Watch real-life Iron Men do the first jetpack launch from the ground



XDubai

Iron Man might make flying look easy, but strapping on a jetpack and wings ranks as one of the more dangerous things you could every try. Jetman Yves Rossy and his two protégés (Fred Fugen and Vince Reffet) are bringing you closer to that action with the launch of a documentary called Loft: The Jetman Story.

In a teaser trailer for the film, produced in collaboration with XDubai, the trio show off some formation flying through the Fjords of Norway. It demonstrates the extreme risk (“if something goes wrong you have to react fast,” says Reffet) along with some pretty incredible high-speed visuals. You also get to see the first time the team has launched from a ground-based platform, albeit a high ramp in the mountains, rather than the helicopters or planes they usually use.






via MAKE Magazine
Weekend Watch: Welcome to Shedlandia

Building a Laravel Translation Package – Wrangling Translations



Laravel Tutorials
/
November 02, 2018

Building a Laravel Translation Package – Wrangling Translations

As we’ve discussed earlier in the series, out of the box, Laravel translations are stored in language files. These can be either PHP array-style syntax or straight up JSON files.

The Laravel Translation package interacts with the files in order to achieve the following:

  • List all languages
  • Add a language
  • List all translations
  • Add a translation
  • Update existing translations

The plan for the package is, much like many features of Laravel, to expose multiple drivers to power the translation management. The first driver will utilize Laravel’s existing file-based translations with plans to later add a database driver. With this in mind, we first define a contract to which driver will implement to ensure all the required methods are available to the package.

The file driver needs to interrogate the filesystem in order to return the data in the required format. This involves a lot of filtering, mapping and iterating, so we will lean quite heavily on Laravel’s collections.

Listing languages

To generate a collection of languages, we use the filesystem to get an array of directories from the configured language path, wrapping the result in a collection.

$directories = Collection::make($this->disk->directories($this->languageFilesPath));

Next, we utilize the mapWithKeys function to iterate over the directories, stripping the language from the path (it will be the last segment) and returning a key => value array.

return $directories->mapWithKeys(function ($directory) {
    $language = basename($directory);
    return [$language => $language];
});

The result looks something like this:

// $this->allLanguages()->toArray();

[
    ‘en’ => ‘en’,
    ‘fr’ => ‘fr’,
    ‘es’ => ‘es’,
];

Adding languages

To create a new language, we need to add a new directory and empty JSON file to the configured language path and name it after the language we’re adding.

$this->disk->makeDirectory(“{$this->languageFilesPath}/$language”);

if (! $this->disk->exists(“{$this->languageFilesPath}/{$language}.json”)) {
    $this->disk->put(
        “{$this->languageFilesPath}/$language.json”,
        json_encode((object) [], JSON_UNESCAPED_UNICODE | JSON_PRETTY_PRINT)
    );
}

Then, we use the filesystem to add a new file to the language path containing an empty JSON encoded array.

Using the JSON_UNESCAPED_UNICODE | JSON_PRETTY_PRINT constants ensure the generated JSON is in the right format.

Listing translations

When listing translations we want to ensure we differentiate the group (array style) translations from the single (JSON style).

Group
To get the group translations, we can use the filesystem to get all the files from the language directory.

$groups Collection($this->disk->allFiles(“{$this->languageFilesPath}/{$language}“));

Then, to get the translations, we can iterate over all the files in the directory and use the filesystem’s getRequire method to require the file giving us direct access to the array.

$groups->mapWithKeys(function ($group) {
    return [$group->getBasename(‘.php’) => $this->disk->getRequire($group->getPathname())];
});

The result looks something like this:

[
    ‘auth’ => [
        ‘failed’ => ‘These credentials do not match our records’,
    ],
]

Single

We can get the single translations by using json_decode on the contents of the file.

if ($this->disk->exists($this->languageFilesPath.“/$language.json”)) {
    return new Collection(json_decode($this->disk->get($singlePath), true));
}

The result looks something like this:

[
    ‘hello’ => ‘hello’,
]

Adding/updating translations

Translations are added and updated in largely the same fashion. First, we get the contents of the file the translation should be added to in array format. Then, we check whether or not the key to be added already exists. If it does, we update the value and if not, we append the new key and value to the array. Finally, the whole array is written back to the file.

Group

$translations = $this->getGroupTranslationsFor($language);
$values = $translations->get($group);
$values[$key] = $value;
$translations->put($group, $values);
$this->disk->put(
    “{$this->languageFilesPath}/{$language}/{$group}.php”,
    “<?php\n\nreturn “.var_export($translations, true).‘;’.\PHP_EOL
);

Single

$translations = $this->getSingleTranslationsFor($language);
$translations->put($key, $value);
$this->disk->put(
    “{$this->languageFilesPath}/$language.json”,
    json_encode((object) $translations, JSON_UNESCAPED_UNICODE | JSON_PRETTY_PRINT)
);

Some of the code samples have been truncated for clarity. You can see the full code for the files mentioned in the article below:

Driver Interface
File Driver

This driver lays the foundation from which we can build upon. Next time, we’ll build out the user interface which will ship with the package. It utilizes a combination of Tailwind CSS and Vue.js, two frameworks which have been widely adopted by the Laravel community.


via Laravel News
Building a Laravel Translation Package – Wrangling Translations

Harvard Opens Up Its Massive Caselaw Access Project

Almost exactly three years ago, we wrote about the launch of an ambitious project by Harvard Law School to scan all federal and state court cases and get them online (for free) in a machine readable format (not just PDFs!), with open APIs for anyone to use. And, earlier this week, case.law officially launched, with 6.4 million cases, some going back as far as 1658. There are still some limitations — some placed on the project by its funding partner, Ravel, which was acquired by LexisNexis last year (though, the structure of the deal will mean some of these restrictions will likely decrease over time).

Also, the focus right now is really on providing this setup as a tool for others to build on, rather than as a straight up interface for anyone to use. As it stands, you can either access data via the site’s API, or by doing bulk downloads. Of course, the bulk downloads are, unfortunately, part of what’s limited by the Ravel/LexisNexis data. Bulk downloads are available for cases in Illinois and Arkansas, but that’s only because both of those states already make cases available online. Still, even with the Ravel/LexisNexis limitation, individual users can download up to 500 cases per day.

The real question is what will others build with the API. The site has launched with four sample applications that are all pretty cool.

  • H2O is a tool that law professors can use to easily create casebooks for students in various areas of law. Anything published on H2O gets a Creative Commons license and can then be shared widely. I wonder if professors like Eric Goldman, who offers an Internet Law Casebook, or James Grimmelmann, who has a different Internet Law Casebook, will eventually port them over to a platform like H2O.
  • A wordcloud app that currently shows the "most used words" in California cases in various years. Here, for example, are the word clouds in California cases from 1871… and 2012. See if you can tell which one’s which.
   
  • Caselaw Limericks that appears to randomly generate what it believes is a rhyming limerick from the case law. Here’s what I got:

Her son Julius is a confirmed thief.
He did not turn over a new leaf.
The vessel, not.
the parking lot.
Respondent concedes this in its brief.

    The quality overall is… a bit mixed. But it’s fun.
  • And, finally, in time for Halloween, Witchcraft in Law, which totals up cases that cite "witchcraft" by state.

Hopefully this inspires a lot more on the development side as well.

Permalink | Comments | Email This Story

via Techdirt
Harvard Opens Up Its Massive Caselaw Access Project

How Much Do Your Employees Actually Know About Cybersecurity?

Image Credit: TheDigitalArtist on Pixabay

In 2017, the globally known company Deloitte faced a cybersecurity crisis. That is, a cyber attack led to their blue-chip client data being compromised. The reason? The admin account that had access to their global email server did not have two-factor authentication.

Another catastrophic data breach took place at American Superconductor Corp (AMSC). That incident was caused by a former employee who brought the company’s intellectual property to his new employer, Sinovel. To make matters worse, Sinovel and AMSC are competitors. As a result of this former employee’s treachery, AMSC’s losses exceeded $1 billion. Plus, they almost went out of business.

 

RELATED ARTICLE: WEBSITE VULNERABILITIES: DON’T LET THEM SLOW YOUR BUSINESS DOWN

 

Do You Think It Will Never Happen to You?

These stories may seem like it-will-never-happen-in-my-company narratives. But let’s agree on this: your partners, your suppliers, your third-party vendors, and your current employees all represent a significant threat to your cybersecurity. Nonetheless, studies reveal that companies often miss this fact. When they do, they end up suffering sometimes ruinous losses.

A report from Shred-it shows that employee negligence—for example, an accidental loss of a device—caused 47 percent of organizations’ data breaches. Moreover, these data breaches cost organizations an average of $3,6 million globally in 2017. The report also revealed that more than 25 percent of respondents leave their computers unlocked and unattended. These numbers prove that even small mistakes can backfire and cause significant harm.

So, what actions could you implement to minimize the risks of a data breach in your company?

 

  • Communicate the Idea of Cybersecurity to Your Employees Clearly, Consistently, and Often

First of all, before you start, take the time to analyze the weakest points in your company’s cybersecurity. Then, define your company’s cybersecurity policy based on those weak points.

However, don’t forget to add basic information about how to read URL links. You want your employees to be able to recognize malicious emails or phishing attacks. What’s more, if your company has remote workers, ensure that those employees apply good cybersecurity practices outside of the office.

If you already have a good cybersecurity policy in hand, start a cybersecurity onboarding program for your employees based on that. However, remember that new vulnerabilities arise every day. Therefore, your IT department should continuously work to inform employees about possible types of attacks. Communication is key. Moreover, leaving your cybersecurity policy in a drawer is not an option.

 

  • Ensure Passwords Are Strong Enough

Remember Deloitte’s case mentioned earlier? A weak password cost them a lot. Make sure your employees understand the difference between strong and weak passwords. Two-factor authentication (also known as multi-factor authentication) is a way to ensure additional protection. Implementing two-factor authentication in your employees’ daily practices can be a huge step forward.

 

  • Communicate the Importance of Encryption

A study by Zug revealed that 70 percent of professionals work remotely at least once a week. Around 53 percent do so for at least half of the week. However, according to the study, more than half of small business owners admit they don’t have a cybersecurity policy for their remote workers.

If you are in a similar situation, you need to make sure your remote employees’ Internet connections are as secure as those for your in house employees. This can be tricky, as unsecured WiFi at various coffee shops can cause a serious threat to employees working remotely.

One of the solutions for upgrading security to the next level is a third-party VPN (virtual private network) service. A VPN can encrypt traffic and establish a secure and private user’s connection to the Internet. By rerouting all traffic that travels between the device and the web’s servers, a VPN creates a secure tunnel that is virtually impenetrable.

However, choose your VPN wisely. Look for the ones offering a no logs policy. That’s because if your VPN retains user activity logs, third parties could get access to your transferred data.

 

  • Help Employees Understand the Importance of Backups

Your employees don’t necessarily know how important backups are. They also might not understand that sometimes backups don’t work.

In some cases, when a cyber-criminal takes over access to a computer, the victim panics and even thinks about paying a ransom to get their files unlocked. Various companies are the primary target for criminals working on this kind of attack. And this comes as no surprise, as firms are often ready to pay much more than individual users are for getting their important data back.

Therefore, take the time to teach the employees the 3-2-1 backup rule. This rule suggests keeping three copies of all data. They should be stored on two different media, and one backup copy should be stored offsite. If something terrible happens, you can quickly restore data and avoid the possible stress and losses.

 

Strong Cybersecurity Is an Ongoing Concern

Creating a strong cybersecurity culture in your company won’t be a one-day job. On the contrary, it’s a never-ending process with a single primary goal. This goal—changing your employees’ mindset —is not an easy goal to reach. However, work diligently toward helping employees understand that small habits are of enormous importance. What’s more, all of those small habits will pay off in the long run.

The post How Much Do Your Employees Actually Know About Cybersecurity? appeared first on Business Opportunities.


via Business Opportunities Weblog
How Much Do Your Employees Actually Know About Cybersecurity?

Is This Worse Than ’68?


1968 Chicago Police Riots
1968 Chicago Police Riots

U.S.A.-(Ammoland.com)- Saturday, in Pittsburgh, a Sabbath celebration at the Tree of Life synagogue became the site of the largest mass murder of Jews in U.S. history. Eleven worshippers were killed by a racist gunman.

Friday, we learned the identity of the crazed criminal who mailed pipe bombs to a dozen leaders of the Democratic Party, including Barack Obama, Hillary Clinton and Joe Biden.

From restaurants to Capitol corridors, this campaign season we have seen ugly face-offs between leftist radicals and Republican senators.

Are we more divided than we have ever been? Are our politics more poisoned? Are we living in what Charles Dickens called “the worst of times” in America? Is today worse than 1968?

Certainly, the hatred and hostility, the bile and bitterness of our discourse, seem greater now than 50 years ago. But are the times really worse?

1968 began with one of the greatest humiliations in the history of the American Navy. The U.S. spy ship Pueblo was hijacked in international waters and its crew interned by North Korea.

A week later came the Tet Offensive, where every provincial capital in South Vietnam was attacked. A thousand U.S. troops died in February, 10,000 more through 1968.

Saigon Execution Eddie Adams 1968
Saigon Execution, Eddie Adams 1968

On March 14, anti-war Senator Gene McCarthy captured 42 percent of the vote in New Hampshire against President Johnson.

With LBJ wounded, Robert Kennedy leapt into the race, accusing the president who had enacted civil rights of “dividing the country” and removing himself from “the enduring and generous impulses that are the soul of this nation.” Lyndon Johnson, said Kennedy, is “calling upon the darker impulses of the American spirit.”

Today, RFK is remembered as a “uniter.”

With Gov. George Wallace tearing at Johnson from the right and Kennedy and McCarthy attacking from the left — and Nixon having cleared the Republican field with a landslide in New Hampshire — LBJ announced on March 31 he would not run again.

Four days later, Martin Luther King, leading a strike of garbage workers, was assassinated in Memphis. One hundred U.S. cities exploded in looting, arson and riots. The National Guard was called up everywhere and federal troops rushed to protect Washington, D.C., long corridors of which were gutted, not to be rebuilt for a generation.

Before April’s end, Columbia University had exploded in the worst student uprising of the decade. It was put down only after the NYPD was unleashed on the campus.

Nixon called the Columbia takeover by black and white radicals “the first major skirmish in a revolutionary struggle to seize the universities of this country and transform them into sanctuaries for radicals and vehicles for revolutionary political and social goals.” Which many have since become.

In June, Kennedy, after defeating McCarthy in the crucial primary of California, was mortally wounded in the kitchen of the hotel where he had declared victory. He was buried in Arlington beside JFK.

Nixon, who had swept every primary, was nominated on the first ballot in Miami Beach, and the Democratic Convention was set for late August.

Between the conventions, Soviet Premier Leonid Brezhnev sent his Warsaw Pact armies and hundreds of tanks into Czechoslovakia to crush the peaceful uprising known as “Prague Spring.”

With this bloodiest of military crackdowns since the Hungarian Revolution of 1956, Moscow sent a message to the West: There will be no going back in Europe. Once a Communist state, always a Communist state!

At the Democratic convention in Chicago, the thousands of radicals who had come to raise hell congregated nightly in Grant Park, across from the Hilton where the candidates and this writer were staying.

Baited day and night, the Chicago cops defending the hotel, by late in the week, had had enough. Early one evening, platoons of fresh police arrived and charged into the park clubbing and arresting scores of radicals as the TV cameras rolled. It would be called a “police riot.”

When Sen. Abe Ribicoff took the podium that night, he directed his glare at Mayor Richard J. Daley, accusing him of using “Gestapo tactics in the streets of Chicago.” Daley’s reply from the floor was unprintable.

Through September, Democratic candidate Hubert Humphrey could not speak at a rally without being cursed and shouted down.

Describing the radicals disrupting his every event, Humphrey said, these people “aren’t just hecklers,” but “highly disciplined, well-organized agitators. … Some are anarchists and some of these groups are dedicated to destroying the Democratic Party and destroying the country.”

After his slim victory, Nixon declared that his government would take as its theme the words on a girl’s placard that he had seen in the Ohio town of Deshler: “Bring us together.”

Nixon tried in his first months, but it was not to be.

According to Bryan Burrough, author of “Days of Rage, America’s Radical Underground, the FBI, and the Forgotten Age of Revolutionary Violence,” “During an eighteen month period in 1971 and 1972, the FBI reported more than 2,500 bombings on U.S. soil, nearly 5 a day.”

No, 2018 is not 1968, at least not yet.


About Patrick J. BuchananPat Buchanan

Patrick J. Buchanan is the author of the new book “The Greatest Comeback: How Richard Nixon Rose From Defeat to Create the New Majority.


via AmmoLand.com
Is This Worse Than ’68?