Experts question safety features of China's straddling bus

August 8, 2016

Beijing, Aug 8: China's "straddling bus", trumpeted as an innovative idea to deal with traffic jams, is facing increasing scrutiny with many questioning the vehicle's safety features and whether it would ever come into service, a media report said today.

straddlingbus1

The Transit Elevated Bus (TEB), grabbed worldwide attention last week after China's official published pictures of the vehicle during a test run on a 300-metre track in Qinhuangdao city in Hebei province.

The bus is designed to run on rails and rises two metres above the road, allowing cars to pass underneath to ease congestion.

While the state-run Xinhua suggested last week the project was an excuse to raise funds rather than create an innovative solution to traffic problem, the experts have also questioned the safety and practicality of the technology, Hong-Kong based South China Morning Post reported.

It would be difficult for the bus to negotiate turns and motorists driving under it would have their line of sight severely limited, increasing the chance of accidents on the road, said Sun Zhang, a transportation professor at Tongji University in Shanghai and an expert in urban track transport systems.

"It can only run on wide and straight roads. In big cities where roads are winding and jammed [with traffic], such roads are in shortly supply. The biggest advantage of this project is that its designers have rich imaginations," he said.

straddlingbus2

Several employees of the TEB at Qinhuangdao city draped the bus with black curtains to prevent bystanders looking at the vehicle as the project has kindled the interest of curious local residents, the report said.

Also the idea of a bus to ease road congestion is attractive in China where car ownership is rapidly increasing, along with the number of traffic jams.

China had 172 million cars on the road at the end of last year, with 280 million licensed drivers. Research by the car-hailing service Didi Chuxing, based on data gathered in 400 Chinese cities, said the average car speed was less than 25 kmph in the first half of this year, the report said.

The publicity has created a wave of interests specially among the investors. After a series of media reports in China have questioned the technological viability and the feasibility of the project, some investors worried about the scheme to come down to check out the site.

"The company and the project are beset by so many questions. We are all worried," Zhang Ying, an investor, said

He has invested about 500,000 yuan (USD 75085) into Huaying after its sales staff told him annual returns could be as high as 14 per cent, the report said.

Yao Xu, an official in charge of press inquiries at TEB Technology told 'Morning Post' that an "official test run" would be arranged in the coming weeks.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 7,2020

New Delhi, Mar 7: The Union government has issued a Global Invite for Expression of Interest for disinvestment in Bharat Petroleum Corporation Limited (BPCL) from prospective bidders with a minimum net worth of $10 billion as of Saturday.

The EoI submissions can be made till May 2, whereas investor queries will be entertained till April 4.

Another condition pertains to a maximum of four members are permitted in a consortium, and the lead member must hold 40 per cent in proportion. Other members of the consortium must have a minimum $1 billion net worth.

The EOI allows changes in the consortium within 45 days, though the lead member cannot be changed.

The GoI proposes to disinvest its entire shareholding in BPCL comprising 1,14,91,83,592 equity shares held through the Ministry of Petroleum and Natural Gas, which constitutes 52.98 per cent of BPCL's equity share capital, along with the transfer of management control to the strategic buyer (except BPCL's equity shareholding of 61.65 per cent in Numaligarh Refinery Limited (NRL) and management control thereon).

The shareholding of BPCL in NRL will be transferred to a Central Public Sector Enterprise operating in the oil and gas sector under the Ministry and accordingly is not a part of the proposed transaction.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 22,2020

Kochi, May 22: During the nationwide COVID-19 lockdown, Kerala recorded the highest number of cyber attacks followed by Punjab and Tamil Nadu, a study by anti-virus software firm K7 Computing said on Thursday.

In a statement issued in Chennai, the company said its K7 Computing's Cyber Threat Report, a comprehensive analysis of cyber attacks during the lockdown has found that Kerala recorded the highest number of cyber attacks during this period. The report analyses various cyber attacks within India during the pandemic and reveals that threat actors targeted the state with COVID-themed attacks aimed at exploiting user trust.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period - the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu with 184 attacks, the company said.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level.

These attacks aimed to compromise computers and mobile devices to gain access to users' confidential data, banking details, and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users' sensitive data. Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better. Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost 6 and 4 times the number of attacks as Bengaluru users.

According to the statement, a majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users. These attacks were aimed at heightening users' fears and creating a sense of urgency to take action.

K7 Labs noticed phishing attacks where scamsters posed as representatives of the United States Department of Treasury, the World Health Organization (WHO), and the Centres for Disease Control and Prevention (CDC), the company said.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus.

"Covid-19 has created an ideal situation for various threat actors to target individuals and enterprises alike. The panic caused by the stringent lockdown measures and rapid spread of this virus has left many people looking for more information on the situation," J. Kesavardhanan, Founder and CEO of K7 Computing was quoted as saying in the statement.

"Threat actors exploit this fear to their advantage and scam users into downloading malicious software and divulging sensitive information like banking codes. The need to be cyber cautious has never been greater. This is more so in the case of corporates who have adopted a work from home policy hurriedly without adequate cyber hygiene. We have seen an increase in attacks on enterprises and SME employees as well," he added.

Such attacks are expected to continue till normalcy returns. Social engineering attacks targeted at winning users' trust will gain momentum.

Healthcare institutions, well-known government offices, and international organisations will continue to be a prime target throughout the pandemic, the statement said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 4,2020

Twitter has joined efforts to do away with racially loaded terms such as master, slave and blacklist from its coding language in the wake of the death of African-American George Floyd and ensuing Black Lives Matter protests.

The project started even before the current movement for racial justice escalated following the death of 46-year-old George Floyd in police custody in May.

The use of terms such as "master" and "slave" in programming language originated decades ago. While "master" is used to refer to the primary version of a code, "slave" refers to the replicas. Similarly, the term "Blacklist" is used to refer to items which are meant to be automatically denied.

The efforts to change these terms in favour of more inclusive language at Twitter were initiated by Regynald Augustin and Kevin Oliver and the microblogging platform is now backing their efforts.

"Inclusive language plays a critical role in fostering an environment where everyone belongs. At Twitter, the language we have been using in our code does not reflect our values as a company or represent the people we serve. We want to change that. #WordsMatter," Twitter's engineering team said in a post on Thursday.

As per the recommendations from the team, the term "whitelist" could be replaced by "allowlist" and "blacklist" by "denylist".

Similarly, "master/slave" could be replaced by "leader/follower", "primary/replica" or "primary/standby".

Twitter, however, is not the first to start a project to bring inclusivity in programming language.

According to a report in CNET, the team behind the Drupal online publishing software started using "primary/replica" in place of "master/slave" as early as in 2014.

The use of the terms "master/slave" was also dropped by developers of the Python programming language in 2018.

Now similar efforts are underway at Microsoft's Github and LinkedIn divisions as well, said the report.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.