Trending Middle East brings you the latest social media and search trends from the Middle East and around the world.
On today’s episode, boosting economic ties will top the agenda during Turkish president Recep Tayyip Erdogan’s visit to the Gulf this week.
Diplomatic efforts to find a peaceful end to Sudan's three-month war are experiencing a revival amid a flurry of top-level contacts and fighting.
An operation to recover 1.14 million barrels of oil from a rusting oil tanker in the Red Sea, described by experts as “a ticking time bomb”, began on Sunday.
Carlos Alcaraz defeated Novak Djokovic in Wimbledon final after a five-set thriller at the All England Club.
'Cheb%20Khaled'
Electoral College Victory
Trump has so far secured 295 Electoral College votes, according to the Associated Press, exceeding the 270 needed to win. Only Nevada and Arizona remain to be called, and both swing states are leaning Republican. Trump swept all five remaining swing states, North Carolina, Georgia, Pennsylvania, Michigan and Wisconsin, sealing his path to victory and giving him a strong mandate.
Popular Vote Tally
The count is ongoing, but Trump currently leads with nearly 51 per cent of the popular vote to Harris’s 47.6 per cent. Trump has over 72.2 million votes, while Harris trails with approximately 67.4 million.
Kanguva
CREW
While you're here
Gavin Esler: Will 2021 be Boris Johnson's worst year?
Thomas Harding: US relations with Europe could change
Brodie Owen: How England’s new lockdown rules work
The specs
Company info
Company name: Entrupy
Co-founders: Vidyuth Srinivasan, co-founder/chief executive, Ashlesh Sharma, co-founder/chief technology officer, Lakshmi Subramanian, co-founder/chief scientist
Based: New York, New York
Sector/About: Entrupy is a hardware-enabled SaaS company whose mission is to protect businesses, borders and consumers from transactions involving counterfeit goods.
Initial investment/Investors: Entrupy secured a $2.6m Series A funding round in 2017. The round was led by Tokyo-based Digital Garage and Daiwa Securities Group's jointly established venture arm, DG Lab Fund I Investment Limited Partnership, along with Zach Coelius.
Total customers: Entrupy’s customers include hundreds of secondary resellers, marketplaces and other retail organisations around the world. They are also testing with shipping companies as well as customs agencies to stop fake items from reaching the market in the first place.
From Zero
Artist: Linkin Park
Label: Warner Records
Number of tracks: 11
Rating: 4/5
COMPANY%20PROFILE
Citadel: Honey Bunny first episode
Directors: Raj & DK
Stars: Varun Dhawan, Samantha Ruth Prabhu, Kashvi Majmundar, Kay Kay Menon
Rating: 4/5
COMPANY%20PROFILE
How Alia's experiment will help humans get to Mars
Alia’s winning experiment examined how genes might change under the stresses caused by being in space, such as cosmic radiation and microgravity.
Her samples were placed in a machine on board the International Space Station. called a miniPCR thermal cycler, which can copy DNA multiple times.
After the samples were examined on return to Earth, scientists were able to successfully detect changes caused by being in space in the way DNA transmits instructions through proteins and other molecules in living organisms.
Although Alia’s samples were taken from nematode worms, the results have much bigger long term applications, especially for human space flight and long term missions, such as to Mars.
It also means that the first DNA experiments using human genomes can now be carried out on the ISS.
Plastic tipping point
COMPANY PROFILE
Our legal consultants
Name: Hassan Mohsen Elhais
Position: legal consultant with Al Rowaad Advocates and Legal Consultants.
More from Neighbourhood Watch:
Know your cyber adversaries
Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.
Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.
Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.
Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.
Phishing: Aims to secure personal information, such as passwords and credit card numbers.
Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.
Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.
Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.
Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.
Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.
Zero-day exploit: Exploits a vulnerability in software before a fix is found.