gh

An Accidental Outcome? Alex MacDonald returns to discuss how the NLRA’s success has resulted in fewer unions & what might happen under a new administration in DC

Alex MacDonald discusses his article “The Accidental Success of the NLRA: How a Law About Unions Achieved Its Goals by Giving Us Fewer Unions” on a podcast.

Labor Union News

Listen




gh

Alumni Spotlight — Meet Erin Webber

Erin Webber talks about how her father inspired her future career in labor and employment law and recalls her journey to become the Managing Director of Littler. 

MIZZOU Magazine

View




gh

New workers' rights 'to cost firms £5bn a year’

Ben Smith says Labour's plans to upgrade workers' rights would create extra red tape for employers. 

BBC

View




gh

How A California Intersectionality Law Might Boost Equal Pay

Joy Rosenquist says a new law enshrining the principle of intersectionality in California’s anti-discrimination statutes will have a substantial impact on equal pay litigation.

Law360 Employment Authority

View (Subscription required)




gh

Businesses breathe sigh of relief after Dutch expat tax reversal

Stephan Swinkels discusses a major reversal in reforms to Dutch tax law that would have impacted the recruitment and mobility of highly skilled foreign talent.

Global Mobility Lawyer

View (Subscription required)




gh

Right To Disconnect Plan May Erode Firms' Long-Hours Culture

Ben Smith and Maya Beauville say the UK government's softened plan to grant employees the right to disconnect out of hours is unlikely to change the legal sector's entrenched long-hour culture anytime soon.

Law360

View (Subscription required)




gh

Six high-stakes employment rules that could tilt on the election

Michael Lotito, Jim Paretti, and Shannon Meade discuss what a new administration will mean for employment law and employers.

American City Business Journals

View (Subscription required)




gh

Texas Court to Weigh Overtime Rule With Trump Rescission Looming

While the state of Texas and businesses tries to convince a federal district court that the US DOL went beyond its authority with a rule expanding overtime protections, Jim Paretti says that if employers in Texas continue operating business as usual, they will be doing so at their own risk.

Bloomberg Law

View (Subscription required)




gh

Artificial Intelligence for networks: understanding it through ETSI ENI use cases and architecture

Artificial Intelligence for networks: understanding it through ETSI ENI use cases and architecture

Sophia Antipolis, 20 April 2020

On 17 April, ETSI officials from the Experiential Network Intelligence group (ISG ENI) gave a webinar entitled Artificial Intelligence for networks: understanding it through ETSI ENI use cases. This webinar attracted more than 150 online attendees including operators, vendors, research institutions, and international standards development organizations.

Read More...




gh

Fighting pandemic: special edition of Enjoy! now available

Fighting pandemic: special edition of Enjoy! now available

Sophia Antipolis, 7 July 2020

ETSI is pleased to unveil a special edition of its magazine Enjoy! As a global pandemic hit the world at all levels, people and companies had to cope with this crisis each in their own way. Through a variety of interviews and articles, this new issue reflects the challenges and perspectives of our international members.

Read More...




gh

ETSI launches OSM Release EIGHT

ETSI launches OSM Release EIGHT

Service Assurance and High Availability for large scale cloud-native deployments

Sophia Antipolis, 28 July 2020

ETSI is pleased to unveil Open Source MANO (OSM) Release EIGHT. This new release adds ultra-scalable service assurance capabilities, support for new resilience schemes, and facilitates the visual operation for large-scale network deployments from Cloud to Edge.

Much more than “bells and whistles”, Release EIGHT brings a new framework for the real-time gathering of metrics and alerts, designed to manage service assurance in large production deployments. Although this new framework is agnostic of the specific monitoring method, Release EIGHT makes the use of SNMP (Simple Network Management Protocol) monitoring particularly easy, considering its vast popularity in commercial VNFs (Virtual Network Functions).

Read More...




gh

ETSI virtual conference on boosting the impact of research & innovation through standardization

ETSI virtual conference on boosting the impact of research & innovation through standardization

Sophia Antipolis, 6 November 2020

Standardized commercial products and services substantially contribute to the overall global economy and quality of life of citizens around the world.

Join ETSI and TelecomTV for a two-day virtual conference focused on the Research Innovation Standards Ecosystem and Research Opportunities in Standards.

The virtual event will take place on 24 and 25 November, and each of the two days will comprise multiple sessions, including presentations and panel discussions followed by LIVE Q&A sessions where you'll be able to interact and ask your questions to the experts.

Read More...




gh

Highlights of the Cybersecurity Standardization Conference

Highlights of the Cybersecurity Standardization Conference

Sophia Antipolis, 5 February 2021

The European Standards Organizations, CEN, CENELEC and ETSI, joined forces with ENISA, the European Union Agency for Cybersecurity, to organize its annual conference virtually this year. The event, which took place from 2 to 4 February, attracted over 2000 participants from the EU and from around the world.

Read More...




gh

Making a better world through innovation a key focus of ETSI IoT Week 2022

Making a better world through innovation a key focus of ETSI IoT Week 2022

Must-attend event offers an up-to-date overview of the major European and global trends in IoT services, technology innovations and deployments

Sophia Antipolis, 14 September 2022

The potential for IoT technologies to enhance the lives of people across Europe through digital, green and eHealth revolutions will be a key focus of this year’s ETSI IoT Week and conference.

Held in Sophia Antipolis, France, from 10-14 October, ETSI IoT Week is an annual event for organizations and stakeholders interested in the service and operational areas of IoT. Speakers at the conference will include regulators, academics and practitioners from prominent IoT firms across Europe.

Read More...




gh

ETSI IoT week highlights how ICT standards can help sustainability

ETSI IoT week highlights how ICT standards can help sustainability

Sophia Antipolis, 17 October 2022

Last week ETSI hosted the 2022 ETSI IoT Week event, focused on “Pursuing the Digital and Green Transformation”. 52 speakers from industry, research, universities, cities and other SDOs demonstrated, with concrete examples, how ICT standards can help reach the UN Sustainable Development Goals (SDGs) and the European Green Deal to an audience from 22 countries around the world.

Read More...




gh

ETSI Releases TETRA Algorithms to Public Domain, maintaining the highest security for its critical communication standard

Sophia Antipolis, 14 November 2023

ETSI is happy to announce that at a meeting in October of its technical committee in charge of the TETRA standard (TCCE), a full consensus was reached to make the primitives of all TETRA Air Interface cryptographic algorithms available to the public domain.

Read More...




gh

Navigating through Challenges and Opportunities of Cybersecurity Standardization

Sophia Antipolis, 8 March 2024 

On 5 March, the European Standardization Organizations (ESOs), CEN, CENELEC and ETSI, joined forces with ENISA, the European Union Agency for Cybersecurity, to organize their 8th Cybersecurity Standardization Conference.

Read More...




gh

Aiming high: ETSI Conference on Non-Terrestrial Networks underlines critical role of NTN in realizing tomorrow’s global 6G vision

Sophia Antipolis, 15 April 2024

This year’s first ETSI Conference on Non-Terrestrial Networks has stressed the importance of technical standardization in delivering a fully connected planet via NTN, a key element of tomorrow’s global 6G networks.

Held from 3-4 April 2024 at ETSI’s Sophia Antipolis headquarters, the event was co-organized with the European Space Agency (ESA), the 6G Smart Networks and Services Industry Association (6G-IA) and the Smart Networks and Services Joint Undertaking (SNS JU).

Titled ‘Non-Terrestrial Networks, a Native Component of 6G’, the 2-day conference attracted over 200 participants from 25 countries, including experts in standardization and research as well as industrial representation from the mobile, satellite and wider space industries. Delegates shared perspectives on NTN use cases, candidate technology solutions, current research status and standardization roadmaps. Day one sessions focused on the opportunities and challenges of integrating terrestrial and non-terrestrial networks within tomorrow’s global communications landscape. The second day afforded a deep dive into numerous cutting-edge NTN and 6G research & development initiatives in Europe and around the world.

Read More...




gh

MAA France: Fall All-Canadian Bowling Night for McGillians

Starts: Thu, 14 Nov 2024 22:00:00 -0500
11/14/2024 07:30:00PM
Location: PARIS, Canada




gh

Are we doing it right? Promoting the human rights of children with disabilities

Starts: Thu, 28 Nov 2024 18:30:00 -0500
11/28/2024 05:30:00PM
Location: Montreal, Canada




gh

Calgary Holiday Party - Holiday Glamour at Lougheed House

Starts: Sat, 30 Nov 2024 19:00:00 -0500
<div>Join us for a magical evening of holiday cheer at the <b>McGill Alumni Association of Calgary</b>'s <b>Holiday Soirée</b>!</div><div><br /></div><div>Immerse yourself in the historic ambiance of Lougheed House as we celebrate the season with festive decorations, delightful canapés, and a cash bar.&nbsp;</div><div><br /></div><div>This is your chance to dress up, socialize, make new friends, and reconnect with old ones-all while enjoying a fun evening with our community. <br /><br /></div><div><i>Get ready to be enchanted by the spirit of the holidays! <br /></i></div>
Location: Calgary, Canada




gh

The Civil Rights Movement

New essay by Kenneth R. Janken added to Freedom's Story: Teaching African American Literature and History, TeacherServe from the National Humanities Center.




gh

The Civil Rights Movement: 1968-2008

New essay by Nancy MacLean, "The Civil Rights Movement: 1968-2008," added to Freedom's Story: Teaching African American Literature and History, TeacherServe from the National Humanities Center.




gh

The high, hidden social and environmental costs of food in Kenya




gh

Policy Seminar | Debt Distress and the Right to Food in Africa




gh

Cybersecurity Snapshot: Apply Zero Trust to Critical Infrastructure’s OT/ICS, CSA Advises, as Five Eyes Spotlight Tech Startups’ Security

Should critical infrastructure orgs boost OT/ICS systems’ security with zero trust? Absolutely, the CSA says. Meanwhile, the Five Eyes countries offer cyber advice to tech startups. Plus, a survey finds “shadow AI” weakening data governance. And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy.

Dive into six things that are top of mind for the week ending Nov. 1.

1 - Securing OT/ICS in critical infrastructure with zero trust

As their operational technology (OT) computing environments become more digitized, converged with IT systems and cloud-based, critical infrastructure organizations should beef up their cybersecurity by adopting zero trust principles.

That’s the key message of the Cloud Security Alliance’s “Zero Trust Guidance for Critical Infrastructure,” which focuses on applying zero trust methods to OT and industrial control system (ICS) systems.

While OT/ICS environments were historically air gapped, that’s rarely the case anymore. “Modern systems are often interconnected via embedded wireless access, cloud and other internet-connected services, and software-as-a-service (SaaS) applications,” reads the 64-page white paper, which was published this week.

The CSA hopes the document will help cybersecurity teams and OT/ICS operators enhance the way they communicate and collaborate.

 

 

Among the topics covered are:

  • Critical infrastructure’s unique threat vectors
  • The convergence of IT/OT with digital transformation
  • Architecture and technology differences between OT and IT

The guide also outlines this five-step process for implementing zero trust in OT/ICS environments:

  • Define the surface to be protected
  • Map operational flows
  • Build a zero trust architecture
  • Draft a zero trust policy
  • Monitor and maintain the environment

A zero trust strategy boosts the security of critical OT/ICS systems by helping teams “keep pace with rapid technological advancements and the evolving threat landscape,” Jennifer Minella, the paper’s lead author, said in a statement.

To get more details, read:

For more information about OT systems cybersecurity, check out these Tenable resources: 

2 - Five Eyes publish cyber guidance for tech startups

Startup tech companies can be attractive targets for hackers, especially if they have weak cybersecurity and valuable intellectual property (IP).

To help startups prevent cyberattacks, the Five Eyes countries this week published cybersecurity guides tailored for these companies and their investors.

“This guidance is designed to help tech startups protect their innovation, reputation, and growth, while also helping tech investors fortify their portfolio companies against security risks," Mike Casey, U.S. National Counterintelligence and Security Center Director, said in a statement.

These are the top five cybersecurity recommendations from Australia, Canada, New Zealand, the U.S. and the U.K. for tech startups:

  • Be aware of threat vectors, including malicious insiders, insecure IT and supply chain risk.
  • Identify your most critical assets and conduct a risk assessment to pinpoint vulnerabilities.
  • Build security into your products by managing intellectual assets and IP; monitoring who has access to sensitive information; and ensuring this information’s protection.
  • Conduct due diligence when choosing partners and make sure they’re equipped to protect the data you share with them.
  • Before you expand abroad, prepare and become informed about these new markets by, for example, understanding local laws in areas such as IP protection and data protection.

 

 

“Sophisticated nation-state adversaries, like China, are working hard to steal the intellectual property held by some of our countries’ most innovative and exciting startups,” Ken McCallum, Director General of the U.K.’s MI5, said in a statement.

To get more details, check out these Five Eyes’ cybersecurity resources for tech startups:

3 - Survey: Unapproved AI use impacting data governance

Employees’ use of unauthorized AI tools is creating compliance issues in a majority of organizations. Specifically, it makes it harder to control data governance and compliance, according to almost 60% of organizations surveyed by market researcher Vanson Bourne.

“Amid all the investment and adoption enthusiasm, many organisations are struggling for control and visibility over its use,” reads the firm’s “AI Barometer: October 2024” publication. Vanson Bourne polls 100 IT and business executives each month about their AI investment plans.

To what extent do you think the unsanctioned use of AI tools is impacting your organisation's ability to maintain control over data governance and compliance?

(Source: Vanson Bourne’s “AI Barometer: October 2024”)

Close to half of organizations surveyed (44%) believe that at least 10% of their employees are using unapproved AI tools.

On a related front, organizations are also grappling with the issue of software vendors that unilaterally and silently add AI features to their products, especially to their SaaS applications.

While surveyed organizations say they’re reaping advantages from their AI usage, “such benefits are dependent on IT teams having the tools to address the control and visibility challenges they face,” the publication reads.

For more information about the use of unapproved AI tools, an issue also known as “shadow AI,” check out:

VIDEO

Shadow AI Risks in Your Company

 

4 - NCSC explains nuances of multi-factor authentication

Multi-factor authentication (MFA) comes in a variety of flavors, and understanding the differences is critical for choosing the right option for each use case in your organization.

To help cybersecurity teams better understand the different MFA types and their pluses and minuses, the U.K. National Cyber Security Centre (NCSC) has updated its MFA guidance.

“The new guidance explains the benefits that come with strong authentication, while also minimising the friction that some users associate with MFA,” reads an NCSC blog.

 

 

In other words, what type of MFA method to use depends on people’s roles, how they work, the devices they use, the applications or services they’re accessing and so on.

Topics covered include:

  • Recommended types of MFA, such as FIDO2 credentials, app-based and hardware-based code generators and message-based methods
  • The importance of using strong MFA to secure users’ access to sensitive data
  • The role of trusted devices in boosting and simplifying MFA
  • Bad practices that weaken MFA’s effectiveness, such as:
    • Retaining weaker, password-only authentication protocols for legacy services
    • Excluding certain accounts from MFA requirements because their users, usually high-ranking officials, find MFA inconvenient

To get more details, read:

For more information about MFA:

5 - U.S. gov’t outlines AI strategy, ties it to national security 

The White House has laid out its expectations for how the federal government ought to promote the development of AI in order to safeguard U.S. national security.

In the country’s first-ever National Security Memorandum (NSM) on AI, the Biden administration said the federal government must accomplish the following:

  • Ensure the U.S. is the leader in the development of safe, secure and trustworthy AI
  • Leverage advanced AI technologies to boost national security
  • Advance global AI consensus and governance

“The NSM’s fundamental premise is that advances at the frontier of AI will have significant implications for national security and foreign policy in the near future,” reads a White House statement.

 

 

The NSM’s directives to federal agencies include:

  • Help improve the security of chips and support the development of powerful supercomputers to be used by AI systems.
  • Help AI developers protect their work against foreign spies by providing them with cybersecurity and counterintelligence information.
  • Collaborate with international partners to create a governance framework for using AI in a way that is ethical, responsible and respects human rights. 

The White House also published a complementary document titled “Framework To Advance AI Governance and Risk Management in National Security,” which adds implementation details and guidance for the NSM.

6 - State CISOs on the frontlines of AI security

As the cybersecurity risks and benefits of AI multiply, most U.S. state CISOs find themselves at the center of their governments' efforts to craft AI security strategies and policies.

That’s according to the “2024 Deloitte-NASCIO Cybersecurity Study,” which surveyed CISOs from all 50 states and the District of Columbia.

Specifically, 88% of state CISOs reported being involved in the development of a generative AI strategy, while 96% are involved with creating a generative AI security policy.

However, their involvement in AI cybersecurity matters isn’t necessarily making them optimistic about their states’ ability to fend off AI-boosted attacks.

None said they feel “extremely confident” that their state can prevent AI-boosted attacks, while only 10% reported feeling “very confident.” The majority (43%) said they feel “somewhat confident” while the rest said they are either “not very confident” or “not confident at all.”

 

 

Naturally, most state CISOs see AI-enabled cyberthreats as significant, with 71% categorizing them as either “very high threat” (18%) or “somewhat high threat” (53%).

At the same time, state CISOs see the potential for AI to help their cybersecurity efforts, as 41% are already using generative AI for cybersecurity, and another 43% have plans to do so by mid-2025.

Other findings from the "2024 Deloitte-NASCIO Cybersecurity Study" include:

  • 4 in 10 state CISOs feel their budget is insufficient.
  • Almost half of respondents rank cybersecurity staffing as one of the top challenges.
  • In the past two years, 23 states have hired new CISOs, as the median tenure of a state CISO has dropped to 23 months, down from 30 months in 2022.
  • More state CISOs are taking on privacy protection duties — 86% are responsible for privacy protection, up from 60% two years ago.

For more information about CISO trends:




gh

Wipfli: Blog: QlikThoughts




gh

Outcast. Volume 3, This little light / Robert Kirkman, creator, writer ; Paul Azaceta, artist ; Elizabeth Breitweiser, colorist ; Rus Wooton, Letterer ; Sean Mackiewicz, editor.

"Kyle is faced with the most emotional exorcism he's performed yet … as he begins to learn more about his abilities and what's really happening around him. The pieces are starting to fall into place as secrets are revealed that will change everything." -- Description provided by publisher.




gh

Seek you : a journey through American loneliness / Kristen Radtke.

"When Kristen Radtke was in her twenties, she learned that, as her father was growing up, he would crawl onto his roof in rural Wisconsin and send signals out on his ham radio. Those CQ calls were his attempt to reach somebody— anybody— who would respond. In Seek You, Radtke uses this image as her jumping off point into a piercing exploration of loneliness and the ways in which we attempt to feel closer to one another. She looks at the very real current crisis of loneliness through the lenses of gender, violence, technology, and art. Ranging from the invention of the laugh-track to Instagram to Harry Harlow's experiments in which infant monkeys were given inanimate surrogate mothers, Radtke uncovers all she can about how we engage with friends, family, and strangers alike, and what happens— to us and to them— when we disengage. With her distinctive, emotionally charged drawings and unflinchingly sharp prose, Kristen Radtke masterfully reframes some of our most vulnerable and sublime moments." -- Provided by publisher.




gh

Innovations of targeted poverty reduction governance and policy in Zhejiang Province: Insights from China’s post-2020 anti-poverty strategy [in Chinese]




gh

Starry Night Debbie Macomber.

Carrie Slayton, a big-city society-page columnist, longs to write more serious news stories. So her editor hands her a challenge: She can cover any topic she wants, but only if she first scores the paper an interview with Finn Dalton, the notoriously reclusive author. Living in the remote Alaskan wilderness, Finn has written a megabestselling memoir about surviving in the wild. But he stubbornly declines to speak to anyone in the press, and no one even knows exactly where he lives. Digging deep into Finn's past, Carrie develops a theory on his whereabouts. It is the holidays, but her career is at stake, so she forsakes her family celebrations and flies out to snowy Alaska. When she finally finds Finn, she discovers a man both more charismatic and more stubborn than she even expected. And soon she is torn between pursuing the story of a lifetime and following her heart. Filled with all the comforts and joys of Christmastime, Starry Night is a delightful novel of finding happiness in the most surprising places.




gh

Starlight Debbie Macomber.

One of cherished author Debbie Macomber's classic novels, this is an enchanting tale of a love that is challenged at every turn. At a magical Christmas fete, Karen McAlister meets a man she cannot ignore-the first man to interest her in a long while. Before she laid eyes on Rand Prescott, Karen would have said her life was complete and content . . . much to the dismay of her widowed father, who would love to see her married and settled. But everything changed that enchanted night: The stars, the moonlight, the music, and the champagne all conspired to throw two people together. But the fates are determined to pull them apart. Long ago, Rand Prescott erected a steel façade around his heart. He never had any intention of maintaining any kind of relationship with a woman. Independent, proud, and nearly blind, Rand felt he had no capacity to return a woman's love. But that was before he met Karen. In one night, she shattered all of his preconceived ideas about romance and threatened to break through his walls. Rand is convinced that Karen deserves better than the love of a blind man. Can he ever accept this beguiling woman into his life-and into his soul?




gh

Improving Diets and Nutrition through Food Systems: What Will it Take?

https://www.youtube.com/watch?v=tFqzYrQkSTQ



  • From Our Channel
  • News

gh

SpotOn London 2014: Right to be Forgotten

Panel Members Timandra Harkness – (Chair and Panel member) – Freelance science journalist, performer and




gh

Five nights at Freddy's. [2], The twisted ones : the graphic novel / by Scott Cawthon and Kira Breed-Wrisley ; adapted by Christopher Hastings ; illustrated by Claudia Aguirre ; colors by Laurie Smith and Eva de la Cruz.

"It's been a year since the horrific events at Freddy Fazbear's Pizza, and Charlie is just trying to move on. Even with the excitement of a new school and a fresh start, she's still haunted by nightmares of a masked murderer and four gruesome animatronic puppets. Charlie thinks her ordeal is over, but when a series of bodies are discovered near her school bearing wounds that are disturbingly familiar she finds herself drawn back into the world of her father's frightening creations. Something twisted is hunting Charlie, and this time if it finds her, it's not letting her go." -- Publisher's description.




gh

Demon slayer = Kimetsu no yaiba. 15, Daybreak and first light / story and art by Koyoharu Gotouge ; translation, John Werry ; English adaptation, Stan! ; touch-up art & lettering, Evan Waldinger.

"In Taisho-era Japan, Tanjiro Kamado is a kindhearted boy who makes a living selling charcoal. But his peaceful life is shattered when a demon slaughters his entire family. His little sister Nezuko is the only survivor, but she has been transformed into a demon herself! Tanjiro sets out on a dangerous journey to find a way to return his sister to normal and destroy the demon who ruined his life … Tanjiro finally chases down the main body of the upper-rank demon Hantengu. However, dawn is approaching, and the rising sun is a threat to Nezuko. Tanjiro's concern for his sister is a distraction from the focus he needs to fight Hantengu, and if he hesitates it could be the last mistake he ever makes! Elsewhere, Tamayo ponders the nature of Nezuko's curse and how she could be so different from other demons." -- Provided by publisher




gh

Batman, the Dark Knight detective. Volume 5 / Alan Grant, Archie Goodwin, writers ; pencilers, Norm Breyfogle, Dan Jurgens ; Steve Mitchell, Dick Giordano, inkers ; Adrienne Roy, colorist ; Todd Klein, letterer.

"Bruce Wayne's latest ward, Tim Drake, has all the makings of becoming the greatest Robin yet. He's intelligent, athletic, and levelheaded, and his detective skills rival those of his mentor. However, every Boy Wonder who has come before has endured tragedy, and Tim may be no exception when his parents are marked for death by the sinister Obeah Man. Will the Dark Knight stop the Obeah Man in time, or must Tim face a deadly rite of passage in order to be worthy of inheriting the mantle of Robin?"--Provided by publisher.




gh

Batman. Earth one. Volume 3 / written by Geoff Johns ; pencils by Gary Frank ; inks by Jon Sibal ; colors by Brad Anderson ; lettered by Rob Leigh ; cover by Gary Frank and Brad Anderson.

"Harvey Dent is dead. Or is he? A gang of thieves thrusts Gotham City into a state of fear when they are mysteriously well armed with military-grade weapons: flamethrowers, grenade launchers, and even tanks. And this gang claims it is funded by none other than former district attorney Harvey Dent. Bruce Wayne, balancing his two lives, must find the truth by tapping his growing network of agents, including Alfred Pennyworth, Jim Gordon, Waylon 'Killer Croc' Jones, and the savvy new Catwoman. Bruce is distracted by the seemingly impossible return of another figure believed dead: his grandfather Adrian Arkham. He must also comfort his longtime friend, Gotham City Mayor Jessica Dent, who is scarred both physically and mentally from her experience with the Riddler, which resulted in the gruesome death of her brother. But is Harvey back, plotting revenge on a city he proclaims to be guilty? When Batman discovers the truth behind these many mysteries, his entire world unravels … ." -- Page [4] of cover.




gh

Batman, White Knight presents : Harley Quinn / Katana Collins, writer, story ; Sean Murphy, story, covers ; Matteo Scalera, art, variants ; Dave Stewart, colorist ; Matt Hollingsworth, cover colors ; AndWorld Design, lettering.

"Batman: White Knight Presents: Harley Quinn takes place two years after Batman: Curse of the White Knight. Azrael has wiped out criminals in Gotham, Jack Napier (formerly The Joker) is dead, Bruce Wayne (Batman) is in prison, and Harley Quinn is adjusting to life as a single mother, raising the twins she had with Jack. But as new villains arise, Harley is forced to dance with madness once again and confront her own past with The Joker and Batman while helping the Gotham City police and an eager young FBI agent uncover the truth behind a series of gruesome murders. This collection also features a chapter from Harley Quinn's newest digital first series, Harley Quinn Black + White + Red, told in a traditional black-and-white format with the color red uniquely shaping Harley Quinn's story." -- Provided by publisher.




gh

Alexander Hamilton : the fighting founding father! / by Mark Shulman ; illustrated by Kelly Tindall ; lettering & design by Comicraft ; cover art by Ian Churchill.

"A fascinating and entertaining biography of Alexander Hamilton, in graphic novel format. Alexander Hamilton: The Fighting Founding Father!tells the story of one of the most ambitious and controversial figures in American history in a graphic novel format. From a rough childhood on the Caribbean island of Nevis to the highest levels of American politics, Alexander Hamilton's life was filled with adventure, conflict, and controversy. Full-color illustrations and an entertaining narrative make this graphical biography of America's first Secretary of the Treasury accessible for readers of all ages." -- Provided by publisher.




gh

OSC Consultation Paper 81-737 – Opportunity to Improve Retail Investor Access to Long-Term Assets through Investment Fund Product Structures

This document is only available in PDF format.




gh

Tenable Launches Tenable Enclave Security to Meet Demands of Highly Secure Environments

Tenable®, the exposure management company, today announced the availability of Tenable Enclave Security, a solution that supports the needs of customers operating in highly secure environments, such as those that are classified or otherwise air-gapped. Backed by Tenable Security Center, Tenable Enclave Security protects IT assets and modern workloads with risk assessment and contextual insight so organizations can identify exposures before they cause damage.

Federal agencies face unique security and compliance regulations when deploying cloud solutions, and Tenable Enclave Security is key to supporting public sector customers, as well as commercial organizations with strict data residency, security or privacy requirements. 

Built to support the strictest security requirements, including FedRAMP High and Impact Level 5, Tenable Enclave Security empowers agencies to know, expose and close IT and container exposures from a single, highly secure platform. This consolidated approach also eliminates tool sprawl, reduces costs and boosts efficiency for public sector organizations.

“As a leader in vulnerability management and cloud security and a longtime partner of governments all around the world, we’re perfectly positioned to tap into our expertise and deliver mission critical capabilities to assist government agencies as they transform their IT strategy and safely embrace modern workloads to speed innovation,” said Robert Huber, chief security officer and president, Tenable Public Sector, Tenable. “With Tenable Enclave Security, agencies are now able to gain a fuller understanding of their exposure and risk with the ability to continuously discover, assess and prioritize vulnerabilities across IT assets and container images, all from a single, highly secure framework.”

Tenable Enclave Security will immediately enable organizations to: 

  • Meet cloud security and data residency restrictions: Tenable Enclave Security enables customers to meet stringent cloud security and data residency requirements, such as FedRAMP High or Impact Level 5. It can meet customers’ needs wherever they reside, with the ability to be deployed on-prem, in a virtual private cloud or commercial cloud.
  • Secure containers before they hit production: As agencies modernize their infrastructure, containers create a more efficient manner to create applications and modernize existing ones. Tenable Enclave Security empowers organizations to quickly assess the risk in their container images, expose their vulnerabilities and understand the breadth of impact.
  • Centralize security tools: Unlike siloed solutions with fragmented visibility, Tenable Enclave Security provides protection for IT assets and modern workloads from a single deployment architecture. 

For more information on Tenable Enclave Security, please visit: https://www.tenable.com/products/enclave-security 

About Tenable

Tenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com

###

Media Contact:

Tenable

tenablepr@tenable.com




gh

Moving through grief : proven techniques for finding your way after any loss / Gretchen Kubacky, PsyD.

Overcoming your pain-proven strategies for grief recovery Coping with loss is difficult, but that doesn't mean you have to suffer alone. Based on the proven-effective acceptance and commitment therapy (ACT) treatment, Moving Through Grief provides simple and effective techniques to help you get unstuck and start living a rich and fulfilling life again, loss and all. ACT is all about embracing what hurts and committing to actions that will improve and enrich your life. Whether you're dealing with the loss of a loved one, your health, home, or even career, Moving Through Grief provides you with creative exercises that will help you work through your pain and reconnect with the things you love. In Moving Through Grief, you will learn: - How you can show up for your life and experience joy and satisfaction again, even as you work through the pain of your loss -Ddiscover how the six tools of ACT-values, committed action, acceptance, being present, cognitive diffusion, and self-as-context-can ease your pain and aid with the healing process - And make real progress towards feeling like yourself again with straightforward exercises, like identifying your values and setting realistic goals. Find out how ACT can change the way you relate to your pain with Moving Through Grief.




gh

Moxie : Moxie girls fight back / Jennifer Mathieu.

Punk rock zines inspire a feminist revolution at a small town Texan high school in the new novel from Jennifer Matheiu, author of The Truth About Alice. MOXIE GIRLS FIGHT BACK! Vivian Carter's mom was a Riot Grrrl in the 1990s, but now she and Viv live a pretty quiet life in a small Texas town. When Viv witnesses a series of sexist incidents at her high school, she takes a page from her mom's past and makes a feminist zine that she distributes anonymously to her classmates. Viv is just blowing off steam, but before she knows it, she's started a revolution. The latest novel from Jennifer Mathieu offers everything fans love about her writing-a relatable protagonist with a distinct voice, a conflict relevant to current events, and ultimately a story that is both heartbreaking and hopeful.




gh

La National Gallery presenta «Van Gogh: Poetas y amantes»

La National Gallery presenta «Van Gogh: Poetas y amantes» Con motivo de su 200 aniversario,...




gh

El Museo Van Gogh celebra 150 años de Impresionismo en «¡Vive l’impressionnisme!»

El Museo Van Gogh celebra 150 años de Impresionismo en «¡Vive l’impressionnisme!» Del 11 de...




gh

Dear Lilly : from father to daughter : the truth about life, love, and the world we live in.

A father offers his advice, opinions, and the many useful stories gleaned from his past experiences in order to help his beloved daughter not only survive, but thrive in the dangerous and unpredictable world of young adulthood. From the pen of a former abused child, drug addict, womanizing frat boy, and suicidal depressive, comes forth the emotionally stirring account of a young man's battle with crippling inner demons and his eventual road to enlightenment. Peter Greyson calls upon his wisdom as both father and school teacher to gently lead teenage girls through a maze of truth, deception, and adolescent uncertainty. Greyson's literary style sparkles with a youthful enthusiasm that will capture your heart and provide boundless inspiration. Dear Lilly is a survival guide that offers the brutally honest male perspective to young women struggling for answers to life's deepest questions. Topics include: Boys lie What every guy wants from his girlfriend Tales from the drug world Everybody hurts High school exposed




gh

The National Gallery presents “Van Gogh: Poets and Lovers”

The National Gallery presents “Van Gogh: Poets and Lovers” To mark its 200th anniversary, the...




gh

Van Gogh Museum celebrates 150 years of Impressionism in “Vive l’impressionnisme!”

Van Gogh Museum celebrates 150 years of Impressionism in “Vive l’impressionnisme!” From 11 October 2024...




gh

Reducing food loss and waste for climate outcomes: Insights from national consultations in Bangladesh, Malawi and Nepal

Reducing food loss and waste for climate outcomes: Insights from national consultations in Bangladesh, Malawi and Nepal

Integrating key goals of food system transformation.

The post Reducing food loss and waste for climate outcomes: Insights from national consultations in Bangladesh, Malawi and Nepal appeared first on IFPRI.