Patching After Hours with vPro – Altiris Console

first_imgIn my last blog I mentioned a group of us got together to showcase the technology in the Intel Labs. This video Frank, which will be at ManageFusion & myself showcased the Patching use case of how you can wake a system up, patch & then return to powered off state. The value is in the effectiveness of powering the machine, patching and then shutting it down as quickly as it started. The same note here, if you are interested in how we specifically wrote the job please let us know and we can add that detail out here as well. I also have a detailed screen by screen view if of interest.last_img

New Self-Administered Activation Program!

first_imgIf you are a Managed Service Provider and you want to realize the full potential of Intel vPro technology in one or more of your current customer accounts, check out the Self-Administered SMB Intel vPro Technology Activation Program.last_img

Making sense of hypes “du Jour” – Virtualization, Grid and Cloud Computing – Part 3 of 3

first_imgOne of the key aspects of the synergy of these paradigms that I have not touched on is “Private” or “On Premise” cloud where the IT environment can be implemented as a cloud but within the confines of the enterprise “firewall” – currently there is a lot of discussion in the media on this topic. This is the next frontier of cloud that will get the CIO jazzed. Grids and virtualization will play a very important role in the implementation of these “private clouds”. The primary difference between IT today and the “Private Cloud” paradigm is that the “cloud” paradigm requires a layer (a virtualization if you will) between the user and the “traditional” resources that users have direct access to in today’s IT. Separating the concerns in this manner (i.e. with the layer) improves the consistency/reliability of the services that users need and use while allowing IT to make changes to the infrastructure without the user noticing the changes. The resulting infrastructure opacity (to the user) now allows IT to manage both workloads and resources proactively where they previously only had management control over resources. This layer is a win-win if IT can now manage the “opaque infrastructure” in a way that the user has the desired elasticity, performance and reliability – it is in this management that Grids and Virtualization will play a key role. This is the 3rd and final part of a 3 part series exploring Virtualization, Grids and cloud computing and the exponential value obtained by integrating these to realize enterprise objectives. The links to earlier parts are:Part 1 – VirtualizationPart 2 – Grids and Cloud computingHere is the video for Part 3The video for the sake of brevity does not explore the range of potential synergies that are possible but motivate a few. Some other points to consider: I hope you found this series interesting and found some things to ponder. I would like to hear your thoughts – would also be very interested to hear other examples of folks bringing these paradigms together. The biggest challenge is whether IT can change it’s models, processes and mindframe to really recognize and leverage the value that is placed before them – furthermore IT can not be a mere deployer of solutions but has now to get into the business of design, development and integration to a degree that they have not done or been comfortable with. The synergy of these 3 paradigms now allow the merging of “use” and “management” into a single framework where till now they were treated as separate disciplines. This merging now makes “IT agility” a reality where “proactivty” is as much a part of “agility” as “reactivity”. Driving “agility” as a “proactive excercise” will also lead to improved TCO over that delivered by a “reactive excercise”.last_img read more

Powering Microsoft PowerPivot with Intel Processors

first_imgIntel demonstrated Microsoft PowerPivot at Microsoft TechEd 2010 – showing an end-to-end solution with Intel Xeon 7500 series on the server side and Intel Core i5 and i7 on the client side.last_img

Using Technology to Capitalize on Small Business Saturday

first_imgPreparing your small business for the holiday shopping rush can be overwhelming. By starting now, you can focus your efforts to make a major, lasting impact this holiday season. Small Business Saturday officially kicks off the holiday rush, and it has become one of the most important sales days of the year for small business owners.The event (launched in 2010 by American Express) has blossomed into a nationally recognized day for consumers to support their local small businesses. Last year, more than 88 million people “shopped small” — spending more than $14 billion at independent retailers and restaurants that day. Here are three steps to get your business prepared for a successful Small Business Saturday:Prepare for the Worst, Plan for the BestAs a responsible small business owner, you’re always considering the risks. If you have a big spike in holiday demand, will your technology be able to handle it without lag? If you offer online sales, will your customers’ data be secure? When you plan a big sales push, the risk of big mistakes increases as well. Now is a great time to assess your current technology infrastructure. Are there gaps in security or old PCs that could cause problems on a busy shopping day? If so, it’s time to consider an upgrade. By using a modern setup, you can focus on what’s important: providing the best possible service for your customers.Do Something Special for Your CustomersSmall Business Saturday is a great opportunity to debut a new product, offer amazing deals, or host a special event at your business. What can you do to build brand loyalty and help your customers connect with you and your business? Offering a gift with purchase, free gift wrapping, or another personalized service goes a long way. This blog from the Small Business Administration offers more simple marketing ideas to ensure a successful Small Business Saturday. Make Your Marketing Count Without Counting PenniesMost small businesses don’t have huge marketing budgets, but you can’t ignore the need to promote your business and products. Luckily, there are more ways than ever before to reach your customers where they spend time, whether it’s online or out in your community. Choose the best media to invest your marketing and advertising dollars in, and craft a message that’s warm, engaging, and offers solutions to your customers. Get your message out now, and your customers will be primed to shop come November 28.Stay tuned to this channel for more ways to prepare for Small Business Saturday, and visit our page for small business resources from Intel. For more, follow us on Twitter at @IntelSmallBiz.last_img read more

Reinventing the Retail Experience with Intel, SAP and the Internet of Things

first_imgTis the season to go shopping—at least if you are one of the millions of people buying gifts for the holidays. If so, perhaps you’ve noticed that your shopping strategies have changed in recent years. Fewer and fewer people go window shopping or wander the merchandise aisles, seeking inspiration. Instead, the retail experience for many begins by researching products with web and mobile tools before going to a bricks-and-mortar store to make further evaluations and a purchase decision: While more than 90 percent of retail transactions still occur in stores, over 60 percent of purchase research begins online. That means that consumers come to retail locations better informed than ever, often with their minds already made up about what they wish to purchase.This can be a challenge for retailers who rely on traditional marketing strategies that focus on sales associates engaging with customers and helping make purchase decisions—with a consequent increase in the size of the sales basket.How can a retailer compete? Well, it turns out that consumers aren’t the only ones with access to new sources of data. Innovative retailers can use new technologies—including a network of smart sensors, Internet of Things (IoT) gateways, and cloud-based data analytics—to know more about individual consumers and their preferences; personalize the customer’s shopping experience to increase engagement and sales; and to deliver a unified retail experience from online to in-store via smart signage, loyalty programs, targeted sales assistance, mobile POSs, and more.To enable these kinds of data-driven experiences for retail requires a secure, end-to-end solution that can seamlessly extend from sensor-based data capture at the store level, to transaction data collected at retail locations, and all the way to analytics processing in the cloud—to help retailers improve engagement with their customers, better understand what’s happening in their stores, and improve the size of individual transactions. To help retailers gain these kinds of data-driven insights, Intel and SAP are working together to create an end-to-end IoT solution that can deliver actionable retail insights on a near real-time basis. This joint IoT solution, which includes Intel® IoT Gateways to capture and secure sensor data, SAP SQL Anywhere* database software to enable intelligence at the edge, and the SAP HANA* cloud, will allow retailers to take advantage of real-time analytics to act faster, make smarter decisions, and know more about customers than ever before. To learn more about the Intel and SAP IoT solution, watch this video:When we talk about bringing improved analytics to the retail industry, I want to emphasize that this new solution enables two very different types of analytics. The first is conventional big data analytics, the kind of number crunching that typically takes place in corporate offices and allows high-level retail decision-makers to decide where to locate the next store and view sales patterns for the season’s hot products. This kind of analytics has traditionally been processed on its own siloed computing infrastructure, completely apart from the transactional infrastructure that runs the sales and transactional systems for daily retail operations, because you wouldn’t risk running a big analytics query on the same system that held your transactions log, for fear that it might crash the system. But SAP HANA, running on Intel® Xeon® processors, has the power to run both analytical and transactional workloads on the same infrastructure, and in memory. This not only offers the potential to lower infrastructure costs, it means that transactional information can be made available for analysis as soon as it is processed, enabling retailers to act on those insights in near real-time.The Intel and SAP IoT solution doesn’t just enable analytics at the macro level, it also delivers immediate analytical insights at the store level. Using sensor-based tools such as smart-mirrors and –fixtures, traffic flow detectors, interactive visual aids, inventory tags, and personal tracking technologies, Intel IoT Gateways can give retailers instant access to new sources of data that can identify customers and their past purchases and preferences, and to offer personalized offerings and services to differentiate the shopping experience from competitors. These instantaneous analytics, drawn from the store itself, deliver insights not just about customers, but also about how to offer a more engaged customer experience in a store. This can include store layout and traffic flow information, suggestions for strategic pairings of products, identification of inventory not selling well, and alerts about up-to-the-second shopping trends. Collection and real-time analysis of data at the network edge gives a store manager the ability to immediately address dynamics in the store; the IoT gateway also routes the data to the cloud for traditional analytics.Intel products and technologies translate IoT into business value and differentiation for the retail industry. Intel provides the critical, foundational building blocks for building secure IoT networks, with a proven portfolio of compute, storage, network and software components that span from the edge to the cloud. Because the Intel platform is modular, retailers can build their infrastructure as their needs evolve; they can also unlock value from the data and infrastructure they already have.  Essential for retailers, Intel also offers a variety of security technologies built into its processors, including encryption and tokenization, to ensure protection of both customer and retail data. Intel is also at the center of a partner ecosystem that includes not only SAP but retail industry ISVs, and our technology is vendor neutral, standards based, and interoperable.Intel may not be the first company that comes to mind when you think of retail, but if you peer behind the thin veneer that is the storefront, you’ll find that that the technology—and the innovation—that powers retail solutions are similar to the platforms in other industries where Intel is a proven leader.Interested in learning more about Intel’s retail solutions? Visit our websiteOpens in a new window and join us at the National Retail Federation (NRF) annual conferenceOpens in a new window, to be held January 17-20. 2016 in New York City. Stop by the Intel booth #2543 to say hello and let us show you how Intel is revolutionizing retail.Follow me at @TimIntelOpens in a new window and #TechTim to keep up with the latest with Intel and SAP.last_img read more

Top 5 Things to Know About Recent IoT Attacks

first_imgRecent internet attacks resulted in popular sites becoming unreachable, such as Twitter, Etsy, Spotify, AirBnB, Github, and the New York Times.  These incidents have brought to light a new threat to online services: Internet of Things (IoT) botnets.  Distributed Denial of Service (DDoS) attacks have been commonplace for over a decade but rarely been too troublesome.  For the past several years’ network providers’ security services have been able to absorb such attacks to keep online properties available.  But the game has now changed.In essence, when a number of devices can be controlled to simultaneously flood a destination with network requests, the target becomes overloaded and legitimate requests cannot be processed.  Traditional network filters are smart enough to recognize a handful of systems attempting this malicious behavior and simply drop all requests from them.  But when thousands of different systems mount an attack, the normal filters fail to recognize legitimate from malicious traffic and the availability of the system crumbles.Cybercriminals and hacktivists have found a new weapon in this war, the Internet of Things (IoT).  Billions of IoT devices currently exist and can be as small as a piece of jewelry or larger than a tractorOpens in a new window.  They all have one thing in common, they connect to the Internet.  This has tremendous benefits as people can monitor their home with cameras from afar, check the contents of their refrigerator while at the store, and do a myriad of other great things with these connected beneficial gadgets.  We cannot forget however; these are just tools.  They can be wielded for good or employed for malice.  To hackers, each one of these devices is a potential robotic soldier, which they might be able to recruit into their bot-army.The most recent attack, against a major DNS provider has highlighted this very fact to millions of Internet users.  Botnets containing tens or hundreds of thousands of hijacked IoT devices can bring down major pieces of our beloved Internet.  There is a lot of hype, fear, and speculation bubbling out of the shadows.  We are at a tipping point.  IoT devices now represent a new and formidable threat.  The next few months will be telling.  For now, let us cut through the hype and understand the important aspects of recent IoT DDoS attacks.Here are 5 things you should know about the recent IoT attacks:Insecure IoT devices pose new risks for everyone. For every IoT device which can be hacked, it is another soldier in a botnet army which could be used to bring down important parts of the Internet.  Such attacks can interfere with your favorite sites for streaming, social media, online-shopping, banking, etc. If you own such weak or poorly configured devices, then you could be contributing to the problem.IoT devices are valuable to hackers and they won’t give them up without a fight. Although these attacks, with malware like the Mirai botnets, are simple in nature, they will evolve as quickly as they need to for the attackers to remain in control.  IoT devices are hugely valuable to hackers, as they empower them to conduct devastating DDoS attacksOpens in a new window with little effort.DDoS attacks from IoT devices are severe and tough to defend against. Identifying and filtering out attacks from a handful of systems is easy.  When faced with tens or hundreds of thousands, it is near impossible.  The amount of resources needed to fend off attack is tremendous and costly.  A recent attack to knock Brian Krebs’s security-reporting site offline, resulted in Akamai’s vice president of web security to state “If this kind of thing is sustained, we’re definitely talking millions” of dollars in cyber security services to keep the site available.  That is powerful.  Look for attackers to not give up easily.  These always-connected devices are perfect for DDoS botnets.Cybercriminals and hacktivists are driving these attacks. There is speculation and fear that nation states are behind the latest string of attacks.  That is highly unlikely.  Authors of Mirai, one of hundreds of botnets, voluntarily released the code to the public, something a professional government offensive team would never do purposefully.  However, it is a good bet that after witnessing how powerful IoT botnets are, nation states are probably working on similar strategies but with much more advanced capabilities.  In the short term, cybercriminals and hacktivists will remain the main culprits of these attacks.  Over the next few months, expect criminals to find angles which they can make a financial profit, like extortion.It will get worse before it gets better.  Unfortunately, most of IoT devices that have been deployed to date, lack strong security defenses.  The ones being hacked now are the easiest, with default passwords that are published for anyone to lookup.  Hacker software simply connects and logs into the device, unless the owner has gone out of their way to change the default password.  Unsurprisingly, most have not taken this important step.  Instantly, the attackers have another soldier to do their bidding. In order for this situation to get better, several aspects must be addressed.  Devices must be designed with security in mind, configured properly, and managed to keep security updated.  This will take both technical and behavioral changes in the long-run to keep pace with evolving hackers.To learn more, read How to Secure the Future of IoTOpens in a new window.Hacking IoT devices is now a problem for everyone.  Due to the ease of compromise and massive numbers of IoT devices which are connected to the Internet, cybercriminals and hacktivists have a vast resource to fuel powerful DDoS campaigns.  We are just starting to see the attacks and issues around IoT security.  It will continue to be a problem until more comprehensive controls and behaviors make us all more secure.Interested in more?  Follow me on Twitter (@Matt_Rosenquist)Opens in a new window and LinkedInOpens in a new window to hear insights and what is going on in cybersecurity.last_img read more

Welcome to the Future: The Analytics Age Has Started

first_imgIntel® technologies’ features and benefits depend on system configuration and may require enabled hardware, software, or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at Source:  Gartner 2017 survey of 2,500 CIOs2 Source: Seagate ‘Data Age 2025’, July 2017, Source: Forbes Magazine. ’20 Mind-Boggling Facts Every Business Leader Must Reflect on Now’, November 2015, Source: PwC’s Global Data and Analytics Survey, July 2016: Big Decisions*, Source: Forrester Research. Artificial Intelligence: Fact, Fiction. How Enterprises Can Crush It; What’s Possible for Enterprises in 2017, Whether you’re a high-tech startup or a decades-old retailer, and whether you like it or not, you’re a data company. As enterprises everywhere begin to integrate deeper insights into their operations, those who focus on maximizing their data and analytics capabilities will be best placed to succeed today and tomorrow. According to a recent Gartner survey, across industries, business intelligence and analytics are now ranked as the number one CIO investment priority1. It’s a sign that data has become the gravitational center of business—the point around which everything else revolves.Data and analytics are, of course, intrinsically linked. Data on its own is not interesting, but the insight that can be extracted from it—using analytics—is now being used by many as a competitive advantage. It can help reduce costs, improve understanding of customers, and drive innovation. And it can help organizations react more quickly to industry or market changes or evolving customer needs—a must-have capability in today’s digital economy.So analytics is important for everyone, not just high-tech, blue-chip companies, and there’s no time to lose. The world’s data is expected to grow ten-fold in the next ten years2, but, even today, less than one percent of it is analyzed and used3. As these volumes continue to grow, we’ll have to boost our ability to turn more of it into valuable insights, otherwise, what’s the point of collecting it?Create a Data FoundationSome of the most common factors hindering our ability to better tame our rapidly expanding data assets include:Disconnected silos of data across the company that are difficult to access and blendData that has been archived and is no longer retrievableOlder data infrastructures that aren’t designed for ingesting or blending data from multiple sourcesDisparate governance rules and inconsistent metadata and formattingThe growing expense of storing data (especially the most timely ‘hot’ and ‘warm’ data)And, of course, working out what to retain and what to analyzeOvercoming these challenges means ensuring the data layer of your IT infrastructure is carefully assessed and prepared for the age of advanced analytics and artificial intelligence (AI). For many organizations, this means transitioning from traditional data warehousing to a more integrated model based on a data ‘hub’ or ‘lake’. These new solutions, often supported by existing hardware and storage infrastructures, are designed to enable real-time analytics across the full spectrum of data types and sources. More details about how to develop such an analytics-ready data infrastructure is available in the new Intel® whitepaper Tame the Data Deluge.Keep Accelerating InsightsWhile a strong, modern data strategy is an essential first step on the journey to advanced analytics and AI, it is just that: A first step. It’s not enough to make data available to analytics applications, it must also be done at an increasingly rapid pace that keeps up with business demand. Enterprise executives responding to a PwC survey indicated that they expect their analytics to be 75-percent faster and two-times more sophisticated by 20204, so IT has some big expectations to fulfill.In order to shrink time to insight, it’s essential to have a holistic approach across hardware, software, and solutions. Some of the key things to consider, include:Hardware: The choice of processors, memory capacity, storage media, network technologies, and cluster architecture can all determine improvements in speed.Software: Adding the right library into your software stack can drive big performance improvements. In addition, optimized versions of industry frameworks and operating systems can make a major impact on speed and efficiency.Solutions: Using a fully tuned solution stack from a blueprint, such as the Intel® Select Solutions, can help accelerate analytics.Enable Advanced Analytics Use CasesWhile there’s a lot of talk about AI, enterprise adoption is still in its infancy. In a recent Forrester survey, 58 percent of business and technology professionals said they were researching AI, but only 12 percent said they are actually using AI systems5. However, as more and more companies adopt increasingly mature advanced analytics techniques, AI will become a standard part of the business toolkit.The potential use cases for advanced analytics and AI are numerous. One of the beauties of these technologies is that they can be adapted to address almost any business challenge or scenario. It’s useful to bear in mind these distinctions between some of the more common technologies discussed in this context:Artificial Intelligence: A program that can sense, reason, act, and adapt.Classic machine learning (ML): Algorithms whose performance improves as they are exposed to more data over time.Deep learning (DL): A subset of machine learning in which multi-layered neural networks learn from vast amounts of data. For example, image/speech recognition, natural language processing, and pattern recognition/detection.Reasoning: Suitable for large, diverse, complex, structured or unstructured data sets from multiple data sources.Emerging technologies: New and emerging AI techniques that don’t fit the characteristics above. Today, this would include solutions like sequence alignment in computational biology, or binary neural network-based inferencing.To learn more about getting your organization ready for advanced analytics, read the whitepaper Tame the Data Deluge.last_img read more

Mixed Verdict on Fracking

first_imgVANCOUVER, CANADA—A controversial method of drilling for natural gas, called fracking, has boomed in recent years—as have concerns over its potential to cause environmental contamination and harm human health. But a major review of the practice, released today, uncovered no signs that it is causing trouble below ground. “We found no direct evidence that fracking itself has contaminated groundwater,” said Charles Groat of the University of Texas (UT), Austin, who led the study.The report, released here at the annual meeting of the American Association for the Advancement of Science (which publishes ScienceNOW), doesn’t give this form of natural gas extraction a clean bill of health. Rather, it suggests that problems aren’t directly caused by fracking, a process in which water, sand, and chemicals are pumped into wells to break up deep layers of shale and release natural gas. Instead, the report concludes, contamination tends to happen closer to the surface when gas and drilling fluid escapes from poorly lined wells or storage ponds.Groat, a former director of the U.S. Geological Survey, emphasized that the $380,000 report was independent from the natural gas industry and conducted only with university funds. Underlying white papers were peer-reviewed, he told ScienceNOW, and the Environmental Defense Fund (EDF) was consulted on the overall scope and design of the study.Sign up for our daily newsletterGet more great content like this delivered right to you!Country *AfghanistanAland IslandsAlbaniaAlgeriaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBolivia, Plurinational State ofBonaire, Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarussalamBulgariaBurkina FasoBurundiCambodiaCameroonCanadaCape VerdeCayman IslandsCentral African RepublicChadChileChinaChristmas IslandCocos (Keeling) IslandsColombiaComorosCongoCongo, The Democratic Republic of theCook IslandsCosta RicaCote D’IvoireCroatiaCubaCuraçaoCyprusCzech RepublicDenmarkDjiboutiDominicaDominican RepublicEcuadorEgyptEl SalvadorEquatorial GuineaEritreaEstoniaEthiopiaFalkland Islands (Malvinas)Faroe IslandsFijiFinlandFranceFrench GuianaFrench PolynesiaFrench Southern TerritoriesGabonGambiaGeorgiaGermanyGhanaGibraltarGreeceGreenlandGrenadaGuadeloupeGuatemalaGuernseyGuineaGuinea-BissauGuyanaHaitiHeard Island and Mcdonald IslandsHoly See (Vatican City State)HondurasHong KongHungaryIcelandIndiaIndonesiaIran, Islamic Republic ofIraqIrelandIsle of ManIsraelItalyJamaicaJapanJerseyJordanKazakhstanKenyaKiribatiKorea, Democratic People’s Republic ofKorea, Republic ofKuwaitKyrgyzstanLao People’s Democratic RepublicLatviaLebanonLesothoLiberiaLibyan Arab JamahiriyaLiechtensteinLithuaniaLuxembourgMacaoMacedonia, The Former Yugoslav Republic ofMadagascarMalawiMalaysiaMaldivesMaliMaltaMartiniqueMauritaniaMauritiusMayotteMexicoMoldova, Republic ofMonacoMongoliaMontenegroMontserratMoroccoMozambiqueMyanmarNamibiaNauruNepalNetherlandsNew CaledoniaNew ZealandNicaraguaNigerNigeriaNiueNorfolk IslandNorwayOmanPakistanPalestinianPanamaPapua New GuineaParaguayPeruPhilippinesPitcairnPolandPortugalQatarReunionRomaniaRussian FederationRWANDASaint Barthélemy Saint Helena, Ascension and Tristan da CunhaSaint Kitts and NevisSaint LuciaSaint Martin (French part)Saint Pierre and MiquelonSaint Vincent and the GrenadinesSamoaSan MarinoSao Tome and PrincipeSaudi ArabiaSenegalSerbiaSeychellesSierra LeoneSingaporeSint Maarten (Dutch part)SlovakiaSloveniaSolomon IslandsSomaliaSouth AfricaSouth Georgia and the South Sandwich IslandsSouth SudanSpainSri LankaSudanSurinameSvalbard and Jan MayenSwazilandSwedenSwitzerlandSyrian Arab RepublicTaiwanTajikistanTanzania, United Republic ofThailandTimor-LesteTogoTokelauTongaTrinidad and TobagoTunisiaTurkeyTurkmenistanTurks and Caicos IslandsTuvaluUgandaUkraineUnited Arab EmiratesUnited KingdomUnited StatesUruguayUzbekistanVanuatuVenezuela, Bolivarian Republic ofVietnamVirgin Islands, BritishWallis and FutunaWestern SaharaYemenZambiaZimbabweI also wish to receive emails from AAAS/Science and Science advertisers, including information on products, services and special offers which may include but are not limited to news, careers information & upcoming events.Required fields are included by an asterisk(*)As part of the review, 16 researchers at UT Austin in a variety of fields including air quality and hydrology reviewed the scientific literature and regulatory documents for three major areas of fracking in Texas, Louisiana, and Pennsylvania and New York. They could not find evidence of drilling fluids leaking deep underground, and methane in water wells in some areas is probably due to natural sources. The team did not see a need for new regulations specific to fracking, but for better enforcement of existing regulations of drilling in general—such as those covering well casing and disposal of wastewater from drilling. (Fracking in 2005 was specifically exempted from the Clean Water Act.)The review acknowledges that gaps remain in our understanding of fracking, including whether the disposal of wastewater by pumping it into the ground causes small earthquakes. In addition, the cumulative and long-term impacts of this form of natural gas drilling remain unclear, especially in areas where some gas naturally escapes from below ground. “We feel hobbled by a lack of baseline information,” Groat said. The Environmental Protection Agency is conducting a study of fracking’s impacts on drinking water, with initial results due out this year.“The report deserves widespread attention,” wrote EDF’s Scott Anderson on his blog today. “But it is by no means the final word on these topics.”Full coverage of AAAS 2012last_img read more

The Three Faces of Sanjay Dutt: Which One Do We Punish?

first_imgIf sentenced, he will serve a few years in jail and come back almost forgotten. In the trial of an actor’s life, that may well be the ultimate punishment. Related Itemslast_img

Outrage in India as Temple Stampede Toll Hits 115

first_imgOutrage mounted in India Monday after at least 115 devotees were crushed to death or drowned near a Hindu temple, the site of another deadly stampede only seven years ago. Related Itemslast_img