mit

Submitting to the Truth (John 4:5-42)

Sunday of the Samaritan Woman - Fifth Sunday of Pascha




mit

Commitment to Christ (Mark 8:34-9:1)

Membership in the Body of Christ is not like being a member of any human organization. Fr Tom teaches us the words of our Lord which clearly state that begin a joined to Him requires total commitment. (Sunday after the Elevation of the Cross)




mit

Beware of Cheap Imitations (2 Cor 4:6-15)

The American religious scene is full of false teachers preaching a "gospel" that is focused solely on making people feel good about themselves. Fr Thomas reminds us that the truth of Christ promises us God's comfort in suffering, not the absence of suffering in this world. (Fifteenth Sunday after Pentecost)




mit

The Dormition: Glory to Jesus Christ!

Pulling from all of the scripture readings of the day, Fr. Tom shows that the doctrine of the Theotokos - and, ultimately, every doctrine of the Orthodox Church - is really about the Lord Jesus Christ.




mit

The Dormition of the Theotokos

Fr. Gregory's homily on the Feast of the Dormition of the Theotokos.




mit

God helps us in our Infirmities




mit

Dormition




mit

Imitation




mit

Imitators and Examples




mit

Realize Your Limits




mit

Imitators and Examples




mit

The Hermit, The Icon, and the Emperor

John interviews Dr. Chrissi Hart, author who wrote of the story of the miraculous events surrounding how the very first icon of the Mother of God, painted by the Evangelist Luke himself, moved from the emperor's palace in Constantinople to a new home on the island of Cyprus. A wonderful book for children published by Conciliar Press. And as a special treat, at the end of the interview, Chrissi reads her book for us! Make sure your children are listening every week to Readings from Under the Grapevine with Chrissi Hart.




mit

Dormition of the Theotokos

Fr. Wilbur Ellsworth from Holy Transfiguration Antiochian Orthodox Church in Warrenville, IL, speaks about the Dormition of the Theotokos.




mit

Met. Jonah on Archbishop Dmitri

In this touching interview, His Beatitude Metropolitan Jonah reflects on the life and memory of Archbishop Dmitri, recently reposed Bishop of the Diocese of the South in the OCA.




mit

Archbishop Dmitri - Memory Eternal

On Sunday morning, August 28, at 2:00 AM, His Eminence Archbishop Dmitri fell asleep in the Lord at his home in Dallas. John Maddex talks with Fr. Stephen Freeman, Dean of the Appalachian Region of the Diocese of the South about the Archbishop's life as a leader, a visionary, and an evangelist. More information Listen to the interview and then read about his life on the OCA Web Site.




mit

She Bore Him In Her Heart (Feast of the Dormition)

Fr. Pat contemplates what the life of the Virgin Mary teaches us concerning 1) dogmatic theology, 2) the life of piety and worship, 3) the moral, ascetical life.




mit

The Enmity and the Peace

In Ephesians 2:14-22, St. Paul references the psychological, social, and historical aspects of the faith. Fr. Pat offers reflections on these.




mit

Dormition

Humility, obedience, listening, hearing and keeping.




mit

The Dormition




mit

077: Darrell Vesterfelt – Running a 101,000-Person Online Summit

Today, I talk to Darrell Vesterfelt, who is a longtime friend who helped grow ConvertKit in our craziest growth times (from $100,000/mo when he joined to $500,000/mo in just over a year). Darrell is one of the best marketers I know. He is the Founder and former CEO of Good People Digital, the Co-Founder of […]




mit

Rees-Zammit has talent but lots to learn, says NFL boss

The former Wales international has had a bumpy start as he transitions to playing American football.




mit

Gatland admits replacement error in Wales' loss to Fiji

Wales head coach Warren Gatland has discussed an error made with his replacements during his side's defeat by Fiji in Cardiff.




mit

Paddy McGuinness: Chris Hoy training pushed me to 'absolute limits'

Paddy McGuinness is taking on a nearly 300-mile cycling challenge for BBC Children in Need.




mit

Sammy Wilson admits meetings with Sinn Féin

The secret meetings were revealed by Rev Harold Good in a new book, In Good Time.




mit

Adidas ends 'fight' with Kanye West over antisemitism

The two collaborated on the Yeezy collection but cut ties due to the rapper's controversial comments.




mit

Passport woes limit Barnsley 'Karate Kid'

Mayon's karate championship dreams ‘jeopardised’ due to pending passport application




mit

Exeter thrash Loughborough to return to PWR summit

Exeter Chiefs returned to the top of the Premiership Women's Rugby league after hammering Loughborough Lightning 40-19.




mit

Gloucestershire spinner Smith signs T20-only deal

Gloucestershire spin-bowler Tom Smith signs a one-year T20-only contract extension with the club through the 2025 season.




mit

Incinerator work to start despite permit concerns

The facility was given planning consent by West Berkshire Council in August 2022.





mit

In Defence of Anonymity

Last month, I was invited to speak at TEDx East End. The theme was 'Society Beyond Borders,' so I opted to talk about the history of anonymity, and why it is so important to preserve it for marginalised activists and writers.

Very often when you see the word 'anonymous' these days, it's followed almost immediately by the word 'troll'. But the rich history of anonymity and pseudonymity is far more than that, and has been a refuge for artists and others almost since the beginning of recorded history. In this talk I explore some of the leading lights of anonymity, and why they chose not to use their real names.





mit

Berkeley, UCLA, Harvard, MIT, Princeton, Stanford y Yale en Academic Earth

Si utilizás el buscador Google Chrome podés encontrar herramientas de mucho provecho. Acabo de toparme con la extensión en línea de Academic Earth, que ofrece el acceso gratuito a videos de los cursos y conferencias de las universidades más destacadas de Estados Unidos y en las materias más diversas. ENJOY KNOWLEDGE!

 
Podrás presenciar conferencias como, por ejemplo,
Language in the Brain, Mouth and the Hands
By Paul Bloom - Yale



Watch it on Academic Earth





mit

Training for legal translators. Part IV. Make at least one big study commitment.

This is the last part of a series on training for legal translators. See the first post here. To put yourself on the path to becoming a good legal translator, you need to make one big study commitment. A big study commitment is anything that takes at least a year, challenges you, and costs a lot of […]




mit

Le PSG complice de l’antisémitisme ?

ENQUETE. Comment le club de foot parisien, propriete du Qatar, a laisse prosperer en son sein des Ultras << antisionistes >>.




mit

The Use of Latent Semantic Indexing to Mitigate OCR Effects of Related Document Images

Due to both the widespread and multipurpose use of document images and the current availability of a high number of document images repositories, robust information retrieval mechanisms and systems have been increasingly demanded. This paper presents an approach to support the automatic generation of relationships among document images by exploiting Latent Semantic Indexing (LSI) and Optical Character Recognition (OCR). We developed the LinkDI (Linking of Document Images) service, which extracts and indexes document images content, computes its latent semantics, and defines relationships among images as hyperlinks. LinkDI was experimented with document images repositories, and its performance was evaluated by comparing the quality of the relationships created among textual documents as well as among their respective document images. Considering those same document images, we ran further experiments in order to compare the performance of LinkDI when it exploits or not the LSI technique. Experimental results showed that LSI can mitigate the effects of usual OCR misrecognition, which reinforces the feasibility of LinkDI relating OCR output with high degradation.






mit

UN chief warns COP29 summit to pay up or face climate-led disaster for humanity - The Globe and Mail

  1. UN chief warns COP29 summit to pay up or face climate-led disaster for humanity  The Globe and Mail
  2. Climate Summit, in Early Days, Is Already on a ‘Knife Edge’  The New York Times
  3. At COP29 summit, nations big and small get chance to bear witness to climate change  The Globe and Mail
  4. Terence Corcoran: COP29 hit by political ‘dunkelflaute’  Financial Post
  5. COP29: Albania PM goes off script to ask 'What on Earth are we doing?'  Euronews




mit

Machine learning and deep learning techniques for detecting and mitigating cyber threats in IoT-enabled smart grids: a comprehensive review

The confluence of the internet of things (IoT) with smart grids has ushered in a paradigm shift in energy management, promising unparalleled efficiency, economic robustness and unwavering reliability. However, this integrative evolution has concurrently amplified the grid's susceptibility to cyber intrusions, casting shadows on its foundational security and structural integrity. Machine learning (ML) and deep learning (DL) emerge as beacons in this landscape, offering robust methodologies to navigate the intricate cybersecurity labyrinth of IoT-infused smart grids. While ML excels at sifting through voluminous data to identify and classify looming threats, DL delves deeper, crafting sophisticated models equipped to counteract avant-garde cyber offensives. Both of these techniques are united in their objective of leveraging intricate data patterns to provide real-time, actionable security intelligence. Yet, despite the revolutionary potential of ML and DL, the battle against the ceaselessly morphing cyber threat landscape is relentless. The pursuit of an impervious smart grid continues to be a collective odyssey. In this review, we embark on a scholarly exploration of ML and DL's indispensable contributions to enhancing cybersecurity in IoT-centric smart grids. We meticulously dissect predominant cyber threats, critically assess extant security paradigms, and spotlight research frontiers yearning for deeper inquiry and innovation.




mit

Ebullient supervision, employee engagement and employee commitment in a higher education institution: the partial least square approach

The study investigated the influence of ebullient supervision on employee commitment in a Ghanaian public university through the mediating role of employee engagement. The simple random sampling technique was used to draw 302 administrative staff of the university to respond to the self-administered questionnaire on the constructs. Furthermore, the partial least square structural equation technique was deployed to test the research hypotheses in the study. The results showed that ebullient supervision had a significant positive relationship with employee commitment and employee engagement. The findings further revealed that employee engagement positively correlated with employee commitment. Finally, the study's findings established that employee engagement partially mediated the link between ebullient supervision and employee commitment. The study emphasised that various supervisors in a university's administration should create an environment that favours fun where subordinates can form ties with one another.




mit

LDSAE: LeNet deep stacked autoencoder for secure systems to mitigate the errors of jamming attacks in cognitive radio networks

A hybrid network system for mitigating errors due to jamming attacks in cognitive radio networks (CRNs) is named LeNet deep stacked autoencoder (LDSAE) and is developed. In this exploration, the sensing stage and decision-making are considered. The sensing unit is composed of four steps. First, the detected signal is forwarded to filtering progression. Here, BPF is utilised to filter the detected signal. The filtered signal is squared in the second phase. Third, signal samples are combined and jamming attacks occur by including false energy levels. Last, the attack is maliciously affecting the FC decision in the fourth step. On the other hand, FC initiated the decision-making and also recognised jamming attacks that affect the link amidst PU and SN in decision-making stage and it is accomplished by employing LDSAE-based trust model where the proposed module differentiates the malicious and selfish users. The analytic measures of LDSAE gained 79.40%, 79.90%, and 78.40%.




mit

Technology and Marginalization: A Case Study of the Limited Adoption of the Intranet at a State-owned Organization in Rural Australia




mit

Using Technology-Mediated Learning Environment to Overcome Social and Cultural Limitations in Higher Education




mit

The Relationship among Organizational Knowledge Sharing Practices, Employees' Learning Commitments, Employees' Adaptability, and Employees' Job Satisfaction: An Empirical Investigation




mit

Keeping an Eye on the Screen: Application Accessibility for Learning Objects for Blind and Limited Vision Students




mit

Cheating and Feeling Honest: Committing and Punishing Analog versus Digital Academic Dishonesty Behaviors in Higher Education

This study examined the phenomenon of academic dishonesty among university students. It was based on Pavela’s (1997) framework of types of academic dishonesty (cheating, plagiarism, fabrication, and facilitation) and distinguished between digital and “traditional”- analog dishonesty. The study analyzed cases of academic dishonesty offenses committed by students, as well as the reasons for academic dishonesty behaviors, and the severity of penalties for violations of academic integrity. The motivational framework for committing an act of academic dishonesty (Murdock & Anderman, 2006) and the Self-Concept Maintenance model (Mazar, Amir, & Ariely, 2008) were employed to analyze the reasons for students’ dishonest behaviors. We analyzed 315 protocols of the Disciplinary Committee, at The Open University of Israel, from 2012-2013 that represent all of the offenses examined by the Committee during one and a half years. The findings showed that analog dishonesty was more prevalent than digital dishonesty. According to the students, the most prevalent reason for their academic dishonesty was the need to maintain a positive view of self as an honest person despite violating ethical codes. Interestingly, penalties for analog dishonesty were found to be more severe than those imposed for digital dishonesty. Surprisingly, women were penalized more severely than men, despite no significant gender differences in dishonesty types or in any other parameter explored in the study. Findings of this study shed light on the scope and roots of academic dishonesty and may assist institutions in coping effectively with this phenomenon.




mit

Small Business Conformity with Quality Website Design Criteria in a Marketing Communication Context

Aim/Purpose: Professional companies selling persuasive-communication services via the World Wide Web need to be exemplars of effective informing practices. Their credibility is at risk if their websites do not excel in marketing message and use of medium. Their unique brands need to be expressed through website technology and content, or they cannot compete successfully. Background: Compares marketing communication consultants’ websites with expert criteria. Methodology: Content analysis of 40 advertising agency websites. Contribution: Links an evaluation of advertising agency compliance with expert website criteria to established branding constructs. Findings: Most small advertising agencies could improve their brand reputations through better compliance with experts’ recommended website design and content criteria. Recommendations for Practitioners: A hierarchy of recommendations for practitioners is offered, addressing ease and importance. Impact on Society: Clarity and credibility of message and medium improve our ability to practice effective informing. Future Research: Explore online communications of specialized populations such as digital marketing experts.




mit

The Relationship between Perceived Organizational Support (POS) and Turnover Intention: The Mediating Role of Job Motivation, Affective and Normative Commitment

Aim/Purpose: The study aims to examine the mediating role of job motivation and affective and normative commitment on the relationship between perceived organizational support (POS) and job turnover intention. Background: POS refers to employees’ beliefs and perceptions concerning the extent to which the organization values their contributions, cares about their well-being, and fulfils their socio-emotional needs. To date, research has shown that employee turnover is a complex construct resulting from the interplay of both individual and organizational variables, such as motivation and climate. Methodology: Cross-sectional data were collected from 143 employees of an Italian industrial company. Paper-and-pencil questionnaires were used to assess respondents’ POS, job motivation, affective and normative organizational commitment, and turnover intentions. Contribution: Specifically, in this research, we aim at examining (i) the indirect effect of POS on turnover intention via (ii) job motivation and (iii) normative and affective commitment. Findings: Results show that high POS is associated with high levels of job motivation and affective and normative commitment, which in turn are negatively linked to turnover intentions. Recommendation for Researchers: Researchers should not lose sight of the importance of studying and delving into the concept of turnover intention given that, from an organizational point of view, losing personnel means losing competencies, which need to be replaced through assessment, selection, training, and development, processes that are often challenging and expensive. Future Research: Future research should further investigate the role of motivation and commitment, other than additional variables, for POS and turnover intention. Longitudinal studies and further testing are required to verify the causal processes stemming from our model. Future research could consider linking employees’ self-reported measures with objective data concerning turnover rates.




mit

CLEAR & RETURN: Stopping Run-Time Countermeasures in Cryptographic Primitives

Myung-Hyun KIM,Seungkwang LEE, Vol.E107-D, No.11, pp.1449-1452
White-box cryptographic implementations often use masking and shuffling as countermeasures against key extraction attacks. To counter these defenses, higher-order Differential Computation Analysis (HO-DCA) and its variants have been developed. These methods aim to breach these countermeasures without needing reverse engineering. However, these non-invasive attacks are expensive and can be thwarted by updating the masking and shuffling techniques. This paper introduces a simple binary injection attack, aptly named clear & return, designed to bypass advanced masking and shuffling defenses employed in white-box cryptography. The attack involves injecting a small amount of assembly code, which effectively disables run-time random sources. This loss of randomness exposes the unprotected lookup value within white-box implementations, making them vulnerable to simple statistical analysis. In experiments targeting open-source white-box cryptographic implementations, the attack strategy of hijacking entries in the Global Offset Table (GOT) or function calls shows effectiveness in circumventing run-time countermeasures.
Publication Date: 2024/11/01




mit

The limits and possibilities of history: How a wider, deeper and more engaged understanding of business history can foster innovative thinking

Calls for greater diversity in management research, education and practice have increased in recent years, driven by a sense of fairness and ethical responsibility, but also because research shows that greater diversity of inputs into management processes can lead to greater innovation. But how can greater diversity of thought be encouraged when educating management students, beyond the advocacy of affirmative action and relating the research on the link between multiplicity and creativity? One way is to think again about how we introduce the subject. Introductory textbooks often begin by relaying the history of management. What is presented is a very limited mono-cultural and linear view of how management emerged. This article highlights the limits this view outlines for initiates in contrast to the histories of other comparable fields (medicine and architecture), and discusses how a wider, deeper and more engaged understanding of history can foster thinking differently.