#also was considering having bk's aspect be time and as's as space
Explore tagged Tumblr posts
hollowsorrows · 2 years ago
Text
been thinking about ymu classpects as of late and oh my GODDDD kk shouldnt be the heir of hope... since pages are all about untapped potential he should be a page🥲
2 notes · View notes
izukukuzi · 4 years ago
Text
okay okay okay so heroes rising:
i don’t know how much weight anyone wants to put to my opinion, BUT, if you’re considering the movie.... i don’t think it’s not worth watching ebjnwjnde i am a big fan of getting to see 1-a strut their stuff and there was plenty of that in the movie (which i obviously enjoyed)! the villains are interesting enough, the plot’s alright, and the animation/visuals are PHENOMENAL!!!!!!!!!! 
a moot, crimson actually, mentioned that it would probably be better to watch the movie and know for sure that you liked/disliked it than to not watch and wonder forever about what could have been when i asked them if i should give the movie a shot, and that philosophy served me pretty well in the given circumstances! so for anyone wondering about that aspect (i know there was an anon and a few others that asked about this), then i believe there’s substance there for any bnha fan to get at least a little entertainment out of the movie, so you should give it a go!
NOW, with all that in mind, I still have to talk about this fight scene at the end because.... oof jnedjnwknkw (so heroes rising/manga spoilers ahead and all that good stuff)
first of all, i made a graphic to better express all the things I am feeling about the mess of bakugou/izuku sharing one for all:
Tumblr media
so like... the simple idea of bakugou getting one for all doesn’t sit right with me ANYWAYS, but we have our first like... “issue” or whatever, after izu passes the quirk over, and he/bk have this back and forth, as follows:
BK: “This might the last time you use [One For All].”
IZ: “It’s alright, there’s no other way. Also, All Might would agree if it’s you.”
and i would just like to say that it absolutely is NOT alright?????? why would this be the last time izuku gets to use ofa? i really don’t like or understand the implication of izuku not being able to get his quirk back from bakugou once the battle is over because??????????? why would that not be how it works? especially if bakugou just hands it over LIKE HE SHOULD, then why would that transfer back be a problem at all?????
of course, things do work out fine with ofa jumping ship and settling back in with izu at the end of the movie (while also... doing something to bakugou’s memory), but what the fuck is this conversation even about?  
AND THEN, something else that bugs me about this whole setup is like... izu trained for ten whole months before his body could handle having ofa passed down to him; shiggy was supposed to lie in a tank for like... what, four months, before he could activate and use afo at its strongest (which may not be the exact same methods of preparations that izuku had but the point is that you have to be strong enough or ofa/afo will fuuuuuuuck you up) AND YET, WHEN BAKUGOU GETS THIS QUIRK, he immediately has a handle on it AND only suffers injuries that appear about as severe as izuku’s (who has been mastering the quirk and bulking up to work alongside its elevation in power)???? like??? i’m not saying that I wanted bk to crumble to pieces like a pack of crackers on the battlefield BUT???? that doesn’t seem..... consistent??? i mean, i don’t think heroes rising is a part of canon, so i guess it doesn’t matter all that much, but i just do not believe that bk’s body, as it is, was physically well enough to handle using ofa at the percentage that he did without his injuries being much more substantial. 
that then just leads me to my last point (because i talk too much ednudnejnfe): i like that bnha gives us space to see everyone, you know? we get some screentime for the pros, the league, nine and his gang, and, like i said earlier, i like seeing 1-a being the promising hero hopefuls that they are, and the movie really plays that aspect out well!!!! however.... why does it have to be bakugouanddeku all the time??? why can’t bakugou blend into one of the background groups while izuku gets to shine (ORRRRR just work with literally anyone else in the class/hero world besides bakugou)? i “understand” that there’s supposedly this whole yin and yang, save to win and win to save, thing going on, but i just don’t think bakugou complements izuku and his heroic strides as well as everyone tries to frame it. bakugou's interactions with izuku consist of him using izu as some sort of... threshold or something (aka, “if i can beat deku, who’s the Chosen One, then that proves that I am a great hero because I’m surpassing all might’s power”), but izu is and has been growing into himself as a future hero, and that growth has never really depended on bakugou, SOOOOO!!!!!!!!!!!!! i think we should stop with this wonder duo nonsense because their dynamic is just not... it’s not like that, you know??? bakugou’s relevance and success may be dependent on izuku, but the opposite, in my opinion, does not reign true, so forcing them together is... imbalanced :/
huh so i dunno if any of that makes sense, and there’s a chance that some of the things i complained about have been addressed by other people who have watched the movie already, so if i am missing out on explanations/information, please be gentleeee with me edbuenfjnje BUT here are my thoughts about the end of heroes rising!!!
107 notes · View notes
the-madhuri · 4 years ago
Text
North America IoT Connected Cars Market – Industry Analysis and Forecast (2019-2026) – by Application, Communication Type, Services, Hardware, Network and Geography
North America IoT Connected Cars Market, is expected to grow from USD xx billion in 2018 to USD XX billion in 2026.
North America IoT Software Market, by Geography
The segments considered under the scope of the report includes application (Telematics, Infotainment), communication type (Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I), Vehicle to Home (V2H)), services (Connected Services, Safety & Security, Autonomous Driving), hardware (Smart Antenna, Display, Electronic Control Unit (ECU), Sensors), network (Dedicated Short Range Communication, Cellular Network/Wi-Fi), and geography/country (US and Canada).
Maximize Market Research, a global market research firm has undertaken extensive research about the North America IoT Connected Cars Market outlook in terms of the technology growth and the overall IoT ecosystem. The report includes market dynamics describing about the drivers, restraints, and opportunities along with profiling the changing business dynamics and its related impacts on the overall North America IoT Connected Cars Market growth. The report further gives an in-depth analysis regarding the changing competitive scenario for helping all the stakeholders in the industry and clients.
A connected car is equipped with internet access, and is usually connected with a wireless network. The internet connectivity and access allows the car to share information about the inside and outside with the user further guiding in terms of obstruction by providing real-time information.
The IoT have changed the way vehicles behave due to the higher demand for smart cars and IoT based devices connected with cars. It is done for enhancing the customer experience along with providing an additional security measures for the driver and passengers, driving the overall market growth. Even though IoT offers numerous benefits for the automotive space, the adoption rate is low for connected car technology among drivers. Some companies in US are working on changing that outlook by offering its connected car technology as a free service in every vehicle as otherwise it is still considered costly.
IoT connected cars have enhanced the infotainment within cars further working on the safety & security of the connected cars forming two key segments for the market growth. U.S. and Canada are the two regions profiled under the scope of the port with US holding a larger market share. Factors such as higher application of IoT devices along with government rules to boost the passenger security is driving the overall growth of IoT connected cars market in North America.
The objective of the report is to present comprehensive IoT connected cars market     including all the stakeholders of the industry. The past and current status of the industry with forecasted market size and trends are presented in the report with analysis of complicated data in simple language. The report covers all the aspects of industry with dedicated study of key players that includes market leaders, followers and new entrants by region. PORTER, SVOR, PESTEL analysis with the potential impact of micro-economic factors by region on the market have been presented in the report. External as well as internal factors that are supposed to affect the business positively or negatively have been analyzed, which will give clear futuristic view of the industry to the decision makers.
The report also helps in understanding IoT connected cars market   North America for Asia Pacific dynamics, structure by analyzing the market segments, and project the IoT connected cars market   North America for Asia Pacific   size. Clear representation of competitive analysis of key players by type, price, financial position, product portfolio, growth strategies, and regional presence in the IoT connected cars market   North America for Asia Pacific make the report investor’s guide.
For more information visit the link given below
https://www.maximizemarketresearch.com/market-report/north-america-iot-connected-cars-market/10709/
Market Scope:
North America IoT Connected Cars Market, By Application: Telematics, Infotainment
North America IoT Connected Cars Market, By Communication Type: Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I), Vehicle to Home (V2H)
North America IoT Connected Cars Market, By Services: Connected Services, Safety & Security, Autonomous Driving
North America IoT Connected Cars Market, By Hardware: Smart Antenna, Display, Electronic Control Unit (ECU), Sensors
North America IoT Connected Cars Market, By Network: Dedicated Short Range Communication, Cellular Network/Wi-Fi
North America IoT Connected Cars Market, By Geography: North America, Europe, Asia Pacific, Middle East & Africa and Latin America
Key Players
• BMW Ag • Google, Inc. • Tesla Motors, Inc. • Wirelesscar • Alpine Electronics • Audi Ag • Volvo Car Corporation • Delphi Automotive Plc • Robert Bosch Gmbh • Vodafone Group Plc • Airbiquity, Inc • Ford Motor • Nxp Semiconductors • At&T, Inc • Denso Corporation • Siemens • TOM TOM Telematics
This report is submitted by Maximize market Research Company
Customization of the report:
Maximize Market Research provides free personalized of reports as per your demand. This report can be personalized to meet your requirements. Get in touch with us and our sales team will guarantee provide you to get a report that suits your necessities.
About Maximize Market Research:
Maximize Market Research provides B2B and B2C research on 20,000 high growth emerging opportunities & technologies as well as threats to the companies across the Healthcare, Pharmaceuticals, Electronics & Communications, Internet of Things, Food and Beverages, Aerospace and Defense and other manufacturing sectors.
Contact info:
Name: Lumawant Godage
Organization Address: MAXIMIZE MARKET RESEARCH PVT. LTD.
Address: Omkar Heights, Sinhagad Road, Manik Baug, Vadgaon Bk,Pune, Maharashtra 411051, India.
Contact: +919607195908
0 notes
sunderedstar · 7 years ago
Text
@doigiveafuck replied to your post: “one real LOSS regret: never getting an excuse to use this ridiculous...”
Will you publish a bunch of your notes like this one here once you've completed LOSS?
I did manage to incorporate some stuff in LOSS itself, though I couldn’t officially namedrop all the game mechanics that I made notes about all those years ago. also, past!me apparently ran out of steam part of the way through the trolls, so it’s kind of piecemeal. some stuff below the cut:
Knight of Blood: 
Conductor - the Pulse 
Abilities - First Blood: if the player deals the first blow in a strife, his critical hit ratio doubles for the remainder of the strife | My Oath Is My Bond: when the player engages in a blood pact with another being, failure to uphold the oath can result in a heightened Doom rating on the timeline; completion of an oath will increase the session's likelihood of success 
Fraymotifs -  Family Don't End With Blood: when a Blood player acts as leader in a game session, overall coopotential in the team is boosted; once the player hits god-tier, they can form artificial "blood" bonds between the aspects and classes of other players - this allows players to access each other's buffs and fraymotifs regardless of classpect limits | Tears of Blood/Blood is the New Black: When the player’s teammates are critically injured or dying, Knights of Blood receive an speed and strength buff while defending them. Said buff will increase exponentially if more blood is spilled, but trigger a corresponding sanity debuff - they become stronger, but enter a berserker mode. Upon reaching god-tier, Tears of Blood can upgrade to Blood Is The New Black, in which all blood in the Medium is weaponized. In conjunction with a Rage player, this ability becomes completely broken and generally leads to an apocalyptic game over.
---
Heir of Breath 
Conductor - the Breeze 
Abilities - Air From My Lungs: Breath players can give the air of their lungs to other players, literally and figuratively; their pep talks can restore much more resolve and faith to a faltering player and can guide a corrupted loved one back onto the right path; dream selves are more likely to revive when a dead real self is smooched by a Breath player. | Crisis of Succession: in the event certain glitches occur, it is possible for an Heir to enter the line of succession by taking up the King's Scepter or the Queen's Ring to become a King of Misrule or a Queen of Unorthodoxy; however, they cannot wield the full power of prototyping without severe consequences | Eye of the Storm: Breath players are mentally shielded from certain emotional turmoil until the storm of strife has passed; they are able to take strange things in stride with an abnormal level of trust and acceptance that resembles derpish naïveté to the outside viewer 
Fraymotifs - Channeling the Tempest: summons a board-clearing tornado or storm that can either be directed as a weapon or a mass transport | The Song Before The Storm: engaging this motif before a major boss battle buffs the rest of the team | Aeolian Aria: in conjunction with any god tier Time player, a Breath player can unleash this fraymotif for a timeline-spanning attack, capitalizing on Time's fastforward option and Breath's ceaseless mobility
---
Knight of Time: 
Conductor - the Beat 
Abilities - Take Your Time: any time player can make more time for themselves by traveling back to complete forgotten quests and rescue others, but it takes a Knight to truly abuse the function for the hell of it, leading to improbably complex loops usually guided at least unconsciously by the Beat; a broken Beat can have disastrous consequences 
Fraymotifs - Turning the Tables/Never Too Late: starts as a fraymotif granting the player a higher likelihood of rescuing fellow players from the jaws of defeat; in the higher end of the echeladder and god tier, they can avert bad situations entirely with minimal risk of dooming the time line, as fate begins to favor their in the nick of time rescues | Smash Up/Jam Session: the player receives double the usual buffs for successfully strifing in sync with a fraymotif, stacking more buffs for each player motif they mashup with their own successfully; upon hitting god-tier this enables the team move Jam Session in which all team players can jam out, gaining invulnerability for the duration of a successful combo | I Pledge Myself to Thee - if a Knight pledges service or swears devotion to an Heir, Page, Maid, or Lord/Lady, they receive automatic strength and speed buffs and gain echeladder rungs faster when protecting said player, and suffer debuffs when neglecting them; this is automatically applied to the royalty of their Moon, leading to a glitched debuff for Dersite Knights attempting to combat the Black King 
Debuff - a Knight of Time can never achieve the fraymotif Time Lord. No one can.
---
Seer of Light: 
Conductor - the Stars 
Abilities - Foresight: Seers of Light are naturally more likely to predict fortuitous future paths for their team, rather than being distracted by ALL outcomes | Beginner's Luck: Upon entering the Medium at level one, Light players receive an automatic moxiemeter boost 
Fraymotifs - Let There Be: conducts raw light, potential, and fortune through the player's body; strips away void-wards, repels Horrorterrors, and maxes the luck stat for the Light player alone; effectively generates a sun, but can be channeled through wand and needlekind specibi as ranged weapon | So Light 'Em Up: the most offensively powerful a passive classpect like a Seer can achieve; god-tier players max out their luck stat for the duration of the strife, and can engage in a dancestrife that can clear entire Battlefields through strange coincidences and fortuitous happenstance | Clarity: a god tier Seer of Light's most potent support fraymotif; induces clarity of heart and vision in all players on the field, restores all debuffed stats and reveals all enemy weak points; cranks up the team's luck to the max for an absolutely devastating group assault; can restore the sanity of a corrupted or berserker player 
---
Witch of Space: 
Conductor - the Spirograph 
Abilities - Hyperdrive: Space players receive a strength and speed boost with each spirograph portal they pass through | A Familiar Spirit: Witch players tend to attract powerful familiars... | Radioactive: [I wrote nothing here]
Fraymotifs - Orbital Bombardment: Witch of Space players at a high enough level can teleport nearly anything into space and then slam it down at high speeds on top of the enemy before them; could theoretically be used to redirect the Reckoning | Now You're Thinking With Portals: teleport spam at its finest; at high enough levels Witches, Maids, and Heirs of Space can warp and manipulate space to create new, permanent Spirographs that their fellow players can make use of | Double, Double, Toil and Trouble: when two god-tier Witches are on the same Battlefield, they can combine their aspects to heightened effect; in the case of Witches of Life and Space, they can cast an auto-resurrection on the entire Medium for an effective reset | Time and Relative Dimensions in Space: in conjunction with a Time player, both players receive a boost that allows them to teleport spam throughout the entirety of the session, including previously off limit areas; however, until they both hit god-tier, the improbability factor renders this ability too unstable to be properly controlled, and the likelihood of teleporting themselves into a black hole or dooming the timeline is precipitously high in already glitched timelines
---
Bard of Rage: 
Conductor - Discordia 
Abilities - Babylon: interpersonal communication between players vacillates wildly between incomprehensibility and total accord; in the presence of a god tier Bard of Rage, this may lead to total breakdown and widespread glitching and lag not just in chat programs but in real life conversation | Blind with Rage: Bard-specialized ability; they can match the tempo and mood of the players around them with their instruments to increase buffs throughout a strife; enraged players in close proximity to a Rage player receive double strength buffs but suffer a critical sanity debuff
Fraymotifs - Dionysian Revels: inspires other teammates in the vicinity to strife; buffs strength for the party but debuffs sanity; combo fraymotifs moves have an enhanced critical hit ratio | Songs of Solace: acting to destroy the Rage in another player, Bards can actually reduce Rage and eliminate sanity debuffs until the player is soothed | O, Discordia!: a Bard of Rage classic; total chaos is unleashed upon the Battlefield in a hymnfrenzy, upsetting the entire board in the hopes of obtaining a better layout; this is considered an apocalypse-level ability in that it is defined by total loss of control, including massive sanity debuffs for all players, disruption of all active fraymotifs, severe damage inflicted by the blast radius even on fellow players, and has been known to one hit KO denizens and BKs when unleashed by a god-tier Bard
---
Sylph of Space: 
Conductor - the Fabric 
Abilities - Healing Shiv: all weapons can be repurposed for the sake of healing by either adding or removing space, amputation or sewing; a god tier Sylph classic that can go horrible wrong, since if something like a planet happens to get in the way of their healing strike, the planet will lose | Clarke's Third Law: any sufficiently analyzed science is indistinguishable from magic; mythological and magical concepts are more likely to become real the more powerful the Sylph in question 
Fraymotifs - Primum nil Nocere: rarely activated Sylph pacifistic option; if they truly dedicate themselves to healing and non-violence, inflicting zero harm on anyone in the session, they are granted concessions when it comes to required boss battles | Regenerātiō Universi: the Sylph of Space's most flexible and powerful support fraymotif; they can heal the Fabric of paradox space on a fundamental level, sewing tears in space, repairing Prince-level damage, and sealing minor cracks
15 notes · View notes
officechairist · 5 years ago
Text
5 Best Compact Computer Desks For A Home Office [2019]
No matter if you work from home or if you need to get a good computer desk for your child or teenager, you need to know that you don’t even need to have a lot of room. In fact, most computer desk manufacturers already realized that not everyone has a lot of space to hold a traditional computer desk. So, they are trying to increase their offer to ensure that you can buy the best compact computer desk no matter if you have a lot of room or not that much. 
As you can imagine, there is already a wide variety of compact computer desks on the market. However, they aren’t all the same and the truth is that you shouldn’t make your decision based solely on the price. 
Take a look at the best office chairs in 2019.
While there are many different aspects that you should consider (price included), you should focus on your needs and space that you actually have available. While some people may prefer a static compact computer desk, others may prefer that it is moveable. Then, compact computer desks can be made with different materials. In addition, you still can choose the design that you prefer as well if you want to have some storage. 
As you can see, you have plenty of options. So, we decided to give you a hand and we picked the 5 best compact computer desks for a home office in 2019.
#1: Furinno 11192GYW/BK Efficient Home Laptop Notebook Computer Desk, Oak Grey/Black
Click to Check Price on Amazon
When you are looking for the best compact computer desk, the Furinno 11192GYW/BK Efficient Home Laptop Notebook Computer Desk, Oak Grey/Black may be exactly what you have been searching for. 
Featuring a simple yet stylish design, the Furinno 11192GYW/BK Efficient Home Laptop Notebook Computer Desk, Oak Grey/Black is suitable for your home office. However, in case you don’t have an extra room for your office, you can simply place it in your bedroom that will look pretty great as well. 
The Furinno 11192GYW/BK Efficient Home Laptop Notebook Computer Desk, Oak Grey/Black is made with PVC tubes and with composite wood. Even though this is not real wood, the truth is that you will get a compact computer chair that is almost completely made with environmentally friendly materials. 
One of the things that we really like about the Furinno 11192GYW/BK Efficient Home Laptop Notebook Computer Desk, Oak Grey/Black is that even though it is compact, you can still take advantage of the elevated shelf that you can use for your compact printer or any decor item that you want. In addition, this desk also includes a storage shelf for your CPU. This allows you to have more space to work and still some storage available which is always great. 
The Furinno 11192GYW/BK Efficient Home Laptop Notebook Computer Desk, Oak Grey/Black has 39.6(W)x15.5(D)x33.6(H) inches and it features a round edge design. This way, you won’t need to worry about any potential injuries. 
Overall, the Furinno 11192GYW/BK Efficient Home Laptop Notebook Computer Desk is one of the best compact computer desks that you have on the market in 2019.
Click for User Reviews
Take a look at the best stools and drafting chairs for your home office. 
#2: OneSpace Stanton Computer Desk with Pullout Keyboard Tray
Click to Check Price on Amazon
While you already have more variety in terms of compact computer desks, the truth is that this number is still increasing. Nevertheless, we wanted to make sure that you only consider the best ones and this is the reason why we decided to include the OneSpace Stanton Computer Desk with Pullout Keyboard Tray in our best compact computer desk list. 
Featuring an elegant and sleek design, the OneSpace Stanton Computer Desk with Pullout Keyboard Tray is made of PVC, steel, and MDF. So, you can be sure that this desk will last for a very long time in the best conditions. 
One of the things that we really like about the OneSpace Stanton Computer Desk with Pullout Keyboard Tray is that, even though this is a compact desk, you can still take advantage of the storage it offers. After all, the OneSpace Stanton Computer Desk with Pullout Keyboard Tray includes a pull-out keyboard shelf as well as a bottom storage shelf. In case you work in a PC, you can simply use this bottom shelf for the CPU or you can use it for your printer or just folders and files that you need to have always near you. 
The OneSpace Stanton Computer Desk with Pullout Keyboard Tray has a work surface of 27.5 inches width by 19 inches depth which is perfect no matter if you are using a desktop or a laptop. 
If there is something impressive about the OneSpace Stanton Computer Desk with Pullout Keyboard Tray is the fact that even though it is lightweight, it is able to hold up to 150 pounds. 
Click for User Reviews
If you suffer from lower back pain, you should check out these office chairs.
#3: Sauder 408726 Beginnings Computer Desk, Cinnamon Cherry finish
Click to Check Price on Amazon
In case you already started your search for the best compact computer desk for your home office, then you probably already realized that there are some manufacturers that keep popping up. One of them is Sauder and we have to say that this company is one of our favorites. 
While most of Sauder desks are typical or traditional desks, they also have this compact desk model – the Sauder 408726 Beginnings Computer Desk, Cinnamon Cherry finish, that we absolutely love. 
Made only with the best materials and with a good design and construction, the Sauder 408726 Beginnings Computer Desk, Cinnamon Cherry finish is not only beautiful as you can use it as storage as well. The reality is that even though the Sauder 408726 Beginnings Computer Desk, Cinnamon Cherry finish is a compact computer desk, it till includes different storage options that you’re going to love. The first one is the slide-out keyboard shelf that you can easily use to place your keyboard as well as your mouse. Then, you have an elevated shelf that you can use for your monitor, printer, books, files or even a decor item that you like. Finally, the Sauder 408726 Beginnings Computer Desk, Cinnamon Cherry finish also includes a hidden storage behind the door. Even though most people tend to use it for their CPU tower, it is up to you. After all, if you usually work with a laptop, this means that you will have additional storage space that is hidden. 
Click for User Reviews
Have you ever thought of a reclining office chair?
#4: Mobile & Compact Complete Computer Workstation Desk, Graphite
Click to Check Price on Amazon
While most people who are looking for the best compact computer desk for their home office are looking for a desk to be maintained in the same place, you may need one that keeps moving to where you want and need. If this is your case, you should consider taking a closer look at the Mobile & Compact Complete Computer Workstation Desk, Graphite. 
The Mobile & Compact Complete Computer Workstation Desk, Graphite is a stylish and modern compact computer desk that includes lockable wheels. This is the kind of desk that is perfect when you don’t actually have a home office or even a single place to have your own desk. Fortunately, you have the Mobile & Compact Complete Computer Workstation Desk, Graphite that you only need to push around and move it into the room that you want. 
As with all the compact computer desks that we have showed you so far, the Mobile & Compact Complete Computer Workstation Desk, Graphite also includes some storage which is great. With the Mobile & Compact Complete Computer Workstation Desk, Graphite, you will be able to use a pull-out keyboard tray, you can use the side CD rack and media, and you can even use the top shelf that you can use for your monitor or printer. Besides, and in what concerns this last shelf, you can also adjust it in terms of the sides and front. 
The Mobile & Compact Complete Computer Workstation Desk, Graphite is made with heavy-duty MDF panels as well as with a moisture resistant PVC laminate veneer in a graphite finish. 
Click for User Reviews
Discover how to choose the best work desk for you.
#5: Flash Furniture Glass Computer Desk with Pull-Out Keyboard Tray
Click to Check Price on Amazon
Last but not least, you should also consider the Flash Furniture Glass Computer Desk with Pull-Out Keyboard Tray. 
Featuring a contemporary style, the Flash Furniture Glass Computer Desk with Pull-Out Keyboard Tray comes with a clear tempered glass surface that is perfect to work on. Even though you may prefer a wood surface, it is important to notice that both surfaces are incredibly durable and pleasant to the touch. The main difference is that the glass will make your compact computer desk stand out a bit more. 
With 23.5″W x 11.75″D, the Flash Furniture Glass Computer Desk with Pull-Out Keyboard Tray provides you with a great surface area to work. 
One of the things that we like on the Flash Furniture Glass Computer Desk with Pull-Out Keyboard Tray is the crisscross cherry finished leg design. 
Click for User Reviews
The post 5 Best Compact Computer Desks For A Home Office [2019] appeared first on Officechairist.com.
0 notes
nedsvallesny · 7 years ago
Text
Expert: IoT Botnets the Work of a ‘Vast Minority’
In December 2017, the U.S. Department of Justice announced indictments and guilty pleas by three men in the United States responsible for creating and using Mirai, a malware strain that enslaves poorly-secured “Internet of Things” or IoT devices like security cameras and digital video recorders for use in large-scale cyberattacks.
The FBI and the DOJ had help in their investigation from many security experts, but this post focuses on one expert whose research into the Dark Web and its various malefactors was especially useful in that case. Allison Nixon is director of security research at Flashpoint, a cyber intelligence firm based in New York City. Nixon spoke with KrebsOnSecurity at length about her perspectives on IoT security and the vital role of law enforcement in this fight.
Brian Krebs (BK): Where are we today with respect to IoT security? Are we better off than were a year ago, or is the problem only worse?
Allison Nixon (AN): In some aspects we’re better off. The arrests that happened over the last year in the DDoS space, I would call that a good start, but we’re not out of the woods yet and we’re nowhere near the end of anything.
BK: Why not?
AN: Ultimately, what’s going with these IoT botnets is crime. People are talking about these cybersecurity problems — problems with the devices, etc. — but at the end of the day it’s crime and private citizens don’t have the power to make these bad actors stop.
BK: Certainly security professionals like yourself and others can be diligent about tracking the worst actors and the crime machines they’re using, and in reporting those systems when it’s advantageous to do so?
AN: That’s a fair argument. I can send abuse complaints to servers being used maliciously. And people can write articles that name individuals. However, it’s still a limited kind of impact. I’ve seen people get named in public and instead of stopping, what they do is improve their opsec [operational security measures] and keep doing the same thing but just sneakier. In the private sector, we can frustrate things, but we can’t actually stop them in the permanent, sanctioned way that law enforcement can. We don’t really have that kind of control.
BK: How are we not better off?
AN: I would say that as time progresses, the community that practices DDoS and malicious hacking and these pointless destructive attacks get more technically proficient when they’re executing attacks, and they just become a more difficult adversary.
BK: A more difficult adversary?
AN: Well, if you look at the individuals that were the subject of the announcement this month, and you look in their past, you can see they’ve been active in the hacking community of a long time. Litespeed [the nickname used by Josiah White, one of the men who pleaded guilty to authoring Mirai] has been credited with lots of code.  He’s had years to develop and as far as I could tell he didn’t stop doing criminal activity until he got picked up by law enforcement.
BK: It seems to me that the Mirai authors probably would not have been caught had they never released the source code for their malware. They said they were doing so because multiple law enforcement agencies and security researchers were hot on their trail and they didn’t want to be the only ones holding the source code when the cops showed up at their door. But if that was really their goal in releasing it, doing so seems to have had the exact opposite effect. What’s your take on that?
AN: You are absolutely, 100 million percent correct. If they just shut everything down and left, they’d be fine now. The fact that they dumped the source was a tipping point of sorts. The damages they caused at that time were massive, but when they dumped the source code the amount of damage their actions contributed to ballooned [due to the proliferation of copycat Mirai botnets]. The charges against them specified their actions in infecting the machines they controlled, but when it comes to what interested researchers in the private sector, the moment they dumped the source code — that’s the most harmful act they did out of the entire thing.
BK: Do you believe their claimed reason for releasing the code?
AN: I believe it. They claimed they released it because they wanted to hamper investigative efforts to find them. The problem is that not only is it incorrect, it also doesn’t take into account the researchers on the other end of the spectrum who have to pick from many targets to spend their time looking at. Releasing the source code changed that dramatically. It was like catnip to researchers, and was just a new thing for researchers to look at and play with and wonder who wrote it.
If they really wanted to stay off law enforcement’s radar, they would be as low profile as they could and not be interesting. But they did everything wrong: They dumped the source code and attacked a security researcher using tools that are interesting to security researchers. That’s like attacking a dog with a steak. I’m going to wave this big juicy steak at a dog and that will teach him. They made every single mistake in the book.
BK: What do you think it is about these guys that leads them to this kind of behavior? Is it just a kind of inertia that inexorably leads them down a slippery slope if they don’t have some kind of intervention?
AN: These people go down a life path that does not lead them to a legitimate livelihood. They keep doing this and get better at it and they start to do these things that really can threaten the Internet as a whole. In the case of these DDoS botnets, it’s worrying that these individuals are allowed to go this deep before law enforcement catches them.
BK: There was a narrative that got a lot of play recently, and it was spun by a self-described Internet vigilante who calls himself “the Janitor.” He claimed to have been finding zero-day exploits in IoT devices so that he could shut down insecure IoT things that can’t really be secured before or maybe even after they have been compromised by IoT threats like Mirai. The Janitor says he released a bunch of his code because he’s tired of being the unrecognized superhero that he is, and many in the media seem to have eaten this up and taken his manifesto as gospel. What’s your take on the Janitor, and his so-called “bricker bot” project?
AN: I have to think about how to choose my words, because I don’t want to give anyone bad ideas. But one thing to keep in mind is that his method of bricking IoT devices doesn’t work, and it potentially makes the problem worse.
BK: What do you mean exactly?
AN: The reason is sometimes IoT malware like Mirai will try to close the door behind it, by crashing the telnet process that was used to infect the device [after the malware is successfully installed]. This can block other telnet-based malware from getting on the machine. And there’s a lot of this type of King of the Hill stuff going on in the IoT ecosystem right now.
But what [this bricker bot] malware does is a lot times it reboots a machine, and when the device is in that state the vulnerable telnet service goes back up. It used to be a lot of devices were infected with the very first Mirai, and when the [control center] for that botnet went down they were orphaned. We had a bunch of Mirai infections phoning home to nowhere. So there’s a real risk of taking the machine that was in the this weird state and making it vulnerable again.
BK: Hrm. That’s a very different story from the one told by the Bricker bot author. According to him, he spent several years of his life saving the world from certain doom at the hands of IoT devices. He even took credit for foiling the Mirai attacks on Deutsche Telekom. Could this just be a case of researcher exaggerating his accomplishments? Do you think his Bricker bot code ever really spread that far?
AN: I don’t have any evidence that there was mass exploitation by Bricker bot. I know his code was published. But when I talk to anyone running an IoT honeypot [a collection of virtual or vulnerable IoT devices designed to attract and record novel attacks against the devices] they have never seen it. The consensus is that regardless of peoples’ opinion on it we haven’t seen it in our honeypots. And considering the diversity of IoT honeypots out there today, if it was out there in real life we would have seen it by now.
BK: A lot of people believe that we’re focusing on the wrong solutions to IoT security — that having consumers lock down IoT devices security-wise or expecting law enforcement agencies to fix this problem for us for me are pollyannish ideas that in any case don’t address the root cause: Which is that there are a lot of companies producing crap IoT products that have virtually no security. What’s your take?
AN: The way I approach this problem is I see law enforcement as the ultimate end goal for all of these efforts. When I look at the IoT DDoS activity and the actual human beings doing this, the vast majority of Mirai attacks, attack infrastructure, malware variants and new exploits are coming from a vast minority of people doing this. That said, the way I perceive the underground ecosystem is probably different than the way most people perceive it.
BK: What’s the popular perception, do you think?
AN: It’s that, “Oh hey, one guy got arrested, great, but another guy will just take his place.” People compare it to a drug dealer on the street corner, but I don’t think that’s accurate in this case. The difference is when you’re looking at advanced criminal hacking campaigns, there’s not usually a replacement person waiting in the wings. These are incredibly deep skills developed over years. The people doing innovations in DDoS attacks and those who are driving the field forward are actually very few. So when you can ID them and attach behavior to the perpetrator, you realize there’s only a dozen people I need to care about and the world suddenly becomes a lot smaller.
BK: So do you think the efforts to force manufacturers to harden their products are a waste of time?
AN: I want to make it clear that all these different ways to tackle the problem…I don’t want to say one is more important than the other. I just happened to be working on one component of it. There’s definitely a lot of disagreement on this. I totally recognize this as a legitimate approach. A lot of people think the way forward is to focus on making sure the devices are secure. And there are efforts ongoing to help device manufacturers create more secure devices that are more resistant to these efforts.
And a lot is changing, although slowly. Do you remember way back when you bought a Wi-Fi router and it was open by default? Because the end user was obligated to change the default password, we had open Wi-Fi networks everywhere. As years passed, many manufacturers started making them more secure. For example, many of these devices now have customers refer to sticker on the machine that has a unique Wi-Fi password. That type of shift may be an example of what we can see in the future of IoT security.
BK: In the wake of the huge attacks from Mirai in 2016 and 2017, several lawmakers have proposed solutions. What do you think of the idea that it doesn’t matter what laws we pass in the United States that might require more security by IoT makers, that those makers are just going to keep on ignoring best practices when it comes to security?
AN: It’s easy to get cynical about this and a lot of people definitely feel like these these companies don’t sell directly to the U.S. and therefore don’t care about such efforts. Maybe in the short term that might be true, but in the long term I think it ends up biting them if they continue to not care.
Ultimately, these things just catch up with you if you have a reputation for making a poor product. What if you had a reputation for making a device that if you put it on the Internet it would reboot every five minutes because it’s getting attacked? Even if we did enact security requirements for IoT that manufacturers not in the U.S. wouldn’t have to follow, it would still in their best interests to care, because they are going to care sooner or later.
BK: I was on a Justice Department conference call with other journalists on the day they announced the Mirai author arrests and guilty pleas, and someone asked why this case was prosecuted out of Alaska. The answer that came back was that a great many of the machines infected with Mirai were in Alaska. But it seems more likely that it was because there was an FBI agent there who decided this was an important case but who actually had a very difficult time finding enough infected systems to reach the threshold needed to prosecute the case. What’s your read on that?
AN: I think that this case is probably going to set precedent in terms of the procedures and processes used to go after cybercrime. I’m sure you finished reading The Wired article about the Alaska investigation into Mirai: It goes in to detail about some of the difficult things that the Alaska FBI field office had to do to satisfy the legal requirements to take the case. Just to prove they had jurisdiction, they had to find a certain number of infected machines in Alaska.
Those were not easy to find, and in fact the FBI traveled far and wide in order to find these machines in Alaska. There are all kinds of barriers big and small that slow down the legal process for prosecuting cases like this, some of which are legitimate and some that I think are going to end up being streamlined after a case like this. And every time a successful case like this goes through [to a guilty plea], it makes it more possible for future cases to succeed.
This one group [that was the subject of the Mirai investigation] was the worst of the worst in this problem area. And right now it’s a huge victory for law enforcement to take down one group that is the worst of the worst in one problem area. Hopefully, it will lead to the takedown of many groups causing damage and harming people.
But the concept that in order for cybercriminals to get law enforcement attention they need to make international headlines and cause massive damage needs to change. Most cybercriminals probably think that what they’re doing nobody is going to notice, and in a sense they’re correct because there is so much obvious criminal activity blatantly connected to specific individuals. And that needs to change.
BK: Is there anything we didn’t talk about related to IoT security, the law enforcement investigations into Mirai, or anything else you’d like to add?
AN: I want to extend my gratitude to the people in the security industry and network operator community who recognized the gravity of this threat early on. There are a lot of people who were not named [in the stories and law enforcement press releases about the Mirai arrests], and want to say thank you for all the help. This couldn’t have happened without you.
from Technology News https://krebsonsecurity.com/2018/01/expert-iot-botnets-the-work-of-a-vast-minority/
0 notes
jennifersnyderca90 · 7 years ago
Text
Expert: IoT Botnets the Work of a ‘Vast Minority’
In December 2017, the U.S. Department of Justice announced indictments and guilty pleas by three men in the United States responsible for creating and using Mirai, a malware strain that enslaves poorly-secured “Internet of Things” or IoT devices like security cameras and digital video recorders for use in large-scale cyberattacks.
The FBI and the DOJ had help in their investigation from many security experts, but this post focuses on one expert whose research into the Dark Web and its various malefactors was especially useful in that case. Allison Nixon is director of security research at Flashpoint, a cyber intelligence firm based in New York City. Nixon spoke with KrebsOnSecurity at length about her perspectives on IoT security and the vital role of law enforcement in this fight.
Brian Krebs (BK): Where are we today with respect to IoT security? Are we better off than were a year ago, or is the problem only worse?
Allison Nixon (AN): In some aspects we’re better off. The arrests that happened over the last year in the DDoS space, I would call that a good start, but we’re not out of the woods yet and we’re nowhere near the end of anything.
BK: Why not?
AN: Ultimately, what’s going with these IoT botnets is crime. People are talking about these cybersecurity problems — problems with the devices, etc. — but at the end of the day it’s crime and private citizens don’t have the power to make these bad actors stop.
BK: Certainly security professionals like yourself and others can be diligent about tracking the worst actors and the crime machines they’re using, and in reporting those systems when it’s advantageous to do so?
AN: That’s a fair argument. I can send abuse complaints to servers being used maliciously. And people can write articles that name individuals. However, it’s still a limited kind of impact. I’ve seen people get named in public and instead of stopping, what they do is improve their opsec [operational security measures] and keep doing the same thing but just sneakier. In the private sector, we can frustrate things, but we can’t actually stop them in the permanent, sanctioned way that law enforcement can. We don’t really have that kind of control.
BK: How are we not better off?
AN: I would say that as time progresses, the community that practices DDoS and malicious hacking and these pointless destructive attacks get more technically proficient when they’re executing attacks, and they just become a more difficult adversary.
BK: A more difficult adversary?
AN: Well, if you look at the individuals that were the subject of the announcement this month, and you look in their past, you can see they’ve been active in the hacking community of a long time. Litespeed [the nickname used by Josiah White, one of the men who pleaded guilty to authoring Mirai] has been credited with lots of code.  He’s had years to develop and as far as I could tell he didn’t stop doing criminal activity until he got picked up by law enforcement.
BK: It seems to me that the Mirai authors probably would not have been caught had they never released the source code for their malware. They said they were doing so because multiple law enforcement agencies and security researchers were hot on their trail and they didn’t want to be the only ones holding the source code when the cops showed up at their door. But if that was really their goal in releasing it, doing so seems to have had the exact opposite effect. What’s your take on that?
AN: You are absolutely, 100 million percent correct. If they just shut everything down and left, they’d be fine now. The fact that they dumped the source was a tipping point of sorts. The damages they caused at that time were massive, but when they dumped the source code the amount of damage their actions contributed to ballooned [due to the proliferation of copycat Mirai botnets]. The charges against them specified their actions in infecting the machines they controlled, but when it comes to what interested researchers in the private sector, the moment they dumped the source code — that’s the most harmful act they did out of the entire thing.
BK: Do you believe their claimed reason for releasing the code?
AN: I believe it. They claimed they released it because they wanted to hamper investigative efforts to find them. The problem is that not only is it incorrect, it also doesn’t take into account the researchers on the other end of the spectrum who have to pick from many targets to spend their time looking at. Releasing the source code changed that dramatically. It was like catnip to researchers, and was just a new thing for researchers to look at and play with and wonder who wrote it.
If they really wanted to stay off law enforcement’s radar, they would be as low profile as they could and not be interesting. But they did everything wrong: They dumped the source code and attacked a security researcher using tools that are interesting to security researchers. That’s like attacking a dog with a steak. I’m going to wave this big juicy steak at a dog and that will teach him. They made every single mistake in the book.
BK: What do you think it is about these guys that leads them to this kind of behavior? Is it just a kind of inertia that inexorably leads them down a slippery slope if they don’t have some kind of intervention?
AN: These people go down a life path that does not lead them to a legitimate livelihood. They keep doing this and get better at it and they start to do these things that really can threaten the Internet as a whole. In the case of these DDoS botnets, it’s worrying that these individuals are allowed to go this deep before law enforcement catches them.
BK: There was a narrative that got a lot of play recently, and it was spun by a self-described Internet vigilante who calls himself “the Janitor.” He claimed to have been finding zero-day exploits in IoT devices so that he could shut down insecure IoT things that can’t really be secured before or maybe even after they have been compromised by IoT threats like Mirai. The Janitor says he released a bunch of his code because he’s tired of being the unrecognized superhero that he is, and many in the media seem to have eaten this up and taken his manifesto as gospel. What’s your take on the Janitor, and his so-called “bricker bot” project?
AN: I have to think about how to choose my words, because I don’t want to give anyone bad ideas. But one thing to keep in mind is that his method of bricking IoT devices doesn’t work, and it potentially makes the problem worse.
BK: What do you mean exactly?
AN: The reason is sometimes IoT malware like Mirai will try to close the door behind it, by crashing the telnet process that was used to infect the device [after the malware is successfully installed]. This can block other telnet-based malware from getting on the machine. And there’s a lot of this type of King of the Hill stuff going on in the IoT ecosystem right now.
But what [this bricker bot] malware does is a lot times it reboots a machine, and when the device is in that state the vulnerable telnet service goes back up. It used to be a lot of devices were infected with the very first Mirai, and when the [control center] for that botnet went down they were orphaned. We had a bunch of Mirai infections phoning home to nowhere. So there’s a real risk of taking the machine that was in the this weird state and making it vulnerable again.
BK: Hrm. That’s a very different story from the one told by the Bricker bot author. According to him, he spent several years of his life saving the world from certain doom at the hands of IoT devices. He even took credit for foiling the Mirai attacks on Deutsche Telekom. Could this just be a case of researcher exaggerating his accomplishments? Do you think his Bricker bot code ever really spread that far?
AN: I don’t have any evidence that there was mass exploitation by Bricker bot. I know his code was published. But when I talk to anyone running an IoT honeypot [a collection of virtual or vulnerable IoT devices designed to attract and record novel attacks against the devices] they have never seen it. The consensus is that regardless of peoples’ opinion on it we haven’t seen it in our honeypots. And considering the diversity of IoT honeypots out there today, if it was out there in real life we would have seen it by now.
BK: A lot of people believe that we’re focusing on the wrong solutions to IoT security — that having consumers lock down IoT devices security-wise or expecting law enforcement agencies to fix this problem for us for me are pollyannish ideas that in any case don’t address the root cause: Which is that there are a lot of companies producing crap IoT products that have virtually no security. What’s your take?
AN: The way I approach this problem is I see law enforcement as the ultimate end goal for all of these efforts. When I look at the IoT DDoS activity and the actual human beings doing this, the vast majority of Mirai attacks, attack infrastructure, malware variants and new exploits are coming from a vast minority of people doing this. That said, the way I perceive the underground ecosystem is probably different than the way most people perceive it.
BK: What’s the popular perception, do you think?
AN: It’s that, “Oh hey, one guy got arrested, great, but another guy will just take his place.” People compare it to a drug dealer on the street corner, but I don’t think that’s accurate in this case. The difference is when you’re looking at advanced criminal hacking campaigns, there’s not usually a replacement person waiting in the wings. These are incredibly deep skills developed over years. The people doing innovations in DDoS attacks and those who are driving the field forward are actually very few. So when you can ID them and attach behavior to the perpetrator, you realize there’s only a dozen people I need to care about and the world suddenly becomes a lot smaller.
BK: So do you think the efforts to force manufacturers to harden their products are a waste of time?
AN: I want to make it clear that all these different ways to tackle the problem…I don’t want to say one is more important than the other. I just happened to be working on one component of it. There’s definitely a lot of disagreement on this. I totally recognize this as a legitimate approach. A lot of people think the way forward is to focus on making sure the devices are secure. And there are efforts ongoing to help device manufacturers create more secure devices that are more resistant to these efforts.
And a lot is changing, although slowly. Do you remember way back when you bought a Wi-Fi router and it was open by default? Because the end user was obligated to change the default password, we had open Wi-Fi networks everywhere. As years passed, many manufacturers started making them more secure. For example, many of these devices now have customers refer to sticker on the machine that has a unique Wi-Fi password. That type of shift may be an example of what we can see in the future of IoT security.
BK: In the wake of the huge attacks from Mirai in 2016 and 2017, several lawmakers have proposed solutions. What do you think of the idea that it doesn’t matter what laws we pass in the United States that might require more security by IoT makers, that those makers are just going to keep on ignoring best practices when it comes to security?
AN: It’s easy to get cynical about this and a lot of people definitely feel like these these companies don’t sell directly to the U.S. and therefore don’t care about such efforts. Maybe in the short term that might be true, but in the long term I think it ends up biting them if they continue to not care.
Ultimately, these things just catch up with you if you have a reputation for making a poor product. What if you had a reputation for making a device that if you put it on the Internet it would reboot every five minutes because it’s getting attacked? Even if we did enact security requirements for IoT that manufacturers not in the U.S. wouldn’t have to follow, it would still in their best interests to care, because they are going to care sooner or later.
BK: I was on a Justice Department conference call with other journalists on the day they announced the Mirai author arrests and guilty pleas, and someone asked why this case was prosecuted out of Alaska. The answer that came back was that a great many of the machines infected with Mirai were in Alaska. But it seems more likely that it was because there was an FBI agent there who decided this was an important case but who actually had a very difficult time finding enough infected systems to reach the threshold needed to prosecute the case. What’s your read on that?
AN: I think that this case is probably going to set precedent in terms of the procedures and processes used to go after cybercrime. I’m sure you finished reading The Wired article about the Alaska investigation into Mirai: It goes in to detail about some of the difficult things that the Alaska FBI field office had to do to satisfy the legal requirements to take the case. Just to prove they had jurisdiction, they had to find a certain number of infected machines in Alaska.
Those were not easy to find, and in fact the FBI traveled far and wide in order to find these machines in Alaska. There are all kinds of barriers big and small that slow down the legal process for prosecuting cases like this, some of which are legitimate and some that I think are going to end up being streamlined after a case like this. And every time a successful case like this goes through [to a guilty plea], it makes it more possible for future cases to succeed.
This one group [that was the subject of the Mirai investigation] was the worst of the worst in this problem area. And right now it’s a huge victory for law enforcement to take down one group that is the worst of the worst in one problem area. Hopefully, it will lead to the takedown of many groups causing damage and harming people.
But the concept that in order for cybercriminals to get law enforcement attention they need to make international headlines and cause massive damage needs to change. Most cybercriminals probably think that what they’re doing nobody is going to notice, and in a sense they’re correct because there is so much obvious criminal activity blatantly connected to specific individuals. And that needs to change.
BK: Is there anything we didn’t talk about related to IoT security, the law enforcement investigations into Mirai, or anything else you’d like to add?
AN: I want to extend my gratitude to the people in the security industry and network operator community who recognized the gravity of this threat early on. There are a lot of people who were not named [in the stories and law enforcement press releases about the Mirai arrests], and want to say thank you for all the help. This couldn’t have happened without you.
from https://krebsonsecurity.com/2018/01/expert-iot-botnets-the-work-of-a-vast-minority/
0 notes
lorrainecparker · 7 years ago
Text
A selection of video and photo monitors for 2018
Video editors and photographers need high quality monitors to clearly visualize their work, but that does not mean they need to spend a fortune on their next monitor. Here are some monitors you should probably check.
The best advice when buying a monitor is… don’t buy from catalog. In fact, no matter how much you read reviews and check online videos, you should always try to see the real monitor before buying it. If a monitor is an essential element of your work, you’ll be starting at it for many hours, so having a monitor that you feel comfortable with is the first step. It’s not just the colour, brightness, detail, it’s everything else, from the way the display can be tilted, turned around, to the interface and controls.
Resolution continues to be an essential element when choosing a monitor, but when buying a monitor it is important to know if the system it is going to be used with can cope with higher resolutions. While having more desktop space is always a good thing, there has to be a compromise between that and the power the computer/graphics card has. The Philips 328P6AUBREB mentioned in a previous article is an example of compromise, has it has a resolution of 2560×1440 on a 32 inch screen, when most guides will suggest that a 32 inch screen should have 3840×2160, or 4K UHD. Both are 16:9, which is somehow the most common aspect ratio, but there is a difference. It’s up to you to decide EXACTLY your needs.
Whatever you do, buying the biggest size you can use on your desktop is a good solution. When it comes to size, unless you need a monitor you can easily take with you, 27-inch monitors seem to be the smallest acceptable, according to some. 27-inch with a resolution of 2560×1440 (WQHD) are, apparently, the “norm”. You’ll also find some 24-inch monitors with the same resolution – and others, like the 32-inch from Philips – but usually screen size and resolution go hand-in-hand, meaning a 27-inch is 2560×1440, a 30 or 32-inch is 3840×2160 or, in extreme cases, the DCI 4K, that’s 4096×2160.
In terms of panels, IPS, which stands for In-Plane Switching,  is considered the way to go. It comes in different flavours and under different names, but as long as the panel is IPS, color reproduction will be good enough for professional work. Colour being an essential aspect, the color gamut covered is also a key element to check. Most monitors will claim they offer at least 99% SRGB colour gamut, which is fine for a lot of work, but look for 99% Adobe RGB or beyond if available. Monitors supporting wide gamut RGB cost more.
This guide does not pretend to be exhaustive, more a compilation of suggestions that may help you find a solution if you’re after your first monitor or, like me, you’re looking for a replacement to a dying monitor.
NEC MultiSync PA243W for $949
NEC recently updated the PA242W, one of its “most popular professional wide color gamut desktop displays,” according to Art Marshall, Senior Product Manager for Desktop Displays at NEC Display Solutions. The new monitor, reference PA243W, offers “new cutting-edge features have been added to provide improved color coverage to meet the color-critical needs of the print production, digital photography, photo editing, and video production markets, among others.”
The MultiSync PA243W has a 24.1″ IPS panel with LED backlight with a great viewing angle and anti-glare matte finish. Its premium color accuracy is ideal for color-critical workflows and in photography, video, printing and other professional environments. It increases Rec. 2020 coverage and boosts color accuracy to an impressive 99.6 percent of Adobe RGB, according to NEC. One note: this is a 24-inch 1920 x 1200 monitor, offering a 16:10 aspect ratio.
This model offers multiple connections for any application: a fast USB 3.1 hub featuring DisplaySync Pro KVM switch for managing multiple computers, plus DisplayPort, DVI-D, VGA and HDMI. With a 31 percent slimmer design than the previous model as well as integrated speakers and a new Low Blue Light setting.
The PA243W-BK with a black cabinet is available at a minimum advertised price of $949, and a white cabinet (PA243W) is also available. In addition, both colors are available bundled with NEC’s award-winning SpectraViewII color calibration software and sensors as PA243W-SV (white) and PA243W-BK-SV (black) at a price of $1,199.
ViewSonic VP2785-4K for $989
Color accuracy, with 99 percent Adobe RBG and 98 percent DCI-P3 colors, brightness, chromaticity and tone  stabilized in mere minutes are some of the features of the new 27-inch 4K UHD (3840×2160) monitor from ViewSonic.
Built to deliver, says the company,  unmatched color accuracy for professional color-critical applications, the ViewSonic VP2785-4K ensures vibrant and intense color reproduction, making this monitor the perfect display solution for photographers, video and content producers and editors.
With a built-in backlight sensor, the VP2785-4K can stabilize color in just three minutes, maintaining Adobe RGB and sRGB brightness stability for longer periods of time. Instead of the typical 30 plus minutes for a monitor to stabilize its brightness, chromaticity, and tone characteristics, the VP2785-4K has shortened the warm-up time to mere minutes.
From Broadcast and Cinema Presets for EBU, Rec.709, SMPTE-C and DCI with ready color spaces and gamma values, as well as Film Mode for smoother video playback, the VP2785-4K also supports HDR10 (High Dynamic Range) content decoding and playback. Skilled creative professionals will appreciate the built-in ambient light sensor, presence sensor, and KVM switch, which provide superior screen performance.
“The ViewSonic VP2785-4K was built for the professional photographer, content creator, videographer, graphic artist, or anyone that deals with color critical applications,” said Kenneth Mau, senior product marketing manager at ViewSonic Americas. “With the VP2785-4K, we offer color uniformity and accuracy. From a 10-bit panel, 14-bit LUT and 6 Axis color adjustability, connectivity options, a frameless design and newly designed ergonomic stand, this monitor delivers color coverage and output performance. The VP2785-4K is ideal for MacBook work stations or environments that need reliable color representation and image performance that is compatible with Type-C connectivity and 4K content.”
Philips 328P6AUBREB for $499
The 32-inch 2560×1440 monitor from Philips may not suite those aspiring for 4K, but is, nonetheless, an option to consider if you want to have more working space but do not have a computer ready to go all the way to higher resolutions. The compromise of WQHD on a 32-inch display may not be for everybody, but photographers or even videographers not working on 4K might consider this, also because of its price.
According to Philips, with 99% Adobe RGB and 100% sRGB (CIE 1973), the 328P6AUBREB offers professional colour standards and 2560 x 1440 pixels deliver crystal-clear images and makes graphics come alive. Thanks to IPS technology, the monitor can be viewed from an angle of 178° without losing any of the colour accuracy or consistent brightness that professional applications demand.
Follow the link for more information about the Philips 328P6AUBREB.
Acer ProDesigner PE320QK for $1199
Introduced this month in the United States, the Acer ProDesigner PE320QK is a 31.5-inch monitor offering 4K UHD (3840 x 2160) visuals, precise color reproduction and an adjustable shading hood to meet the needs of photographers, video editors and graphic designers.
“Engineered for professionals who require the most exacting quality standards, our latest ProDesigner monitor offers the most accurate color available today,” said Ronald Lau, director – stationary computing. “We’re confident animators, film producers and other creative experts will be delighted with the performance the Acer ProDesigner PE320QK affords.”
The Acer ProDesigner PE320QK touts a color depth of 1.07 billion colors. Boasting Delta E<1 color accuracy, the smallest color difference the eye can see, this premium monitor enables graphics professionals to fine-tune images with optimal precision. It covers 130 percent of the sRGB color standard for storing, producing and presenting a wide range of hues. Video editors, animators and directors will appreciate that it covers 95 percent of the DCI-P3 color space, the standard format for HDTVs. It ensures every hue is authentically represented, critical during post-production work and color-critical projects. Boasting 6-axis color adjustment, it lets pros obtain the exact shade they prefer by providing the ability to adjust hue and saturation, while super sharpness technology optimizes the quality of even low resolution images by slightly enhancing the edges.
An adjustable three-sided shading hood with anti-glare material reduces screen glare from ambient light, so subtleties of color can be viewed. To suit the needs of the moment, the side panels can be swiveled wider or narrower, while the upper panel can be removed.
The Acer ProDesigner PE320QK has two 2W speakers and comes with a powerful USB-C port delivering ultra-fast data and high-res video transfer with just one port. Boasting an output of 85W, it can easily charge smartphones and other devices. Other options include two HDMI 2.0 with one offering MHL 2.1, DisplayPort 1.2, audio out and a USB 3.0 hub x4 (1 up/ 4 down) for connecting to a wide array of laptops and desktops. Estimated selling prices begin at $1199.
BenQ PD2710QC for $599
The first BenQ  monitor with USB-C Docking Station is also a solution for professionals, as it offers 100% sRGB and Rec.709 color spaces and a wide viewing angle. The BenQ PD2710QC is Technicolor Color Certified, ensuring consistent and accurate colors for an impressive color performance, says the company.
The BenQ Designer Monitor PD2710QC is a 27″ 2K QHD (2560×1440) monitor, the first from the company to offer a range of connectivity options without having the inconvenience of cables and a separate docking station. With Darkroom, CAD/CAM and Animation display modes, the monitor can be adjusted to your specific needs.  In Animation mode, the brightness on dark areas of the image is enhanced without over-exposing bright image areas, with 10 levels of display brightness available so you can see every detail clearly in any ambient lighting. Darkroom mode adjusts the brightness and contrast of images giving clarity and sharpness to details, creating the optimal setting for work in darker post-processing environments.
The monitor supports Eye-care technology and the screen can be shared through desktop partition. With BenQ’s proprietary Display Pilot software it is possible to split your screen into multiple windows.
HP DreamColor for $559 or $3999
Introduced at NAB 2017, the HP DreamColor Z31x Studio and HP DreamColor Z24x G2 displays offer artists, photographers and filmmakers the right monitors to do what they do best – create – without having to worry about lackluster display performance. They come in two packages.
The DreamColor HP Z24x G2 is HP’s most affordable DreamColor display and an example that you don’t need to pay thousands of dollars to get a monitor that delivers the color accuracy and consistency that has become synonymous with the HP DreamColor brand. HP says that this display allows every artist to have a professional color accurate display on their desks.
The 24-inch IPS panel offers a 1920 x 1200 resolution (16:10 aspect ratio), wide viewing angle, 8-bit+FRC colour depth and a colour gamut covering 100% sRGB, 100% BT.709, 99% Adobe RGB and 96% DCI-P3.     Pure, consistent color accuracy from design to production with color calibration on the amazingly affordable display are promised, and calibration software for both Windows and macOS supporting both the X-Rite i1Display Pro and the Klein Instruments K10-A colorimeters. The price is $559.
The HP DreamColor Z31x Studio , which aims for the other end of the scale, is not yet available, so it may be difficult to get it in time for Christmas. The 31-inch IPS panel features DCI 4K, that’s 4096 x 2160 resolution, while offering true 10-bit colour depth and a colour gamut covering 100% sRGB, 100% BT.709, 100% Adobe RGB, 99% DCI-P3 and 80% BT.2020.
“From the purest black to the most vivid rainbow of colors, our new DreamColor display for Cinema sets the gold standard for color accuracy and ease-of-use at a disruptive price point to outshine the competition,” said Josh Peterson, vice president of product management Z Workstations, HP Inc. “The new DreamColor Z Displays will be a gamechanger for studios and digital creatives who rely on color-critical accuracy and extreme performance.”
Offering precise image quality from any viewing angle, reliable and accurate color with an advanced built-in colorimeter capable of measuring and adjusting on-screen performance automatically or at scheduled intervals or on demand, and workflow accelerating features that allow users to create in Cinema 4K resolution, view in True 2K, and speed projects from concept to completion with onscreen markers and keyboard-based input switching between devices, the HP Z31x DreamColor Studio Display will cost, when available, somewhere close to $3999.
Final notes
This guide to some of the options available or soon to be available on the market may be all you need to start your own search for a new monitor. Previous articles published here at ProVideo Coalition throughout the year may  give you some more suggestions, so we link to some of those articles.
BenQ AQCOLOUR: new technology for professional monitors
BenQ debuts professional line of monitors factory-calibrated
ASUS: two new HDR monitors
ViewSonic: new professional monitors
A  quick guide to choose your next monitor
The post A selection of video and photo monitors for 2018 appeared first on ProVideo Coalition.
First Found At: A selection of video and photo monitors for 2018
0 notes