusinessline.com Published On :: Fri, 25 Oct 2024 20:41:08 +0530 During the year, the number of branches and employees of foreign banks in India also expanded by 0.6 per cent and 1.4 per cent, respectively Full Article Money & Banking
uri SEBI proposes ₹1 crore minimum investment, mandatory demat form for securitised debt instruments By www.thehindubusinessline.com Published On :: Sun, 03 Nov 2024 12:08:18 +0530 Securitised debt instruments (SDIs) issued privately to be offered to a maximum of 200 investors, public offers to remain open for a minimum of three days and a maximum of 10 days, proposes SEBI Full Article Markets
uri Drone pilot training to be launched at Vikarama Simhapuri University in Nellore By www.thehindu.com Published On :: Sat, 09 Nov 2024 19:32:14 +0530 A consortium of five companies will sign an MoU with the university to co-create a certification programme in Drone Engineering Full Article Andhra Pradesh
uri Master plan soon to develop Srisailam and tourism in Nallamala, says Andhra Pradesh Chief Minister Chandrababu Naidu By www.thehindu.com Published On :: Sat, 09 Nov 2024 20:49:52 +0530 A committee comprising three Cabinet Ministers will be constituted for the purpose, says Chandrababu Naidu; he warns of severe action against those resorting to character assassination of women and children Full Article Andhra Pradesh
uri Ensuring a proper social safety net for the gig worker By www.thehindu.com Published On :: Tue, 15 Oct 2024 01:20:00 +0530 Defining ‘employment relation’ in gig work is the key Full Article Comment
uri Ensuring private sector collaborations in India’s national climate strategy By www.thehindu.com Published On :: Wed, 16 Oct 2024 10:10:00 +0530 For this, the Competition Commission of India needs to focus on the interplay between competition law and sustainability Full Article Comment