66% of women's work unpaid in India: WEF

Agencies
November 3, 2017

Geneva/New Delhi, Nov 3: The proportion of "unpaid work" per day is far higher for women than men globally, while in case of India on average 66 percent of women's work is unpaid, says a World Economic Forum report.

Unpaid work measures the average minutes spent per day on routine housework, shopping, care for household members, care for non-household members volunteering, travel related to household activities and other unpaid activities for men and women aged 1564 years.

According to the WEF Global Gender Gap Report 2017, on an average 66 percent of women's work in India is unpaid, compared to 12 percent of men's.

In case of China, 44 percent of women's work is unpaid, while for men the figure stood at 19 percent.

Even for developed countries, like the United Kingdom, which was ranked 15th on the Global Gender Gap list, 56.7 percent of women's work is unpaid, as against 32 percent men's.

In the USA also, 50 percent of women's work is unpaid while in case of men the figure stands at 31.5 percent.

An analysis of Global Gender Gap Index over the past years points to a continued under-use of the ever-increasing numbers of educated women than ever before, the report said.

"While much of this imbalance is explained by the discrepancy in caregiving and unpaid work, institutional and policy inertia, outdated organisational structures and discrimination, one additional explanatory factor is the skills differentials in the types of degrees women and men seek out in their education," it added.

As per the report, the global average annual earnings for a female stood at USD 12,000, while for a male it was as high as USD 21,000.

India has slipped 21 places on the World Economic Forum's Global Gender Gap index to a lowly 108.

Globally also for the first time since the WEF began measuring the gap across four pillars -- health, education, the workplace and political representation -- the global gap has actually widened.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 2,2020

Leiden, Jul 2: Astronomers have discovered a luminous galaxy caught in the act of reionizing its surrounding gas only 800 million years after the Big Bang.

The research, led by Romain Meyer, PhD student at UCL in London, UK, has been presented at the virtual annual meeting of the European Astronomical Society (EAS).

Studying the first galaxies that formed 13 billion years ago is essential to understanding our cosmic origins. One of the current hot topics in extragalactic astronomy is 'cosmic reionization,' the process in which the intergalactic gas was ionized (atoms stripped of their electrons).

Cosmic reionization is similar to an unsolved murder: We have clear evidence for it, but who did it, how and when? We now have strong evidence that hydrogen reionization was completed about 13 billion years ago, in the first billion years of the universe, with bubbles of ionized gas slowly growing and overlapping.

The objects capable of creating such ionized hydrogen bubbles have however remained mysterious until now: the discovery of a luminous galaxy in which 60-100 percent of ionizing photons escape, is likely responsible for ionizing its local bubble. This suggests the case is closer to being solved.

The two main suspects for cosmic reionization are usually 1) a population of numerous faint galaxies leaking ~10 percent of their energetic photons, and 2) an 'oligarchy' of luminous galaxies with a much larger percentage (>50 percent) of photons escaping each galaxy.

In either case, these first galaxies were very different from those today: galaxies in the local universe are very inefficient leakers, with only <2-3 percent of ionizing photons escaping their host. To understand which galaxies governed cosmic reionization, astronomers must measure the so-called escape fractions of galaxies in the reionization era.

The detection of light from excited hydrogen atoms (the so-called Lyman-alpha line) can be used to infer the fraction of escaping photons. On the one hand, such detections are rare because reionization-era galaxies are surrounded by neutral gas which absorbs that signature hydrogen emission.

On the other hand, if this hydrogen signal is detected it represents a 'smoking gun' for a large ionized bubble, meaning we have caught a galaxy reionizing its surroundings. The size of the bubble and the galaxy's luminosity determines whether it is solely responsible for creating this ionized bubble or if unseen accomplices are necessary.

The discovery of a luminous galaxy 800 million years after the Big Bang supports the scenario where an 'oligarchy' of bright leakers emits most of the ionizing photons.

"It is the first time we can point to an object responsible for creating an ionized bubble, without the need for a contribution from unseen galaxies.

Additional observations with the upcoming James Webb Space Telescope will enable us to study further what is likely one of the best suspects for the unsolved case of cosmic reionization," said Meyer.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
February 5,2020

San Francisco, Feb 5: After a German artist, Simon Weckert, demonstrated how he "hacked" Google Maps with 99 smartphones and a wagon to create "virtual traffic jams" on the streets of Berlin, Google responded to the incident saying it "appreciates" creative use of maps.

Admitting that it has not quite cracked travelling by wagon, the tech giant also hinted that it might use cases like this to improve how its maps work.

"We appreciate seeing creative uses of Google Maps like this as it helps us make maps work better over time," 9to5Google quoted a Google spokesperson as saying.

In a YouTube video, Weckert showed that he put 99 smartphones with Google Maps onto a small wagon cart and then wheeled that cart around various streets in Berlin, including outside the Google office, Android Authority reported on Monday.

The smartphones "apparently fooled Google Maps" into thinking that there was a high concentration of users on those streets.

Because the second-hand phones were in a cart, Maps was further tricked into believing that the traffic was slow-moving.

As a result, the navigation app started showing virtual traffic jams by turning green streets to red in the online navigational tool, showcasing how digital technology can have a real impact on the real world.

"Traffic data in Google Maps is refreshed continuously thanks to information from a variety of sources, including aggregated anonymised data from people who have location services turned on and contributions from the Google Maps community," the Google spokesperson said.

"We've launched the ability to distinguish between cars and motorcycles in several countries including India, Indonesia and Egypt, though we haven't quite cracked travelling by wagon," the statement added. After a German artist, Simon Weckert, demonstrated how he "hacked" Google Maps with 99 smartphones and a wagon to create "virtual traffic jams" on the streets of Berlin, Google responded to the incident saying it "appreciates" creative use of maps.

Admitting that it has not quite cracked travelling by wagon, the tech giant also hinted that it might use cases like this to improve how its maps work.

"We appreciate seeing creative uses of Google Maps like this as it helps us make maps work better over time," 9to5Google quoted a Google spokesperson as saying.

In a YouTube video, Weckert showed that he put 99 smartphones with Google Maps onto a small wagon cart and then wheeled that cart around various streets in Berlin, including outside the Google office, Android Authority reported on Monday.

The smartphones "apparently fooled Google Maps" into thinking that there was a high concentration of users on those streets.

Because the second-hand phones were in a cart, Maps was further tricked into believing that the traffic was slow-moving.

As a result, the navigation app started showing virtual traffic jams by turning green streets to red in the online navigational tool, showcasing how digital technology can have a real impact on the real world.

"Traffic data in Google Maps is refreshed continuously thanks to information from a variety of sources, including aggregated anonymised data from people who have location services turned on and contributions from the Google Maps community," the Google spokesperson said.

"We've launched the ability to distinguish between cars and motorcycles in several countries including India, Indonesia and Egypt, though we haven't quite cracked travelling by wagon," the statement added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 19,2020

Cybersecurity researchers on Monday warned of a Trojan malware campaign which is targeting India's co-operative banks using COVID-19 as a bait.

Seqrite, the enterprise arm of IT security firm Quick Heal Technologies, detected the new wave of Adwind Java Remote Access Trojan (RAT) campaign.

Researchers at Seqrite warned that if attackers are successful, they can take over the victim's device to steal sensitive data like SWIFT logins and customer details and move laterally to launch large scale cyberattacks and financial frauds.

According to the researchers, the Java RAT campaign starts with a spear-phishing email which claims to have originated from either the Reserve Bank of India or a nationalised bank.

The content of the email refers to COVID-19 guidelines or a financial transaction, with detailed information in an attachment, which is a zip file containing a JAR based malware.

Upon further investigation, researchers at Seqrite found that the JAR based malware is a Remote Access Trojan that can run on any machine which has Java runtime enabled and hence it can impact a variety of endpoints, irrespective of their base operating system.

Once the RAT is installed, the attacker can take over the victim's device, send commands from a remote machine, and spread laterally in the network.

In addition, this malware can also log keystrokes, capture screenshots, download additional payloads, and extract sensitive user information, Seqrite said, adding that such attack campaigns can effectively jeopardise the privacy and security of sensitive data at the co-operative banks and result in large scale attacks and financial frauds.

To prevent such attacks, users need to exercise ample caution and avoid opening attachments and clicking on web links in unsolicited emails.

Banks should also keep their operating systems updated and have a full-fledged security solution installed on all the devices, Seqrite advised.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.