August 16, 2013This continues our report from 8/14/2013 about the creation of bronze bells.Before reassembling the flask, the artisans use a hollow metal tube to perforate the top of the negative bell impression and then, using a spoon, they carve a small concave circle around the top of the bell, as we see Rawaf doing in the picture to the left. This allows for a smoother pouring of the bronze into the mold.[photos and text by Soleri archive intern Julia Dorn-Giarmoleo]In the meantime, the furnace where the bronze is melted gets loaded up. Here is Andy putting unusable bells and other pieces of scrap bronze in the furnace to be melted down and re-used.The two sides of the flask are then reassembled, the wooden flask is taken off and the molds are lined up on the ground. A metal or plastic frame is then put around the sand mold, as Jonas is pictured doing in this photo. Ingots are then placed on the molds to prevent any possible movement.Two artisans, (pictured here are Andy and Jonas) don protective clothing, and lift the crucible containing the molten bronze out of the furnace.They carefully pour the bronze into each of the molds. The other artisans follow the pouring with shovels, so that should any bronze fall onto the cement or out of the mold, they can quickly throw sand on it to prevent any danger or injury.The molds are then left to cool for about an hour, or until the bronze is solidified. This report will continue on Monday.
Reps. Marino, Yaroch: Bucci should resign or be removed from officeState Reps. Steve Marino and Jeff Yaroch today sent Gov. Rick Snyder letters calling on him to exercise his authority to remove a Macomb Township trustee from office.Rep. Marino said Trustee Dino Bucci has exhibited corrupt conduct in office and gross neglect of duty, both of which the governor can use as grounds for his removal under the Michigan Constitution.“Dino Bucci’s actions while serving as both a township trustee and public servant in the Macomb County Department of Public Works are disgraceful and unacceptable,” Marino said. “Even more shameful is the fact that he continues to receive cadillac health benefits, collect a salary, and hold his title while skipping meetings and avoiding all other official responsibilities.”Rep. Yaroch said: “Public Works Commissioner Candice Miller has relieved Mr. Bucci of his duties at the Macomb County Works office, which is rebuilding the trust of Macomb County in that department. It is time for Gov. Snyder to do the same to rebuild the trust of our citizens in their government.”Bucci was indicted by a federal grand jury in November 2017 on eighteen counts of conspiracy, bribery, embezzlement, extortion, mail fraud and money laundering. The charges are in connection with public contracts in Macomb Township and the Macomb County Department of Public Works, where he worked until 2017.“Trustee Bucci has clearly lost the trust and confidence of both his colleagues and the public,” Marino said. “If he won’t resign, it’s time for Gov. Snyder to exercise the authority granted to him by the state constitution and allow our community to begin the healing process.”The legislators, who each represent a portion of Macomb Township in the Michigan House, also sent letters to the Attorney General’s Office requesting a formal opinion clarifying the governor’s authority to remove Bucci from office.### 18Apr State representatives call on governor to remove Macomb Township trustee Categories: Yaroch News
Deutsche Telekom has chosen semiconductor manufacturer Celeno to help it deliver IPTV wirelessly around the home.The telco has selected Celeno’s CL1820 Wi-Fi chip and OptimizAIR technology to power its Speedport W 102 Bridge.The Speedport W 102 Bridge will enable Deutsche Telekom to distribute its Entertain IPTV service wirelessly throughout the home to consumers in Germany.The Speedport W 102 Bridge enables consumers to self install their media receiver DVR. The unit also provides consumers with the ability to place their set-tops and TVs anywhere in the home and watch time-shifted content recorded on a master DVR from any receiver in their home. Subscribers using the Speedport W 102 Bridge can expand their network to up to four video adapters in their home.“Celeno’s optimized Wi-Fi technology far exceeds that of conventional Wi-Fi, which is merely designed for internet surfing,” said Ulrich Grote, vice-president terminal management fixed line, Deutsche Telekom. “Celeno’s solution not only allows for flawless HD video streaming, it also enables multi-room DVR with the high quality of experience our consumers demand.”
On a global basis the average internet connection speed increased by 17% year-on-year in the second quarter, according to Akamai’s latest State of the Internet report.Content delivery network (CDN) provider Akamai said that the average global connection speed was 5.1Mbps in Q2, up 3.5% quarter-over-quarter, while the average speeds among the top 10 countries and regions all remained “well above 10 Mbps.”Global peak connection speeds increased to 32.5 Mbps on average, and increased in every top 10 country/region except Sweden, which remained unchanged from the first quarter at 62.8 Mbps, according to the study.Eight of the top 10 saw average peak speeds greater than 70 Mbps, while Singapore was the only country that saw a double-digit quarterly gain – a 12% increase to 108.3 Mbps.Other countries that ranked among the top 10 were Romania with speeds of 72.1 Mbps and Macao with an average of 62.6 Mbps.“We continued to see healthy increases in key connection speed metrics, particularly on a year-over-year basis. The improvement in connection speeds is vital as more content, not the least of which is video at increasingly higher levels of quality, is being delivered over the internet,” said David Belson, editor of the Akami report.Globally, 110 out of 144 qualifying countries/regions saw average connection speeds increase from the previous quarter, with growth rates ranging from a modest 0.4% in Senegal (1.5 Mbps) to a substantial 67% inTunisia (2.8 Mbps), according to the report.The study is based on data gathered from the Akamai Intelligent Platform.
Virgin Media will start to contact customers about upgrading to ultrafast broadband this week, and announced that Vivid will be the new brand for web connections above 100Mbps.Virgin said it will start to explain how users can opt-in to an upgrade from October 1, 2015 and will let broadband customers go from existing speeds of up to 50Mbps, 100Mbps and 152Mbps to more powerful speeds of 70Mbps, Vivid 150Mbps and Vivid 200Mbps.Using DOCSIS 3.0 technology, Virgin claims that it will deploy the superior speeds in “record time” with 90% of customers being able to upgrade by the end of 2015.“Our message is simple: if you want to be certain that you are signing up to true ultrafast broadband speeds of 100Mbps and above, Vivid from Virgin Media is the new standard,” said Virgin Media’s managing director of consumer, Gregor McNeil.Earlier this month, Virgin committed £25 million (€34 million) to upgrade homes and businesses in Nottingham, enabling them to receive ultra-fast broadband services. In June it also began rolling out ultrafast broadband in Manchester in the first phase of its £3 billion broadband investment plan, dubbed Project Lightning.The news comes a day after Sky announced it was connecting its first customer to its new ultrafast fibre-to-the-home (FTTH) broadband network in York in the UK.The rival UK operator said its ultrafast broadband customers will be able to receive broadband speeds of up to 940 Mbps, with Sky building the FTTH network in partnership with TalkTalk and CityFibre.
Steve Sharman, director, Hackthorn Innovation, looks at what media organisations need to do to protect themselves against cyber-security threats.Cyber-security is the hot topic on everyone’s minds right now – hardly surprising, given the recent high-profile hacks targeted against Sony Pictures and others – not to mention the persistent stories about government actors trying to adversely affect the outcomes of elections and referenda. In the wonderful broadcast industry of ours, we are naturally dealing with some highly sought after content on a daily basis and the risk factor suddenly gets much higher. So, what does it actually take to make sure you are secure? This was one of the topics at the recent Workflow Innovation Group (WIG) event in Cardiff and the discussions were pretty enlightening.Technology – It’s a Team EffortTechnology will always play a key part here and there are loads of solutions all claiming to make your content more secure than in the proverbial Fort Knox. However, one thing that seemed to resonate from the discussions was that no one solution fits the bill all by itself. Yes, getting a secure solution for encryption in place is extremely important and that will mean important protection for your archive. However, you still need to put the right technology in place for when that content is travelling to or from your storage, especially if that “to or from” is outside the organisation.Watermarking plays a big part here. If you are sending files to people outside of the organisation, watermarking on an individual basis means that at least if there is a leak, you know exactly where it came from.Within your facility, physically controlling the external IP addresses allowed to connect to the firewall is an obvious way to reduce potential attacks. Having a second firewall in place (ideally a different make and model!) also makes a lot of sense, further protecting the “front door” of the organisation, and obscuring the details of internal networks and software that could be useful to an attacker.Once behind the firewalls, a lot of the broadcasters present at the WIG event use closed (non-corporate connected) networks with workstations requiring individual user logins and using physically disabled USB ports. Considering what physical measures should be put into place to protect sensitive areas such as editing suites is of equal importance. Is there a window? If there is, can someone look in and see something not yet in the public domain? Does the door remain locked when staff are working within? The security consequences of it not being locked are of course pretty obvious, but especially in the current climate, there are health and safety and employee safeguarding issues that also need to be taken into account. As always, nothing is as simple as it seems!Another major technology that looks set to make workflows more secure is encryption at rest. Of course, keeping content encrypted at every stage whilst making it simple and efficient to access and review, is pretty challenging, especially when operating at scale. At the event, we discussed new technology that keeps that content encrypted whilst making it possible for current applications to access it in its encrypted state – that could be a game changer.However, whilst all of these technologies and tools are innovative and obviously make a big impact on keeping content secure, broadcasters need all of this, and more, to ensure the best security possible and minimise the risk of attack. As a media company you have to block every attack successfully – the cracker community only needs to be successful once.Ultimately, it’s about the PeopleWhilst that is all true, it is also true that you can have all the technology in the world, but if you don’t have appropriate organisation culture, with the right people with the correct training, all of that falls apart. Literally every discussion in the room came back to people and trust. Partly, that is about instilling the right company culture where people can, for example, recognise potential phishing emails and know to question and report, rather than clicking the link. It is also about ensuring the people know the consequences for the company and their own careers should they decide to take that un-released episode of Game of Thrones home and watch it a couple of days early with their mates. The broadcasters in the room were pretty unified in their view that common sense and loyalty were both important attributes of the people in their teams.At the same time of course, there should only be a limited number of people who have access to the really sensitive and high-profile content, in this case personal attitude, maturity of approach and company procedures all need to be appropriate for the situation.Are you feeling secure?The overriding themes that came out from the WIG event and discussions with broadcasters present were that being secure is not about just one thing. It is about technology, applied properly at every stage of workflows, and it is about people, and it is about having the right processes in place. Without all of those things being in place in a co-ordinated way, there will always be weak links open to exploitation. At the same time, even with all those in place, there is no room for complacency – you should continually be testing your business and looking for your own weaknesses.