Share Facebook Twitter Google + LinkedIn Pinterest Due to concerns for production costs, safety, and the environment, it is important to maximize the pesticide deposit on the target. One of the major problems challenging pesticide applicators is spray drift, which is defined as movement of pesticides by wind from the application site to an off-target site. Spray drift accounts for about half of all non-compliance cases investigated by the Ohio Department of Agriculture. Spray drift not only result in wasting expensive pesticides and pollution of the environment, it may damage non-target crops nearby, and poses a serious health risk to people living in areas where drift is occurring.Although complete elimination of spray drift is impossible, problems can be reduced significantly if you are aware of major factors that influence drift and take precautions to minimize their influence on off-target movement of droplets. The factors that play a role in either the creation, or reduction of spray drift are: a) Spray characteristics, such as volatility and viscosity of pesticide formulation; b) Equipment and application techniques used for spraying pesticides; c) Weather conditions at the time of application (wind speed and direction, temperature, relative humidity and stability of air around the application site); and most importantly, d) Operator care, attitude, and skill. Here are five cost-effective tips to vegetable producers on how to minimize spray drift. 1. If you can, keep your nozzles as close to the target as possible while still producing a uniform distribution of spray on the target. This doesn’t cost any money as long as it is practical to make it happen.2. When you’re ready to change nozzles, consider selecting nozzles that produce much fewer of the extremely small droplets that are most likely to drift away. Low-drift nozzles are in the market and do a tremendous job of eliminating extremely small, drift-prone droplets from the droplet spectrum.3. There are chemicals sold in the market that are designed to increase the droplet size, and reduce the number of very small droplets when added into the spray mixture. Most of them are some sort of polymer that tends to increase the viscosity and density of the spray mixture which leads to larger droplets. This, however, should be the last defense against drift. First consider the other option such as better targeting of the spray and switching to low-drift nozzles.4. Use shields that cover partially or fully the distance between the target and the nozzles. There are companies manufacturing and selling such attachments to the boom. Shields prevent small droplets from moving away from the immediate application area. This, however, may not be practical for sprayers with extremely large booms.5. If there any any doubts about a spraying job that might result in drift, wait until there is no longer that element of doubt. Always pay attention to wind direction and magnitude. The best investment you can make is to buy a wind meter that tells you how high the wind velocity is at any given time. Having a wind meter handy will help you avoid a costly problem associated with spray drift.More detailed discussion on these tips and other drift reduction strategies are outlined in following OSUE Extension Fact Sheets available online:FABE-525 (http://ohioline.osu.edu/factsheet/fabe-525),FABE- 523 (http://ohioline.osu.edu/factsheet/fabe-523), andFABE 524 (http://ohioline.osu.edu/factsheet/fabe-524). Erdal Ozkan, Professor and Extension agricultural engineer, can be reached at 614-292-3006, or email@example.com. This column is provided by the OSU Department of Food, Agricultural and Biological Engineering, OSU Extension, Ohio Agricultural Research & Development Center, and the College of Food, Agricultural and Environmental Sciences.
Related Posts 8 Best WordPress Hosting Solutions on the Market Why Tech Companies Need Simpler Terms of Servic… We’re very pleased to announce the launch of ReadWriteWeb’s third country channel: ReadWriteWeb Brazil. It joins our existing two country channels, France and China. ReadWriteWeb Brazil is written in the Portuguese language, one of the world’s major languages with up to 230 million native speakers. Brazil has by far the largest online population in Latin America, with an estimated 26.2 Million users of age 15 or more (according to comScore).Our Brazil channel is edited by Diego Gomes. Diego and his team will combine translation of ReadWriteWeb posts with original posts about Brazil’s emerging Web market. Like the mothership ReadWriteWeb, the Brazil channel will focus on Web trends and products.The site’s original content will cover local businesses and applications, where appropriate comparing them with the rest of the world. The Brazil team is also preparing a series about how web usage in Brazil is completely different from the US and Europe. To find out about the state of the Internet in Brazil, check out the comScore presentation embedded below.ReadWriteWeb has a natural affinity for the international Web – after all, the company was founded by a New Zealander (yours truly)! For more context about our global strategy, read Bernard Lunn’s post Do You Speak Global Innovation?.RWW Brazil Sponsor OpportunitiesReadWriteWeb Brazil already has two key sponsors, who we’d like to thank here:UOL HOST, the top .comdomain registrar in Brazil and a provider of quality web hosting, e-commerce, e-mailmarketing and data center services. PagSeguro, the leadingBrazilian online payments and money transfer service. It allows usersto send and receive payments via e-mail or using credit cards, bankaccount transfers or bank payment slip.If you’re a Brazilian Internet company or an international company seeking to reach an influential readership in Brazil, please contact the RWW Brazil editor to find out about their sponsor and partner opportunities.Brazil’s Web MarketWe last wrote about the Brazil web market back in September 2006, at a time when Brazilians were 70% of the user base of Google’s social network Orkut. We noted at the time that Brazilian Web users had a special affinity for community, which was reflected in the web apps that were popular in Brazil at that time. For an up-to-date review of Brazil’s web market, check out this presentation by comScore: richard macmanus Tags:#Admin#international#web Top Reasons to Go With Managed WordPress Hosting A Web Developer’s New Best Friend is the AI Wai…
8 Best WordPress Hosting Solutions on the Market Tags:#cellcontrol#Distracted Driving#distracted driving foundation#Drive#driving tech#Jeff Haley#Joe Breaux#National Highway Traffic Safety Administration Related Posts ReadWriteDrive is an ongoing series covering the future of transportation.April is the national commemorative month for all kinds of things, including poetry, welding and soy foods. But it’s also National Distracted Driving Awareness Month.Unfortunately, the recognition of this month for distracted driving is a hallow gesture—just like the half-hearted attempts at developing apps that prevent cell phone use while driving.After a week of trying to find an app that prevents me from all cell phone use from behind the wheel entirely, I’ve given up.Don’t get me wrong: I wholeheartedly believe that distracted driving is a menace. According to the National Highway Traffic Safety Administration, an estimated 421,000 people were injured in car crashes involving distracted driving in 2011—and the number has been steadily going up since then. More than 3,000 people are killed in those accidents each year. And yet, society is willing to pay that price in exchange for keeping our phones operational inside the car.Not Too Hard to Solve “The technology for sensing when a phone is moving is easy,” said Jeff Haley, acting director of Distracted Driving Foundation, a small non-profit based in Bellevue, Washington. Haley also believes it’s not hard to turn off the phone’s ringer, disable texting, or disallow apps when traveling in a car.“But if the driver can turn it off at anytime, it’s merely a reminder to reduce temptation,” he said.According to Haley, few people are willing to buy and install phone-blocking technology. After all, how often do we pay for services that actually limit functionality?Given the sorry state of distracted driving technology, you have to be extremely motivated to use these apps. The Distracted Driving Foundation lists about 25 apps on its website—there are a few more on Apple’s App Store—but I couldn’t find a single one that was easy to use. Most were either defunct, required onerous sign-up processes, asked for subscription plans, or simply didn’t work as advertised.Just look at the App Store ratings for the “STANDD – Stop Texting and Driving Distract” app (unfortunately, this was typical for most of distracted driving apps). There are only three reviews so far. One said, “Does Not Work.” Another more emphatically read, “Does Not Work At All.” And my favorite comment bluntly stated, “BS.”No Product, Because No Market DemandHaley hit the nail on the head when he told me, “Developers don’t have much incentive because people aren’t spending money on these apps.” That’s why he’s advocating for a government mandate to force all cell phone carriers to block usage when the phone is moving. But that would require technology that prohibits phone usage from behind the steering wheel, but doesn’t affect the passengers. It gets even more complicated when you try to expand this concept to buses and trains. bradley berman Why Tech Companies Need Simpler Terms of Servic… A Web Developer’s New Best Friend is the AI Wai… Breaux blamed Cellcontrol’s shortcomings on the multiple versions, bugs and variations of different phone systems.“It can’t be 100%,” he said. “It might be out for a split second and then it comes back to block a few seconds later. Ninety percent of the time you’re phone is being blocked, and there’s no inappropriate usage. And when you’re in the passenger seat, 90% of the time you get most of the usage you expect. It beats doing nothing.”That’s only partially true. I got so frustrated with its idiosyncrasies—and one of its bugs that prevented me from Bluetooth-based streaming music—that I simply deleted the app entirely. I re-installed it the next day to give another try, but within a day, I deleted the app again.“The problem of distracted driving is created by technology, and it should be solved by technology,” Haley said. The acting director of the Distracted Driving Foundation is trying to raise money for academic research into foolproof technology that Congress and/or insurance companies could fully support and implement. Without massive public support, however, that’s going to be a tall order.For now, I’m going to take a low-tech approach, by throwing my phone in the glove box while driving. But I’m doubtful that society, hooked on ubiquitous 24/7 connectivity, is going to accept any restrictions to digital access—regardless of the cost. All photos courtesy of Cellcontrol Top Reasons to Go With Managed WordPress Hosting Cellcontrol, the most successful technology I’ve discovered, makes a noble attempt to differentiate drivers from passengers. A hardware device, roughly the size of a pack of cards, is mounted behind the rear view mirror (like those transponders one use for e-tolls on the highway). The device emits a high-frequency audio signal—beyond human hearing—that’s picked up by the cell phone’s microphone.“We send a key-press to the phone that says, ‘press the power button,’” said Joe Breaux, chief technology officer at CellControl. “We’re turning the screen off, and then we turn it right back on to say we’ve locked the phone.”It’s basically an Apple workaround. “Apple doesn’t offer any public APIs that would allow blocking applications,” said Breaux. (Android offers more visibility and access.)I installed the Cellcontrol hardware in my car, and the iPhone app on my phone. It worked okay some of the time, but I found it too unpredictable. The zones were not entirely accurate, and the system had issues figuring out the phone’s location, simply when I tried handing it off to a passenger. This might have to do with latency, a delay of sometimes four or five seconds, but it adds up to a user experience that was mediocre at best.Human Bugs
The Internet of Things market is forecasted to hit $520 billion in the next two years. According to International Data Corporation (IDC), IoT will account for at least 10 percent of the total digital universe — which will explode to 40 trillion GB of data by 2020. We’re talking 40 trillion GB of IoT data in the foreseeable future.Connected devices, particularly those designed for the smart home and health/wellness, are always listening, always recording data.Once data is on a device, it becomes part of a spiderweb of information that is stored in a variety of places, and it is shared among third parties and interacts with data from other sources. What information lives within all that data? Where is it stored? Who has access to it? How is it protected? How is all of this data tested?The range of implications and opportunities that have arisen with this market are far-reaching and complicated.Consumers around the world, are eager to embrace the convenience and innovation that the IoT brings to daily life. Most are unaware of what is happening in the background with the vast amount of data the devices collect. But we’re already seeing a flurry of news reports about data privacy violations relating to IoT data.Malicious actors are leveraging these devices for their own gain, and information from connected devices are now entering courtrooms as evidence.As a society, we must begin to think about the individual and corporate risks that we’ll face as IoT adoption proliferates, escalates, and breeds. To that end, our team conducted a series of tests and research to look deeper into connected devices and issues that are emerging with their widespread use.Our research studied where and how data resides on these devices, how they transfer it to the cloud and amongst other devices, and recent legal matters involving IoT data. The examination uncovered the following five findings, which many people may find surprising:Intersecting corporate and personal worlds will raise challenges. IoT data and the ways in which data and information are collected, stored, and secured — is colliding with the blending of corporate and personal worlds.This linking of worlds is raising important questions about the future of data privilege, privacy, and compliance.An employee working from home in the proximity of a smart device may unknowingly record sensitive conversations. That data is then sitting on a server somewhere indefinitely. With more and more people working remotely and using these devices in their home offices, corporations must be aware of the implications. The ways in which IoT information can impact both legal matters and compliance initiatives are far-reaching.The discoverable cloud databases for IoT accounts are expansive.access is easily attainable to find all of the users’ credentialscloud data can be collected and stored from APIsall smartphone appsany account paired with the devicesWhen testing on the Alexa, data available included:device informationadditional devices the user has associated with their accountthird-party apps added to the deviceuser activitycredit cards, your library card, and any other cardaudio files of every command givennetwork configurationsall groups the user has associated with the accountthe last 50 activities performed by Alexa on any deviceactivities that have Alexa enabled hearing within hearing rangespecific voice recordingsExample on Google Home:further correlates commandsrecords for third-party apps such as Nestinvestigators can identify and pull related Nest SQLite databasesinvestigators can identify and use .plist filesdata is found and can be used from a user’s iPhone backupThese artifacts can be dug-up and harvested — the saved data reveals day-to-day lifestyle habits.SQLite can enter a subquery and then an inner query (called a Nest query) within another SQLite and embed that query within the WHERE clause. The WHERE clause is then used to extract other records.These devices “helps” will then report when someone has left the premises or arrived home — and any other home changes. Data will be kept, preserved and saved forever; showing when your lights turned on and off — and any temperature changes. What information will this reveal about you?All of these devices are always listening.These home devices are the only absolute true constant in our lives. Alexa has a configurable feature called “drop-in.” This feature acts like an intercom between different Alexa enabled devices. The devices are always listening.Two devices can be connected if allowed access to one another. Once connected, a user has the ability to drop-in and listens without the end user’s ability to accept or deny the connection. Have you ever connected your information in someone’s office? Hum.Alexa also actively records conversations that are preceded with what the device interprets as a command word.Our testing found .wav files of the test subjects having a casual conversation, following any word that sounded enough like “Alexa” to wake the device. (How surprising. What a shocker…oh my).Yes, these types of recordings may be relevant during an investigation — but their storage also introduces privacy considerations. How long is the data kept? Answer: forever. What will the data say about you?IoT data is actively being used as evidence in litigation: When tested on Google Home and the Echo Dot, even when data was deleted from the app’s “activity” section — it remained in the device history. (again: How surprising. What a shocker. Oh my).All of this collected data and information will be a boon for investigators. We’ve seen information and data from these devices already appearing as evidence in criminal cases.In one murder case, the defendant’s smart speaker audio recordings were subject to a search warrant — and ultimately the files were turned over to prosecutors.In a home arson case, the homeowner told police that he did a series of things when he discovered the fire. However, a search of his pacemaker showed that the man’s heart rate barely changed throughout the incident.Testimony from a cardiologist, that it was “highly improbable” that a man in his condition could do the things claimed, ultimately supported a guilty conviction for charges of arson and insurance fraud.Privacy breaches have already occurred:In one report, audio and other files from an individual’s smart assistant were inadvertently released by the company storing the data to an unrelated individual.When the files were later handed over to a media outlet, the staff was able to easily piece together the identity, relationships, and daily habits of the subject.This incident corroborates mainstream worries.In a study from EIU, 74 percent of respondents said they are concerned that small privacy invasions from IoT devices may eventually lead to a loss of civil rights.The considerations above are only a snapshot of the more significant issues connected devices will continue to introduce. The type of information available through a user’s IoT account is only a small fraction of the larger pool of data that resides with the companies that make these devices.The broader implications are extensive. As the IoT space evolves — it will be crucial for individuals and businesses to remain vigilant over the way all of their information is handled. Follow the Puck AI: How it’s Impacting Surveillance Data Storage Megan Danilek is a consultant in FTI Consulting’s Technology Segment. She assists with digital forensics and investigations, including the forensic collection and analysis of digital evidence sources including computers, email servers, mobile devices and social media platforms. She provides computer forensic expertise to corporations and law firms involved in legal matters regarding theft of intellectual property and trade secrets, and second requests. How Data Analytics Can Save Lives Why IoT Apps are Eating Device Interfaces Related Posts Tags:#Alexa#Google Voice#Privacy Breach Megan Danilek
For access to the podcast as well as related resources, check out the links below.–Doing Translational Research: Evaluating Military Family Programs–The Military Projects, Bronfenbrenner Center for Translational Research Today we’d like to feature the podcast, Doing Translational Research: Evaluating Military Family Programs from Cornell University’s Bronfenbrenner Center for Translational Research (BCTR). The research at BCTR works to address the most pressing human problems and translate their research into practice. The purpose of the Doing Translational Research podcast is to feature conversations from researchers, practitioners and others involved in translational research and explore their work in a way that connects to the professionals in the field.Dr. Brian Leidy – Bronfenbrenner Center for Translational Research – Director of The Military ProjectsIn episode 8, Evaluating Military Family Programs¸ Karl Pillemer interviews Dr. Brian Leidy, Director of The Military Projects at BCTR. The Military Projects program has been doing research and evaluation of military programs for 25 years. The program develops outreach, public awareness materials, training and education for professional development, as well as offering evaluation expertise and technical assistance to a variety of family support programs in all branches of the U.S. Military. The results of their projects have influenced practice and policies that continue to improve the quality of life for military service members and their families by building resiliency and preventing/reducing risky behaviors.According to Dr. Leidy, military communities have a very specific set of problems and issues that they face, because they are the most racially, ethnically, culturally and socio-economically diverse community that exists in today’s world. In the last 25 years, the family support programs that have developed are responding to the challenges facing this community which,“…changed dramatically in 2003 with the 2 major Gulf Wars, Iraq & Afghanistan, the level of troop involvement and the way they returned. Roughly 2 million service members were deployed and roughly 300,000 returned with traumatic brain injuries, PTSD, physical injuries. This changed family support programs in the military.” (Leidy)Dr. Leidy states that there are programs to address these problems but the issues that now have a higher focus are the secondary effects on families of service members who have experienced these problems, such as financial issues, family separations, or child/spouse abuse.If you think back to the post-Vietnam War era and the challenges those soldiers returned to, then compare them to the soldiers of today, the needs of military communities have become clearer in recent decades, resulting in the a whole new range of support programs.Dr. Leidy says that most of the evaluations run by The Military Projects are for family support programs. These programs are effective and meet the needs of those that they work with, their biggest challenge is engaging their target audience. The Military Projects focus on what the barriers are for those that need access to family support programs. When evaluating these programs “the focus should not be on outcome evaluation – but process evaluation. You can be 100% successful with everyone that goes through your program, but if you are only engaging 40% of your target audience – you are only 40% successful.”We had the pleasure of speaking with Dr. Leidy and asked if there any advice he can provide for professionals that are challenged with accessing their target audience. He stated that “the biggest obstacle to success is the inability to engage the right individuals – they may not identify with the goals of your program, or there is a stigma attached to your services.” He suggested strategizing to determine how to best reach the individuals that are disengaged. “One way to get to the target audience is not to focus on the deficit but to go the route of asset building. For example, 4-H is a gateway to get families into the system – [the educators that work with 4-H] recognize when families need help with finances, substance abuse, etc.” Communicating your mission to local 4-H educators (or any organization) may help you to use that organization as an asset, which will help to fill your deficit. Of course not everyone has children so 4-H may not work for those individuals – in which case your strategy may require a varied approach to building capacity.The ultimate message here is that the evaluation process can strengthen the impact of programs for military families and add value that can lead to further support and resources in the future, but the strategy lies in evaluating the process before the outcomes.
Let there be light, the engineers thought. And they used not electricity, but just a dome, a pipe and sunlight. They named it ‘Surya Jyoti’, and it dispels the darkness in the homes of the poor.The micro-solar dome started as a pilot project to stream diffused sunlight into poorly-lit rooms through the roof in thatched, tiled or tin-roofed houses in the Sundarbans in West Bengal and in Tripura. Now, it has been commercialised.“It works on the principle of capturing sunlight using a micro-solar dome. The light is filtered through a PVC pipe with a highly reflective lining. Bright light emerges at the other end (within the room) through a glass shade,” said S.P. Gon Chaudhuri, former director of the West Bengal Renewable Energy Development Agency and now the chairman of the Helsinki-based International Solar Innovation Council.Easy to installA roof-tile can be removed to install this, and it works equally well in a tin-roofed building too.The device has been developed by N.B. Institute for Rural Technology and adopted by the Centre’s Department of Science and Technology under its Technological Advancement for Rural Areas programme. The device, priced between ₹100-300, comes in three models. Around 5,000 solar domes are in use in the slums of Delhi and in West Bengal, Tripura, Assam, Madhya Pradesh, Karnataka and Uttarakhand. The Science and Technology Ministry estimates that ‘Surya Jyoti’ can help some 10 million households. These are off-grid, in urban and rural areas, without reliable access to electricity. The domes provide light equivalent to a 60W bulb.Anupam Baral, who owns Geetanjali Enterprises, a solar equipment firm, said his company was making the domes. Besides a basic model, two others come fitted with solar photo-voltaic panels and a lithium-ion battery to store energy when sunlight is scarce, also enabling mobile device charging. Recently, Central Electronics, a PSU, was asked to make the domes, Mr. Gon Chaudhuri said.
Spelling more trouble for the Kohinoor group, run by former Chief Minister and senior Shiv Sena leader Manohar Joshi’s son Unmesh, the State-run Bank of Maharashtra has taken possession of immovable properties of Kohinoor Education Trust for failing to repay loans totalling ₹65 crore. This amount will go up after adding interest. Bank of Maharashtra, acting on behalf of other lenders — State Bank of India, and Bank of India — has taken possession of the trust’s properties in Kurla and Khandala under the Securitisation and Reconstruction of Financial Asset and Enforcement of Security Interest Act (Sarfaesi ). A public notice to this effect was issued on Monday.This is not the first time that the group is facing financial troubles. Earlier this year, it lost control over Kohinoor Square at Dadar after it failed to repay loans worth over ₹900 crore.Monday’s notice names borrower M/s Kohinoor Education Trust and personal guarantors Unmesh Manohar Joshi, Madhavi Unmesh Joshi and Anagha M Joshi along with corporate guarantor M/s Hotel Airport Kohinoor Pvt Ltd and M/s Kohinoor Planet Construction Pvt Ltd and asks them to repay the loan amount with interest within 60 days from the date of the notice.The Kohinoor Education Trust owes nearly ₹16 crore to Bank of Maharashtra, ₹38.63 crore to State Bank of India and ₹13.18 crore to Bank of India.“Since the borrowers having failed to repay the amount, notice is hereby issued to the borrowers/guarantors that the banks have taken possession of the properties,” reads the notice. The properties include a land parcel in Kurla in central Mumbai, and in the nearby Khandala area. The lenders also took possession of two buildings of the trust situated in Khandala, according to the notice. A detailed questionnaire sent to the Kohinoor Group by The Hindu seeking a response went unanswered. Mr Joshi could not be contacted.
The Centre on Monday held another round of talks with the NSCN-IM, the major insurgency group in Nagaland, aiming to hammer out differences, particularly on the outfit’s demand for a separate flag and Constitution for the Nagas, and inch closer to a solution to the seven decades old problem, officials said.A team of the NSCN-IM, led by its general secretary Thuingaleng Muivah, and Centre’s interlocutor and Nagaland Governor R N Ravi discussed here the possible ways to find an “honourable” solution by resolving the sticky issue of a separate flag and Constitution for the Nagas.As talks were progressing with the NSCN-IM, a grouping of seven Naga outfits which is pushing for an early solution to the Naga issue has urged elected representatives to avoid a “neutral stand” and make clear their position.The issue of a separate flag and Constitution for the Nagas has become the main bone of contention between the two sides with the NSCN-IM strongly pressing for it.“The dialogue, which lasted for more than four hours, remained inconclusive and both sides agreed to meet again soon. However, a final agreement between the NSCN-IM and the government is unlikely to take place by October 31,” an official privy to the development said.Mr. Ravi, in a statement, had said last week that a mutually agreed draft comprehensive settlement, including all the substantive issues and competencies, is ready for signing the final agreement.“Unfortunately at this auspicious juncture, the NSCN-IM has adopted a procrastinating attitude to delay the settlement raising the contentious symbolic issues of separate Naga national flag and Constitution on which they are fully aware of the government of India’s position,” he had said.Mr. Ravi’s statement bears significance in view of the central government’s August 5 announcement abrogating the special status given to Jammu and Kashmir under Article 370. With the annulment of the special status, the separate flag and the Constitution of Jammu and Kashmir cease to exist.The interlocutor said the NSCN-IM has “mischievously” dragged in the framework agreement and began imputing imaginary contents to it.The framework agreement was signed on August 3, 2015 by NSCN-IM’s Muivah and interlocutor Mr. Ravi in presence of Prime Minister Narendra Modi.The framework agreement came after over 80 rounds of negotiations spanning 18 years, with the first breakthrough in 1997 when the ceasefire agreement was sealed after decades of insurgency in Nagaland which started soon after India’s independence in 1947.The central government has already rejected the NSCN-IM’s demand for unification of Naga inhabited areas — located in Manipur, Arunachal Pradesh and Assam. The three Northeastern states also vehemently opposed it.Noting that the the Centre was keen on finding a solution, the grouping of seven organisations called Naga National Political Groups (NNPG) made the appeal to the elected representatives in a statement released by its media cell on Sunday night. The NNPG has been holding separate talks with the Centre since 2017.In the statement, the NNPG asserted that the elected representatives of Nagaland should not be maintaining a neutral stand on the matter, now that the government was keen on finding a solution.“Unresolved matters should be decided through political and democratic process…. The position and status of elected representatives of Nagaland cannot remain lukewarm. They cannot choose to hide behind the boulders blocking the way,” it said.The Centre had set a deadline for conclusion of peace talks in the wake of the Naga society’s demand for an early solution to the six-decade-old issue, the statement said.“It is time for political parties in Nagaland to clear their stand in the interest of the Naga people…. If the political parties of Nagaland fail in their constitutional duties and obligations, they should resign and allow the Election Commission of India to derecognise the parties,” the NNPG said.The interlocutor, Mr. Ravi is expected to hold dialogue with the NNPG in the coming days too.