ui EEOC Issues Guidance on Use of AI By www.littler.com Published On :: Thu, 25 May 2023 17:16:11 +0000 Jim Paretti said the EEOC’s new guidance explaining the application of Title VII of the Civil Rights Act of 1964 to automated systems that incorporate artificial intelligence in a range of HR-related uses is a wake-up call to employers. SHRM Online View (Subscription required.) Full Article
ui C-Suite Executives Committed to Inclusion, Equity and Diversity Despite Backlash and Legal Challenges, Littler Survey Finds By www.littler.com Published On :: Mon, 08 Jan 2024 18:25:35 +0000 (January 10, 2024) – Littler, the world’s largest employment and labor law practice representing management, has released its Inclusion, Equity and Diversity (IE&D) C-Suite Survey Report, completed by more than 320 C-suite executives across the United States. Full Article
ui Littler Ranked in 2024 Chambers USA Guide By www.littler.com Published On :: Wed, 05 Jun 2024 19:41:52 +0000 (June 6, 2024) – Littler, the world’s largest employment and labor law practice representing management, and its attorneys have again been recognized by Chambers and Partners in its Chambers USA 2024 guide. Based on in-depth market analysis and independent study, the Chambers USA guide ranks the leading lawyers and law firms across all 50 states and Washington, D.C., covering hundreds of practice areas. Full Article
ui Littler Recognized in 2025 Chambers Latin America Guide By www.littler.com Published On :: Thu, 22 Aug 2024 17:19:11 +0000 (August 22, 2024) – Littler, the world’s largest employment and labour law practice representing management, and its attorneys in several Latin American offices have once again been recognized by Chambers and Partners in the Chambers Latin America 2025 guide. Littler’s Colombia and Costa Rica offices earned a Band 1 ranking for Labour & Employment and its Mexico, Puerto Rico and Venezuela offices received band rankings in the same practice area. In addition, the following attorneys were named as leaders in the field for the Labour & Employment practice area: Full Article
ui C-Suite Executives Are Advancing Workplace Generative AI Policies as Risks Mount, Littler Survey Finds By www.littler.com Published On :: Thu, 19 Sep 2024 16:37:55 +0000 Survey also reveals significant misalignment among top executives, posing challenges for effective AI risk management Littler, the world’s largest employment and labor law practice representing management, has released its 2024 AI C-Suite Survey Report, completed by more than 330 C-suite executives across the United States. Full Article
ui Write it down: California's Freelance Worker Protection Act imposes new requirements for engaging independent contractors By www.littler.com Published On :: Tue, 29 Oct 2024 19:34:54 +0000 Joy C. Rosenquist, Rick Reyes and Blair C. Senesi examine California’s new Freelance Worker Protection Act (FWPA), which aims to provide greater protections to freelance workers. Wolters Kluwer View (Subscription required) Full Article
ui Illinois Guidance Finds Law Does Not Prohibit Private Employers from Using E-Verify By www.littler.com Published On :: Wed, 30 Oct 2024 21:03:49 +0000 The Illinois Department of Labor (IDOL) has just issued some much-needed guidance, through Frequently Asked Questions (FAQs), on whether enrollment and use of E-Verify is prohibited in Illinois for private employers that do not have federal contracts. The answer is NO. Full Article
ui Ontario, Canada Appellate Court Provides Guidance to Employers on How to Draft Employment Settlement Documents By www.littler.com Published On :: Mon, 11 Nov 2024 20:13:37 +0000 The Court of Appeal for Ontario found that settlement documents signed after an employee separated from employment prevented him from suing for the value of vested stock options. The OCA emphasized that the employee had executed the settlement documents with the benefit of legal advice and that they clearly released the employee’s entitlement to the damages claimed. Full Article
ui California’s SB 1047 establishes stringent requirements for large-scale AI models By www.littler.com Published On :: Tue, 16 Apr 2024 15:08:24 +0000 Niloy Ray and Alice H. Wang say California’s Senate Bill 1047 represents another significant step forward in the state’s wide-ranging efforts to regulate the development and use of AI. Daily Journal View (Subscription required) Full Article
ui A Comprehensive Global Guide for AI Data Protection in the Workplace By www.littler.com Published On :: Fri, 19 Apr 2024 14:30:57 +0000 Zoe Argento, Kwabena Appenteng, Alyssa Daniels, Philip Gordon, Rajko Herrmann, Soowon Hong, Renata Neeser, Naomi Seddon, Christina Stogov and Grace Yang share a comprehensive guide for how employers can ensure data protection as they implement artificial intelligence. Corporate Compliance Insights View Full Article
ui Netherlands issues guidance on using AI chatbots By www.littler.com Published On :: Thu, 22 Aug 2024 15:18:00 +0000 Stephan Swinkels says some data breaches are inevitable and employers must move quickly to minimize the damage in the event of a breach. International Employment Lawyer View (Subscription required) Full Article
ui German firms not required to pay “to the top” for gender pay gaps By www.littler.com Published On :: Thu, 07 Nov 2024 14:39:14 +0000 Sabine Vianden discusses the German Pay Transparency Act and how it can help solve the gender pay gap discrepancies in Germany. International Employment Lawyer View (Subscription required) Full Article
ui ETSI re-elects Director-General Luis Jorge Romero By www.etsi.org Published On :: Tue, 02 Jul 2019 08:25:56 GMT ETSI re-elects Director-General Luis Jorge Romero Sophia Antipolis, 2 April 2019 During their 73rd General Assembly, 2-3 April 2019, ETSI members re-elected the current ETSI Director-General Mr. Luis Jorge Romero with an overwhelming majority on the first ballot. Read More... Full Article
ui ETSI publishes a white paper on Network Transformation - Building on key technologies for 5G By www.etsi.org Published On :: Thu, 28 Apr 2022 09:23:58 GMT ETSI publishes a white paper on Network Transformation - Building on key technologies for 5G SDN NFV World Congress, The Hague, 14 October 2019 ETSI is proud to announce the availability of a new white paper, entitled Network Transformation: Orchestration, Network and Service Management Framework, written by several of its Industry Specification Groups’ (ISG) Chairs. These groups have released specifications on key building block technologies for next-generation networks, feeding the 3GPP 5G specifications. Read More... Full Article
ui ETSI Multi-access Edge Computing builds on NFV and network slicing By www.etsi.org Published On :: Thu, 28 Apr 2022 13:55:37 GMT ETSI Multi-access Edge Computing builds on NFV and network slicing Sophia Antipolis, 15 January 2020 The ETSI Multi-access Edge Computing Industry Specification Group is pleased to announce the release of two major reports as part of its Phase 2 work. The report ETSI GR MEC 027 studies the impact of alternative virtualization technologies. The second report, ETSI GR MEC 024, examines network slicing on edge computing systems. Read More... Full Article
ui ETSI releases Technical Report on requirements for smart lifts for IoT By www.etsi.org Published On :: Thu, 28 Apr 2022 06:19:22 GMT ETSI releases Technical Report on requirements for smart lifts for IoT Sophia Antipolis, 4 June 2020 To facilitate upcoming standards, the ETSI SmartM2M technical committee has released ETSI TR 103 546, a Technical Report on smart lifts, collecting and developing the type and range of data which should be exchanged between lifts and their relevant management applications. This study paves the way for technical requirements to monitor the activities and the performance of such lifts and describe their interaction with IoT devices and applications. Read More... Full Article
ui ETSI releases Technical Report on Citizen Requirements for Smart Cities By www.etsi.org Published On :: Thu, 28 Apr 2022 09:28:29 GMT ETSI releases Technical Report on Citizen Requirements for Smart Cities Sophia Antipolis, 9 November 2020 The ETSI Human Factors Technical Committee has released ETSI TR 103 455, a Technical Report that assesses the different citizen-related issues that smart city-related standardization in the ICT domain needs to address. These include fundamental aspects such as accessibility, usability, interoperability, personal data protection and security, and how services to citizens are to be designed to maximize benefits to the community. The study gives an overview of existing ETSI and other SDOs standards in that field, including ETSI community indicators. It aligns well with the UN Sustainable Development Goal 11 "Make cities inclusive, safe, resilient and sustainable". Read More... Full Article
ui ETSI Top 10 Webinars in 2020 - Starring: cybersecurity, the Radio Equipment Directive, the new smart secure platform and AI By www.etsi.org Published On :: Tue, 08 Dec 2020 14:30:10 GMT ETSI Top 10 Webinars in 2020 - Starring: cybersecurity, the Radio Equipment Directive, the new smart secure platform and AI Sophia Antipolis, 8 December 2020 As 2020 comes to an end, we have selected for you our most popular webinars of the year. If you missed them, listen to the recorded presentations and their Q&A sessions, deep dive into cybersecurity novelties, discover the RED latest developments and find out about the new smart secure platform and AI. Read More... Full Article
ui Draft of ETSI Coordinated vulnerability disclosure guide available for public comments By www.etsi.org Published On :: Tue, 24 Aug 2021 09:07:17 GMT Draft of ETSI Coordinated vulnerability disclosure guide available for public comments Sophia Antipolis, 24 August 2021 ETSI will soon release a Guide to Coordinated Vulnerability Disclosure. Before publication, it made the draft publicly available for comments. Please send your feedback by 15 September to the technical committee CYBER at cybersupport@etsi.org Read More... Full Article
ui ETSI simplifies ICT end-users’ lives with a guide available in 19 European languages By www.etsi.org Published On :: Thu, 21 Jul 2022 08:21:40 GMT ETSI simplifies ICT end-users’ lives with a guide available in 19 European languages Sophia Antipolis, 21 July 2022 ETSI is pleased to announce the new version of the ETSI Guide EG 203 499, developed by experts from the Human Factors Technical Committee. The guide aims to further simplify end-user access to ICT devices, services and applications by providing recommended terms for basic and commonly used ICT-related objects and activities, notably the terms that end users are commonly exposed to. Read More... Full Article
ui New ETSI specification allows single UICC to support the use of multiple applications simultaneously By www.etsi.org Published On :: Thu, 27 Oct 2022 09:48:19 GMT New ETSI specification allows single UICC to support the use of multiple applications simultaneously Sophia Antipolis, 26 October 2022 New specifications released by ETSI will enable multiple subscriptions and identities to exist in the same smartphone handset without needing several SIM cards to be within the device. The mobile telecom industry has been facing an increasing demand for applications running on mobile devices like banking, payments, transport and identity for some time. These new specifications address this demand by adding the possibility to host and address several "virtual secure elements" into the same UICC. This allows multiple virtual secure elements to coexist logically separated, whilst having the ability to be addressed independently through the same physical interface. Read More... Full Article
ui New White Paper Explores ETSI TeraFlowSDN Alignment with TIP OOPT MUST Requirements By www.etsi.org Published On :: Sat, 30 Sep 2023 15:13:52 GMT Sophia Antipolis, 27 September 2023 The Telecom Infra Project (TIP) Open Optical & Packet Transport (OOPT) group is making significant strides in advancing network management and interoperability. Read More... Full Article
ui ETSI Releases New Guidelines to Enhance Cyber-security for Consumer IoT Devices By www.etsi.org Published On :: Thu, 31 Oct 2024 10:43:56 GMT Sophia Antipolis, 31 October 2024 Protect Confidentiality, Integrity and Availability of Data as Smart Devices Proliferate. Read More... Full Article
ui CSA Notice Regarding Coordinated Blanket Order 96-932 Re Temporary Exemptions from Certain Derivatives Data Reporting Requirements By www.osc.ca Published On :: Wed, 30 Oct 2024 18:15:28 GMT This document is only available as a PDF. Full Article
ui SpotOn London 2012 Storify: Collaborating and building your online presence: educating scientists and science students By www.nature.com Published On :: Wed, 21 Nov 2012 10:24:27 +0000 Jenny Evans has created a Storify summary of her SpotOn London session: Collaborating and building your online Full Article Featured SpotOn London (#SoLo) Storifys Tools #solo12edu
ui Cybersecurity Snapshot: New Guides Offer Best Practices for Preventing Shadow AI and for Deploying Secure Software Updates By www.tenable.com Published On :: Fri, 25 Oct 2024 09:00:00 -0400 Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer valuable tips. Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards.Dive into six things that are top of mind for the week ending Oct. 25.1 - CSA: How to prevent “shadow AI” As organizations scale up their AI adoption, they must closely track their AI assets to secure them and mitigate their cyber risk. This includes monitoring the usage of unapproved AI tools by employees — an issue known as “shadow AI.”So how do you identify, manage and prevent shadow AI? You may find useful ideas in the Cloud Security Alliance’s new “AI Organizational Responsibilities: Governance, Risk Management, Compliance and Cultural Aspects” white paper.The white paper covers shadow AI topics including:Creating a comprehensive inventory of AI systemsConducting gap analyses to spot discrepancies between approved and actual AI usageImplementing ways to detect unauthorized AI waresEstablishing effective access controlsDeploying monitoring techniques “By focusing on these key areas, organizations can significantly reduce the risks associated with shadow AI, ensuring that all AI systems align with organizational policies, security standards, and regulatory requirements,” the white paper reads.For example, to create an inventory that offers the required visibility into AI assets, the document explains different elements each record should have, such as:The asset’s descriptionInformation about its AI modelsInformation about its data sets and data sourcesInformation about the tools used for its development and deploymentDetailed documentation about its lifecycle, regulatory compliance, ethical considerations and adherence to industry standardsRecords of its access control mechanismsShadow AI is one of four topics covered in the publication, which also unpacks risk management; governance and compliance; and safety culture and training.To get more details, read:The full “AI Organizational Responsibilities: Governance, Risk Management, Compliance and Cultural Aspects” white paperA complementary slide presentationThe CSA blog “Shadow AI Prevention: Safeguarding Your Organization’s AI Landscape”For more information about AI security issues, including shadow AI, check out these Tenable blogs:“Do You Think You Have No AI Exposures? Think Again”“Securing the AI Attack Surface: Separating the Unknown from the Well Understood”“Never Trust User Inputs -- And AI Isn't an Exception: A Security-First Approach”“6 Best Practices for Implementing AI Securely and Ethically”“Compromising Microsoft's AI Healthcare Chatbot Service”2 - Best practices for secure software updatesThe security and reliability of software updates took center stage in July when an errant update caused massive and unprecedented tech outages globally.To help prevent such episodes, U.S. and Australian cyber agencies have published “Safe Software Deployment: How Software Manufacturers Can Ensure Reliability for Customers.”“It is critical for all software manufacturers to implement a safe software deployment program supported by verified processes, including robust testing and measurements,” reads the 12-page document.Although the guide is aimed primarily at commercial software vendors, its recommendations can be useful for any organization with software development teams that deploy updates internally. The guide outlines key steps for a secure software development process, including planning; development and testing; internal rollout; and controlled rollout. It also addresses errors and emergency protocols.“A safe software deployment process should be integrated with the organization’s SDLC, quality program, risk tolerance, and understanding of the customer’s environment and operations,” reads the guide, authored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the FBI and the Australian Cyber Security Centre.To get more details, read:The “Safe Software Deployment: How Software Manufacturers Can Ensure Reliability for Customers” guideThe CISA alert “CISA, US, and International Partners Release Joint Guidance to Assist Software Manufacturers with Safe Software Deployment Processes”For more information about secure software updates:“Tenable’s Software Update Process Protects Customers’ Business Continuity with a Safe, Do-No-Harm Design” (Tenable)“The critical importance of robust release processes” (Cloud Native Computing Foundation)“Software Deployment Security: Risks and Best Practices” (DevOps.com)“Software Updates, A Double-Edged Sword for Cybersecurity Professionals” (Infosecurity)“DevOps Best Practices for Faster and More Reliable Software Delivery” (DevOps.com)3 - Report: GenAI, attack variety, data security drive cyber strategiesWhat issues act as catalysts for organizations’ cybersecurity actions today? Hint: They’re fairly recent concerns. The promise and peril of generative AI ranks first. It’s closely followed by the ever growing variety of cyberattacks; and by the intensifying urgency to protect data.That’s according to CompTIA’s “State of Cybersecurity 2025” report, based on a survey of almost 1,200 business and IT pros in North America and in parts of Europe and Asia. These three key factors, along with others like the scale of attacks, play a critical role in how organizations currently outline their cybersecurity game plans.“Understanding these drivers is essential for organizations to develop proactive and adaptive cybersecurity strategies that address the evolving threat landscape and safeguard their digital assets,” reads a CompTIA blog about the report.Organizations are eagerly trying to understand both how generative AI can help their cybersecurity programs and how this technology is being used by malicious actors to make cyberattacks harder to detect and prevent.Meanwhile, concern about data protection has ballooned in the past couple of years. “As organizations become more data-driven, the need to protect sensitive information has never been more crucial,” reads the blog.Not only are organizations focused on securing data at rest, in transit and in use, but they’re also creating foundational data-management practices, according to the report.“The rise of AI has accelerated the need for robust data practices in order to properly train AI algorithms, and the demand for data science continues to be strong as businesses seek competitive differentiation,” the report reads.To get more details, read:The report’s announcement “Cybersecurity success hinges on full organizational support, new CompTIA report asserts”CompTIA’s blogs “Today’s top drivers for cybersecurity strategy” and “Cybersecurity’s maturity: CompTIA’s State of Cybersecurity 2025 report”The full “State of Cybersecurity 2025” reportFor more information about data security posture management (DSPM) and preventing AI-powered attacks, check out these Tenable resources:“Harden Your Cloud Security Posture by Protecting Your Cloud Data and AI Resources” (blog)“Know Your Exposure: Is Your Cloud Data Secure in the Age of AI?” (on-demand webinar)“The Data-Factor: Why Integrating DSPM Is Key to Your CNAPP Strategy” (blog)“Mitigating AI-Related Security Risks” (on-demand webinar)“Securing the AI Attack Surface: Separating the Unknown from the Well Understood” (blog)4 - CISA lists software dev practices most harmful for securityRecommended best practices abound in the cybersecurity world. However, CISA and the FBI are taking the opposite tack in their quest to improve the security of software products: They just released a list of the worst security practices that software manufacturers ought to avoid.Titled “Product Security Bad Practices,” the document groups the “no-nos” into three main categories: product properties; security features; and organizational processes and policies.“It’s 2024, and basic, preventable software defects continue to enable crippling attacks against hospitals, schools, and other critical infrastructure. This has to stop,” CISA Director Jen Easterly said in a statement.“These product security bad practices pose unacceptable risks in this day and age, and yet are all too common,” she added. Here are some of the worst practices detailed in the document, which is part of CISA’s “Secure by Design” effort:Using programming languages considered “memory unsafe”Including user-provided input in SQL query stringsReleasing a product with default passwordsReleasing a product with known and exploited vulnerabilitiesNot using multi-factor authenticationFailing to disclose vulnerabilities in a timely mannerAlthough the guidance is aimed primarily at software makers whose products are used by critical infrastructure organizations, the recommendations apply to all software manufacturers.If you’re interested in sharing your feedback with CISA and the FBI, you can submit comments about the document until December 16, 2024 on the Federal Register.To get more details, check out:CISA’s announcement “CISA and FBI Release Product Security Bad Practices for Public Comment”The full document “Product Security Bad Practices”For more information about how to develop secure software:“Tenable Partners with CISA to Enhance Secure By Design Practices” (Tenable)“Ensuring Application Security from Design to Operation with DevSecOps” (DevOps.com)“What is application security?” (TechTarget)“Guidelines for Software Development (Australian Cyber Security Centre)5 - New EU law focuses on cybersecurity of connected digital productsMakers of digital products — both software and hardware — that directly or indirectly connect to networks and to other devices will have to comply with specific cybersecurity safeguards in the European Union.A newly adopted law known as the “Cyber Resilience Act” outlines cybersecurity requirements for the design, development, production and lifecycle maintenance of these types of products, including IoT wares such as connected cars. For example, it specifies a number of “essential cybersecurity requirements” for these products, including that they:Aren’t shipped with known exploitable vulnerabilitiesFeature a “secure by default” configurationCan fix their vulnerabilities via automatic software updatesOffer access protection via control mechanisms, such as authentication and identity managementProtect the data they store, transmit and process using, for example, at-rest and in-transit encryption“The new regulation aims to fill the gaps, clarify the links, and make the existing cybersecurity legislative framework more coherent, ensuring that products with digital components (...) are made secure throughout the supply chain and throughout their lifecycle,” reads a statement from the EU’s European Council.The law will “enter into force” after its publication in the EU’s official journal and will apply and be enforceable 36 months later, so most likely in October 2027 or November 2027. However, some of its provisions will be enforceable a year prior.For more information and analysis about the EU’s Cyber Resilience Act:“Cyber Resilience Act Requirements Standards Mapping” (ENISA)“The Cyber Resilience Act, an Accidental European Alien Torts Statute?” (Lawfare)“EU Cybersecurity Regulation Adopted, Impacts Connected Products” (National Law Review)“Open source foundations unite on common standards for EU’s Cyber Resilience Act” (TechCrunch)“The Cyber Resilience Act: A New Era for Mobile App Developers” (DevOps.com)VIDEOThe EU Cyber Resilience Act: A New Era for Business Engagement in Open Source Software (Linux Foundation) 6 - UK cyber agency: CISOs must communicate better with boardsCISOs and boards of directors are struggling to understand each other, and this is increasing their organizations’ cyber risk, new research from the U.K.’s cyber agency has found.For example, in one alarming finding, 80% of respondents, which included board members, CISOs and other cyber leaders in medium and large enterprises, confessed to being unsure of who is ultimately accountable for cybersecurity in their organizations.“We found that in many organisations, the CISO (or equivalent role) thought that the Board was accountable, whilst the Board thought it was the CISO,” reads a blog about the research titled “How to talk to board members about cyber.”As a result, the U.K. National Cyber Security Centre (NCSC) has released new guidance aimed at helping CISOs better communicate with their organizations’ boards titled “Engaging with Boards to improve the management of cyber security risk.”“Cyber security is a strategic issue, which means you must engage with Boards on their terms and in their language to ensure the cyber risk is understood, managed and mitigated,” the document reads.Here’s a small sampling of the advice:Understand your audience, including who are the board’s members and their areas of expertise; and how the board works, such as its meeting formats and its committees.Talk about cybersecurity in terms of risks, and outline these risks concretely and precisely, presenting them in a matter-of-fact way.Don’t limit your communication with board members to formal board meetings. Look for opportunities to talk to them individually or in small groups outside of these board meetings.Elevate the discussions so that you link cybersecurity with your organization’s business challenges, goals and context.Aim to provide a holistic view, and avoid using technical jargon.Aim to advise instead of to educate. Full Article
ui Canadian securities regulators publish coordinated blanket orders to provide temporary exemptions from certain derivatives data reporting requirements By www.osc.ca Published On :: Wed, 30 Oct 2024 17:52:49 GMT TORONTO – The Canadian Securities Administrators (CSA) today published Full Article
ui Outcast. Volume 2, A vast and unending ruin / Robert Kirkman, creator, writer ; Paul Azaceta, artist ; Elizabeth Breitweiser, colorist ; Rus Wooton, letterer. By library.gcpl.lib.oh.us Published On :: Kyle Barnes has been plagued by demonic possession all his life. In light of recent revelations, he finally feels like he's starting to piece together the answers he's looking for. But while he feels a new sense of purpose is Reverend Anderson's life falling apart? Full Article
ui Dune. House Atreides. Volume 1 / written by Brian Herbert & Kevin J. Anderson ; illustrated by Dev Pramanik ; lettered by Ed Dukeshire ; colored by Alex Guimarães ; cover by Jae Lee & June Chung. By library.gcpl.lib.oh.us Published On :: "Set in the years leading up the Hugo and Nebula Award-winning Dune— 'Dume: House Atreides transports readers to the far future on the desert planet Arrakis where Pardot Kynes seeks its secrets. Meanwhile, a violent coup is planned by the son of Emperor Elrood; an eight-year-old slave Duncan Idaho seeks to escape his cruel masters; and a young man named Leto Atreides begins a fateful journey. These unlikely souls are drawn together first as renegades and then as something more, as they discover their true fate— to change the very shape of history!" -- Description provided by publisher. Full Article
ui The Gods of Guilt Michael Connelly. By library.gcpl.lib.oh.us Published On :: Mickey Haller gets the text, "Call me ASAP - 187," and the California penal code for murder immediately gets his attention. Murder cases have the highest stakes and the biggest paydays, and they always mean Haller has to be at the top of his game. When Mickey learns that the victim was his own former client, a prostitute he thought he had rescued and put on the straight and narrow path, he knows he is on the hook for this one. He soon finds out that she was back in LA and back in the life. Far from saving her, Mickey may have been the one who put her in danger. Full Article
ui Investor Alert: Investors are not required to use claims management companies to communicate with the CSA, CIRO or OBSI By www.osc.ca Published On :: Tue, 19 Mar 2024 13:08:50 GMT TORONTO – The Canadian Securities Administrators (CSA), the Canadian Investment Regulatory Organization (CIRO), and the Ombudsman for Banking Services and Investments (OBSI) remind investors that they all offer investors services related to claims or complaints free of charge. Full Article
ui Five nights at Freddy's. [2], The twisted ones : the graphic novel / by Scott Cawthon and Kira Breed-Wrisley ; adapted by Christopher Hastings ; illustrated by Claudia Aguirre ; colors by Laurie Smith and Eva de la Cruz. By library.gcpl.lib.oh.us Published On :: "It's been a year since the horrific events at Freddy Fazbear's Pizza, and Charlie is just trying to move on. Even with the excitement of a new school and a fresh start, she's still haunted by nightmares of a masked murderer and four gruesome animatronic puppets. Charlie thinks her ordeal is over, but when a series of bodies are discovered near her school bearing wounds that are disturbingly familiar she finds herself drawn back into the world of her father's frightening creations. Something twisted is hunting Charlie, and this time if it finds her, it's not letting her go." -- Publisher's description. Full Article
ui Catwoman. Soulstealer : the graphic novel / based on the novel written by Sarah J. Maas ; adapted by Louise Simonson ; illustrated by Samantha Dodge with Carl Potts and Brett Ryans ; colors by Shari Chankhamma ; letters by Saida Temofonte. By library.gcpl.lib.oh.us Published On :: Selina Kyle returns to Gotham City as new socialite Holly Vanderhees, but she needs to outsmart rival Batwing to rise to the top of the city's criminal underbelly. Full Article
ui Batman, White Knight presents : Harley Quinn / Katana Collins, writer, story ; Sean Murphy, story, covers ; Matteo Scalera, art, variants ; Dave Stewart, colorist ; Matt Hollingsworth, cover colors ; AndWorld Design, lettering. By library.gcpl.lib.oh.us Published On :: "Batman: White Knight Presents: Harley Quinn takes place two years after Batman: Curse of the White Knight. Azrael has wiped out criminals in Gotham, Jack Napier (formerly The Joker) is dead, Bruce Wayne (Batman) is in prison, and Harley Quinn is adjusting to life as a single mother, raising the twins she had with Jack. But as new villains arise, Harley is forced to dance with madness once again and confront her own past with The Joker and Batman while helping the Gotham City police and an eager young FBI agent uncover the truth behind a series of gruesome murders. This collection also features a chapter from Harley Quinn's newest digital first series, Harley Quinn Black + White + Red, told in a traditional black-and-white format with the color red uniquely shaping Harley Quinn's story." -- Provided by publisher. Full Article
ui Blades of freedom / Blades of Freedom: A Tale of Haiti, Napoleon, and the Louisiana Purchase Nathan Hale. By library.gcpl.lib.oh.us Published On :: Presents, in graphic novel format, the story of the Haitian Revolution and its role in Napoleon's decision to sell Thomas Jefferson and James Monroe the whole Louisiana Territory, when they sought to buy only New Orleans. Full Article
ui Yo-kai watch. 17 / story and art by Noriyuki Konishi ; original concept and supervised by Level-5 Inc. ; translation, Tetsuichiro Miyaki ; English adaptation, Aubrey Sitterson ; lettering, John Hunt. By library.gcpl.lib.oh.us Published On :: "Nate Adams is just an average kid until the mysterious Whisper gives him the Yo-kai Watch. Now he can see what others cannot: Yo-kai of all shapes and forms! … A mysterious door opens, causing Nate to run into weird and wacky Yo-kai from the past, present and future. Watch as they participate in a battle royale to decide which Yo-kai is the strongest!" -- Provided by publisher. Full Article
ui Pokémon. Sun & Moon. Volume 10 / story, Hidenori Kusaka ; art, Satoshi Yamamoto ; translation, Tetsuichiro Miyaki ; English adaptation, Bryant Turnage ; touch-up & lettering, Susan Daigle-Leach. By library.gcpl.lib.oh.us Published On :: "Sun dreams of money. Moon dreams of scientific discoveries. When their paths cross with Team Skull, both their plans go awry … Lost in an alternate dimension, Sun and Moon battle to help their new friends defend the eternally dark city of Ultra Megalopolis. But then a betrayal deprives them of their transportation home! Meanwhile, what surprising news does Lillie receive?" -- Provided by publisher Full Article
ui Continuing collaboration with FAO toward the SDGs By dgcorner.ifpri.info Published On :: Tue, 10 Dec 2019 19:36:54 +0000 I had the pleasure of meeting with FAO Director-General Qu Dongyu in Rome this week. On behalf of IFPRI, I had the chance to renew the Memorandum of Understanding with FAO to further strengthen collaboration and partnership toward our shared goal of achieving the Sustainable Development Goals (SDGs) by 2030. Building on successful IFPRI-FAO partnerships, […] Full Article DG Corner Homepage Feature Events News Posts collaboration data FAO food systems nutrition partnership policy research SDGs
ui Mr. louie is screwy! / Dan Gutman. By library.gcpl.lib.oh.us Published On :: Valentines Day is just around the corner, and Mr. Louie, the hippie crossing guard, wants everyone to fall in love. So he puts a secret love potion in the water fountain. Will A.J. have to kiss Andrea? Full Article
ui El MFAH es la sede exclusiva en EE.UU. de «El mundo de Gauguin» By theartwolf.com Published On :: Sun, 03 Nov 2024 07:02:01 +0000 El MFAH es la sede exclusiva en EE.UU. de «El mundo de Gauguin» Del 3... Full Article
ui Dear Isaac Newton, you're ruining my life / Rachel Hruza. By library.gcpl.lib.oh.us Published On :: As if seventh grade isn't hard enough, Truth Trendon learns she has to wear a back brace to help her worsening scoliosis. She decides gravity is to blame for curving her spine and ruining her life. Thanks for nothing, Isaac Newton! Truth's brace is hard plastic, tight, and uncomfortable. She has to wear a t-shirt under it and bulky clothes over it, making her feel both sweaty and unfashionable. She's terrified that her classmates are going to find out about it. But it's hard keeping it a secret (especially when gym class is involved), and secrets quickly turn into lies. When Truth's crush entrusts her with a big secret of his own, it leads to even more lying. Add to that a fight with her best friend, a looming school-wide presentation, and mean rumors, and it's a recipe for disaster. As Truth navigates the ups and downs of middle school, can she learn to accept her true self, curvy spine and all? Full Article
ui Dear lord.... Love, Efua! / Amazing Grace Louis Danso. By library.gcpl.lib.oh.us Published On :: Efua has one dream; to make it out of Gedu village as an accomplished author. Through a rare opportunity afforded by her school, Gedu Junior Secondary School, Efua begins on a journey to achieve her dreams. On the road to success, she encounters many obstacles that seem insurmountable: lack of support from an important family member, a broken friendship, and cruelty at the hands of a virtual stranger. Her faith in God pushes her to dream big. But when trials and tribulations hit, will Efuas faith stand the test of time? Will she survive? Can she keep her dream alive? Will God grow silent or respond to the earnest prayers of a 15 year old girl who is on the verge of losing all hope? In Dear Lord Love, Efua! Amazing Grace Lois Danso, author of Bound By Kente, tells an unforgettable, touching tale of the love, faith, and hope of a young girl determined to achieve her dreams in a city that is a melting pot of hospitality and cruelty, dreams and reality, opportunities and disappointments, success and failures. Full Article
ui Données de population sur la République démocratique du Congo : Peut-on réduire les marges d'imprécision ? By www.ifpri.org Published On :: Wed, 14 Sep 2022 5:05:01 EDT Full Article
ui Une analyse comparative des méthodes de mise á jour et de rééquilibrage des matrices de comptabilité sociale By www.ifpri.org Published On :: Thu, 29 Sep 2022 5:05:01 EDT Les modèles d’équilibre général calculable (MEGC), largement admis dans la littérature et utilisés comme outils d’analyse d’impacts potentiels de politiques économiques, sont alimentés par des données provenant de la Matrice de Comptabilité Sociale (MCS). Celle-ci appartient à la grande famille des comptes nationaux, représentant l’ensemble des interrelations entre les activités, les institutions d’une économie. Full Article
ui The MFAH is the exclusive U.S. Venue for “Gauguin’s World” By theartwolf.com Published On :: Sun, 03 Nov 2024 07:04:01 +0000 The MFAH is the exclusive U.S. Venue for “Gauguin’s World” From November 3, 2024, through... Full Article
ui Identifying guidelines for the design of conditional credit programs to promote sustainable agricultural practices in Latin America By www.ifpri.org Published On :: Tue, 03 Sep 2024 16:14:37 +0000 Identifying guidelines for the design of conditional credit programs to promote sustainable agricultural practices in Latin America Tools for food system policy development. The post Identifying guidelines for the design of conditional credit programs to promote sustainable agricultural practices in Latin America appeared first on IFPRI. Full Article
ui Survey: Rural Papua New Guinea faces an array of food security challenges By www.ifpri.org Published On :: Fri, 18 Oct 2024 18:33:36 +0000 Survey: Rural Papua New Guinea faces an array of food security challenges Starch-heavy diets, the reach of extension instruction, and other issues. The post Survey: Rural Papua New Guinea faces an array of food security challenges appeared first on IFPRI. Full Article
ui World Cities Day 2024: Building more inclusive, sustainable, and resilient urban food systems By www.ifpri.org Published On :: Thu, 31 Oct 2024 16:12:18 +0000 World Cities Day 2024: Building more inclusive, sustainable, and resilient urban food systems IFPRI researchers on urbanization. The post World Cities Day 2024: Building more inclusive, sustainable, and resilient urban food systems appeared first on IFPRI. Full Article
ui Explorer's guide. Cape Cod, Martha's Vineyard & Nantucket, [2017] / Kim Grant ; with photographs by the author. By library.gcpl.lib.oh.us Published On :: Features recommendations for dining, lodging, transportation, shopping, recreational activities, landmarks, and cultural opportunities. -- Publisher. Full Article
ui Novel destinations : a travel guide to literary landmarks from Jane Austen's Bath to Ernest Hemingway's Key West / Shannon McKenna Schmidt & Joni Rendon ; foreword by Matthew Pearl. By library.gcpl.lib.oh.us Published On :: "Follow in the footsteps of much loved authors, discover the landscapes that sparked their imaginations, and learn behind-the-scenes stories in this expanded and completely updated second edition of Novel Destinations. Across more than 500 literary locales in the United States, Europe, and elsewhere, experience famous authors' homes, book festivals, literary walking tours, lodgings, restaurants, bars for bibliophiles, and much more."--page 4 of cover. Full Article