Astronomers find elusive target hiding behind dust

Agencies
June 8, 2020

Washington DC, Jun 8: Astronomers acting on a hunch have likely resolved a mystery about young, still-forming stars and regions rich in organic molecules closely surrounding some of them.

They used the National Science Foundation's Karl G Jansky Very Large Array (VLA) to reveal one such region that previously had eluded detection and that revelation answered a longstanding question.

The regions around the young protostars contain complex organic molecules which can further combine into prebiotic molecules that are the first steps on the road to life.

The regions, dubbed "hot corinos" by astronomers, are typically about the size of our solar system and are much warmer than their surroundings, though still quite cold by terrestrial standards.

The first hot corino was discovered in 2003 and only about a dozen have been found so far. Most of these are in binary systems, with two protostars forming simultaneously.

Astronomers have been puzzled by the fact that, in some of these binary systems, they found evidence for a hot corino around one of the protostars but not the other.

"Since the two stars are forming from the same molecular cloud and at the same time, it seemed strange that one would be surrounded by a dense region of complex organic molecules and the other wouldn't," said Cecilia Ceccarelli, of the Institute for Planetary Sciences and Astrophysics at the University of Grenoble (IPAG) in France.

The complex organic molecules were found by detecting specific radio frequencies, called spectral lines, emitted by the molecules. Those characteristic radio frequencies serve as "fingerprints" to identify the chemicals.

The astronomers noted that all the chemicals found in hot corinos had been found by detecting these "fingerprints" at radio frequencies corresponding to wavelengths of only a few millimetres.

"We know that dust blocks those wavelengths, so we decided to look for evidence of these chemicals at longer wavelengths that can easily pass through dust," said Claire Chandler of the National Radio Astronomy Observatory, and principal investigator on the project.

"It struck us that dust might be what was preventing us from detecting the molecules in one of the twin protostars," added Chandler.

The astronomers used the VLA to observe a pair of protostars called IRAS 4A, in a star-forming region about 1,000 light-years from Earth. They observed the pair at wavelengths of centimetres.

At those wavelengths, they sought radio emissions from methanol, CH3OH (wood alcohol, not for drinking). This was a pair in which one protostar clearly had a hot corino and the other did not, as seen using the much shorter wavelengths.

The result confirmed their hunch. "With the VLA, both protostars showed strong evidence of methanol surrounding them. This means that both protostars have hot corinos. The reason we did not see the one at shorter wavelengths was because of dust," said Marta de Simone, a graduate student at IPAG who led the data analysis for this object.

The astronomers cautioned that while both hot corinos now are known to contain methanol, there still may be some chemical differences between them. That, they said, can be settled by looking for other molecules at wavelengths not obscured by dust.

"This result tells us that using centimetre radio wavelengths is necessary to properly study hot corinos," Claudio Codella of Arcetri Astrophysical Observatory in Florence, Italy, said.

"In the future, planned new telescopes such as the next-generation VLA and SKA, will be very important to understanding these objects," added Codella.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 3,2020

Giving each and every app access to personal information stored on Android smartphones such as your contacts, call history, SMS and photos may put you in trouble as bad actors can easily use these access to spy on you, send spam messages and make calls anywhere at your expense or even sign you up for a premium "service", researchers from cybersecurity firm Kaspersky have warned.

But one can restrict access to such information as Android lets you configure app permissions. 

Giving an app any of these permissions generally means that from now on it can obtain information of this type and upload it to the Cloud without asking your explicit consent for whatever it intends to do with your data.

Therefore, security researchers recommend one should think twice before granting permissions to apps, especially if they are not needed for the app to work. 

For example, most games have no need to access your contacts or camera, messengers do not really need to know your location, and some trendy filter for the camera can probably survive without your call history, Kaspersky said. 

While decision to give permission is yours, the fewer access you hand out, the more intact your data will be.

Here's what you should know to protect your data.

SMS: An app with permission to send and receive SMS, MMS, and WAP (Wireless Application Protocol) push messages, as well as view messages in the smartphone memory will be able to read all of your SMS correspondence, including messages with one-time codes for online banking and confirming transactions.

Using this permission, the app can also send spam messages in your name (and at your expense) to all your friends. Or sign you up for a premium "service." You can see and conrol which apps have these rights by going to the settings of your phone.

Calendar: With permission to view, delete, modify, and add events in the calendar, prying eyes can find out what you have done and what you are doing today and in the future. Spyware loves this permission.

Camera: Permission to access the camera is necessary for the app to take photos and record video. But apps with this permission can take a photo or record a video at any moment and without warning. Attackers armed with embarrassing images and other dirt on you can make life a misery, according to Kaspersky.

Contacts: With permission to read, change, and add contacts in your address book, and access the list of accounts registered in the smartphone, an app can send your entire address book to its server. Even legitimate services have been found to abuse this permission, never mind scammers and spammers, for whom it is a windfall.

This permission also grants access to the list of app accounts on the device, including Google, Facebook, and many other services.

Phone: Giving access to your phone means permission to view and modify call history, obtain your phone number, cellular network data, and the status of outgoing calls, add voicemail, access IP telephony services, view numbers being called with the ability to end the call or redirect it to another number and call any number.

This permission basically lets the app do anything it likes with voice communication. It can find out who you called and when or prevent you from making calls (to a particular number or in general) by constantly terminating calls. 

It can eavesdrop on your conversations or, of course, make calls anywhere at your expense, including to pay-through-the-nose numbers, Kaspersky warned.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 4,2020

Twitter has joined efforts to do away with racially loaded terms such as master, slave and blacklist from its coding language in the wake of the death of African-American George Floyd and ensuing Black Lives Matter protests.

The project started even before the current movement for racial justice escalated following the death of 46-year-old George Floyd in police custody in May.

The use of terms such as "master" and "slave" in programming language originated decades ago. While "master" is used to refer to the primary version of a code, "slave" refers to the replicas. Similarly, the term "Blacklist" is used to refer to items which are meant to be automatically denied.

The efforts to change these terms in favour of more inclusive language at Twitter were initiated by Regynald Augustin and Kevin Oliver and the microblogging platform is now backing their efforts.

"Inclusive language plays a critical role in fostering an environment where everyone belongs. At Twitter, the language we have been using in our code does not reflect our values as a company or represent the people we serve. We want to change that. #WordsMatter," Twitter's engineering team said in a post on Thursday.

As per the recommendations from the team, the term "whitelist" could be replaced by "allowlist" and "blacklist" by "denylist".

Similarly, "master/slave" could be replaced by "leader/follower", "primary/replica" or "primary/standby".

Twitter, however, is not the first to start a project to bring inclusivity in programming language.

According to a report in CNET, the team behind the Drupal online publishing software started using "primary/replica" in place of "master/slave" as early as in 2014.

The use of the terms "master/slave" was also dropped by developers of the Python programming language in 2018.

Now similar efforts are underway at Microsoft's Github and LinkedIn divisions as well, said the report.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 25,2020

New Delhi, Jan 25: The Patiala House court on Saturday started hearing a plea filed by the Nirbhaya convicts that alleged that the Tihar Jail administration have "not presented the papers on time".

The Public Prosecutor informed the court that Tihar Jail authorities have already supplied the relevant documents. He further informed that these are mere delaying tactics adopted by the convicts.

Advocate A.P. Singh, lawyer for three of the four death row convicts in the Nirbhaya gang-rape case had moved an application before the court seeking directions to the Tihar Jail authorities to supply him the relevant documents in order to exercise the remaining legal remedies available with the death row convicts -- Vinay Pawan and Akshay.

The Public Prosecutor also told the court that he spoke to the jail authorities over the phone and a report in this regard will be filed shortly as the jail officials were on their way to the court.

The judge demanded from the convicts lawyer to show what he has filed.

The convicts lawyer, A.P. Singh, said that he received some documents, but has still not been supplied with the personal diary of one of the convict -- Vinay Kumar Sharma and also the medical documents.

Judge then asked the lawyer to wait for until the report arrives form the Tihar Jail.

On this, the convicts lawyer said he was not questioning the intention of the jail. "I know the jail has been changed. It isn't there fault, too," he said.

The Public Prosecutor refuted the allegation saying that the defence counsel was trying to defeat the speed of law.

"We have supplied all the documents to the counsel. We have supplied all the documents except the painting and some other documents. We have nothing apart from that," public prosecutor said.

Singh, in his plea filed before the Patiala House Court sought urgent orders of the court in order to file a mercy petition of Vinay Sharma and in relation to requests for documents for convicts Vinay Sharma, Pawan Kumar Gupta and Akshay Kumar Singh.

He further said that the convicts undertook several steps to obtain relevant information necessary for filing the mercy petitions. In regular interval, the convicts requested the concerned authority to supply documents pertaining to their medical records from 2012 to 2015 and 2019-2020, records of cellular confinement, records of the amount earned in prison through labour, records of educational and reformative activities like Tihar Olympics and Painting, etc.

The Supreme court had recently dismissed the curative petition for the other two convicts -- Vinay Kumar Sharma (26) and Mukesh Singh (32).

The court had recently issued death warrant against the convicts and fixed 6 a.m. on February 1 as the date and time of execution of the death penalty.

The 23-year-old victim in the case was brutally gang raped and tortured on December 16, 2012, which later led to her death. All the six accused were arrested and charged with sexual assault and murder. One of the accused was a minor and appeared before a juvenile justice court, while another accused committed suicide in Tihar Jail.

Four of the convicts were sentenced to death by a trial court in September 2013, and the verdict was confirmed by the Delhi High Court in March 2014 and subsequently upheld by the Supreme Court in May 2017, which also dismissed their review petitions.

A Juvenile involved in the crime was convicted by a juvenile justice board and released from a reformation home after serving a three-year term.

Hearing in a different case, Chief Justice of India S.A. Bobde on Thursday said a condemned person cannot fight the death penalty endlessly and it was important for the capital punishment to reach its finality.

The death penalty, he noted, cannot be questioned at every turn by the convict.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.