"Ring of fire" eclipse treat for southern skygazers

February 25, 2017

Feb, 25: A spectacular “ring of fire” solar eclipse Sunday will regale skygazers in South America and southern Africa, with seafarers in the nearby Atlantic getting a front-row view too, astronomers say.

RingofFireEclipse

The eclipse — during which the Sun will all but disappear as the Moon crosses its path — will be most visible in a 100-kilometre (62-mile) band cutting through Chile, Argentina, Angola, Zambia and the Democratic Republic of Congo.

A so-called annular solar eclipse occurs when the Earth, Moon and Sun line up. But even when perfectly aligned, the Moon is too far from Earth to completely block out the Sun, creating instead the impression of a fiery ring.

At first, it will look as if a “bite” has been taken out of the Sun, said Terry Moseley of the Irish Astronomical Association, stressing that viewers should not observe the eclipse unfold with the naked eye.
“This "bite" gradually gets bigger and bigger as the Moon — which is itself invisible — moves further and further in front of the Sun,” he told.

“As about 90 percent of the Sun is covered, you"ll notice a distinct drop in temperature and brightness, and a change in the quality of the light which is hard to describe.”

As the day darkens, birds and animals may enter a night-time routine, thinking sunset is nigh.

At the height of the eclipse the Moon will be right in the middle of the Sun, leaving “a perfect, beautiful, symmetrical ring” of light around the edge before exiting on the other side, said Moseley.

For people just outside the band of optimal viewing, the phenomenon will appear as a ring thicker on one side than the other, said Moseley — “not symmetrical, but still an amazing sight.”

Anyone further afield will see little or nothing.

It will take about two hours for the Moon to move across the face of the Sun, but the “ring of fire” peak will last a mere minute.

Starting in the southeast Pacific Ocean at sunrise, the eclipse will hit solid land at 1221 GMT in southern Chile, near the town of Coyhaique, then cut through Argentina — near Camarones Bay on the eastern coast — before hitting the South Atlantic.

At sea, the eclipse peak will last 44 seconds and “only be visible to any ships that happen to be in the right place at the right time,” said Moseley.

It will reach Angola south of the town of Benguela around 1515 GMT, then move to Zambia and DR Congo just before the Sun sets and the light show ends.

According to the Astronomical Society of Southern Africa (ASSA), the eclipse can be safely observed using a basic pinhole projector.

Punch a tiny hole in a piece of paper with a sharp pencil, hold it into the Sun, and project the image onto a second sheet.

The gaps between tree leaves make for a similar effect on the ground, says the ASSA website, calling this “the coolest and safest way to watch a solar eclipse”.

To look at the Sun directly, one would need special glasses.

Weather is the only potential spoiler.

NASA"s eclipse website recommends watching the weather forecast a day or two before the eclipse, and picking somewhere with a cloud-free prediction.

“Good weather is the key to successful eclipse viewing — better to see a shorter eclipse from clear sky that a longer eclipse under clouds,” it says.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 10,2020

In the wake of the gas leak at a factory in Visakhapatnam, the National Disaster Management Authority (NDMA) has issued detailed guidelines for restarting industries after the lockdown and the precautions to be taken for the safety of the plants as well as the workers.

In a communication to all states and union territories, the NDMA said due to several weeks of lockdown and the closure of industrial units, it is possible that some of the operators might not have followed the established standard operating procedures.

As a result, some of the manufacturing facilities, pipelines, valves may have residual chemicals, which may pose risk. The same is true for the storage facilities with hazardous chemicals and flammable materials, it said.

The NDMA guidelines said while restarting a unit, the first week should be considered as the trial or test run period after ensuring all safety protocols.

Companies should not try to achieve high production targets. There should be 24-hour sanitisation of the factory premises, it said.

The factories need to maintain a sanitisation routine every two-three hours especially in the common areas that include lunch rooms and common tables which will have to be wiped clean with disinfectants after every single use, it added.

For accommodation, the NDMA said, sanitisation needs to be performed regularly to ensure worker safety and reduce the spread of contamination.

To minimise the risk, it is important that employees who work on specific equipment are sensitised and made aware of the need to identify abnormalities like strange sounds or smell, exposed wires, vibrations, leaks, smoke, abnormal wobbling, irregular grinding or other potentially hazardous signs which indicate the need for immediate maintenance or if required shutdown, it said.

At least 11 people lost their lives and about 1,000 others were exposed to a gas leak at a factory in Andhra Pradesh''s Visakhapatnam on May 7.

The incident took place after it restarted operations when the government allowed industrial activities in certain sectors following several weeks of lockdown.

The lockdown was first announced by Prime Minister Narendra Modi on March 24 for 21 days in a bid to combat the coronavirus threat. The lockdown was then extended till May 3 and again till May 17.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
March 18,2020

San Francisco, Mar 18: Facebook said a bug in its anti-spam system temporarily blocked the publication of links to news stories about the coronavirus. Guy Rosen, Facebook's vice president of integrity, said on Twitter Tuesday that the company was working on a fix for the problem.

Users complained that links to news stories about school closings and other information related to the virus outbreak were blocked by the company's automated system.

Later on Tuesday, Rosen tweeted that Facebook had restored all the incorrectly deleted posts, which also covered topics beyond the coronavirus.

Rosen said the problems were unrelated to any changes in Facebook's content-moderator workforce. The company reportedly sent its human moderators home this week because of the coronavirus outbreak.

A representative for Facebook did not immediately respond to questions on the status of Facebook's content moderators, many of whom do not work directly for the company and are not always able to work from home.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 10,2020

Indian enterprises were flooded with a whopping 14.6 crore malware threats in 2019 - a growth of 48 per cent (year-on-year) compared to 2018, a new report said on Friday.

Manufacturing, BFSI (banking, financial services and insurance), education, healthcare, IT/ITES, and the government were the most at-risk industries in the country, said the report from Seqrite, the enterprise arm of Pune-based IT security firm Quick Heal Technologies.

Interestingly, almost a quarter (23 per cent) of the threats were identified through 'Signatureless behaviour-based' detection by Seqrite, indicating how a growing number of cybercriminals were deploying new or previously unknown threat vectors to compromise enterprise security.

"With the latest Seqrite annual threat report, we want to empower CIOs, CISOs, business leaders and all key public stakeholders with the insights they need to combat the growing complexity of the threat landscape," said Sanjay Katkar, Joint Managing Director and CTO, Quick Heal Technologies.

The most prominent trend was the drastic increase in the volume, intensity, and sophistication of cyber-attack campaigns targeting Indian enterprises in 2019.

The rapid integration of IoT devices, BYOD (bring your own device), and third-party APIs into enterprise networks has created newer security vulnerabilities that might go unnoticed until a major breach occurs.

Threat researchers at Seqrite observed several large-scale advanced persistent threats (APT) attacks deployed against organisations in the government sector.

"The entry of nation-states and organised cybercrime cells into the fray is expected to add more complication to this situation and will require Indian government bodies and corporate enterprises to shore up their cyber defence strategies in 2020 and beyond," the report noted.

More alarming, however, was the continued lack of security awareness amongst enterprises and government organisations.

"Unsecured Remote Desktop Protocol (RDP) and Server Message Block (SMB) protocols continued to be targeted through brute-force attacks," said the report.

Spear phishing attack campaigns leveraging Office exploits and infected macros were also used extensively by cybercriminals to gain access to enterprise networks and steal critical data.

"India's digital journey depends on ensuring robust cybersecurity for all stakeholders within the enterprise ecosystem," said Katkar.

The sharp spike should be a cause of concern for CIOs and CISOs in the country, especially given the growing digital penetration within their enterprise networks.

"With network vulnerabilities and potential entry points increasing at a rapid pace, threat actors are expected to leverage artificial intelligence (AI) capabilities to power their malware campaigns in the future to capitalise on newer attack vectors," the report added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.