pot

Conversations With Your Client: Hypothetical Case Studies

In a series of hypothetical case studies, this program will reveal the inner workings of the claims handling and litigation process through a didactic dialogue from an attorney's intake of…




pot

Attorney Has No Duty to Advise Comp Client on Potential Third-Party Claims

The Wisconsin Court of Appeals ruled that the attorney and law firm hired to represent a man on solely his workers’ compensation claim did not have a duty to advise…




pot

[Animation] Belly by Julia Pott

Belly, created by Julia Pott is like more an illustration animation for me. Which i like very much!. From the animation work, plot and story line it finished very well. Why?. When it come to short animation, i prefer to 3 - 5 minuets. But this 7:30 short animation is a worth watching.

View and Vote




pot

Four Tips of Tapping Market Potential via Quality Brochures

Marketing with brochures is one of the many ways to reach out to your target audience. In order to have that impact, brochures should be attractive and engaging.

View and Vote




pot

Study Identifies Potential Therapeutic Target for PTSD

A multi-institutional team of investigators has discovered that targeting a specific neural circuit through noninvasive neuromodulation may help reduce symptoms in patients with posttraumatic stress disorder (PTSD), according to a recent study published in Nature Neuroscience. Jordan Grafman, PhD, professor of Physical Medicine and Rehabilitation and of Psychiatry and Behavioral Sciences and director of Brain Injury Research at the Shirley Ryan AbilityLab, was a co-author of the study.




pot

Harry Potter If It Was Made By Wes Anderson

Attention all Muggles and Wizards! ✨🧙‍♂️🔮 If Harry Potter was directed by the one and only Wes Anderson, you ca ...




pot

Embracing The Creative Journey: Ignite Your Passion And Unlock Limitless Potential

Creativity is not a gift that only some people have. It is a skill that can be learned and developed by anyone who is willing to explore new possibilities, ...




pot

Harry Potter And The Forbidden Party

Step into a realm where the magical world of Harry Potter collides with the captivating aesthetics of HBO's Euphoria, giving birth to an AI-generated Hogwar ...




pot

FOB Kitchen, Great New Filipino Hot Spot in Oakland, California

I had the pleasure to try FOB Kitchen last night, a hot new Telegraph Avenue Oakland Filipino menu in Oakland (Thanks cristina_thebaker!). 5179 Telegraph Ave, Oakland, CA 94609. You would not know it from the unassuming Temescal strip mall setting, but once inside you are treated to an amazing and flavorful Filipino menu from this …




pot

Build Design Systems With Penpot Components

In today’s turbulent landscape of design, Penpot stands out with its commitment to open-source, free unlimited access, and its unique, robust features. An example could be its new components system that takes another leap forward in aligning design with code. Let's dive into how it empowers both designers and developers to create more maintainable and scalable design systems.




pot

Marine Microbe Survey Reveals Potential Problem-Solvers

Researchers went 'bioprospecting' in marine microbes, looking for those that can perform helpful functions like eating plastic or generating antibiotics.



  • Cell & Molecular Biology

pot

August GNU Spotlight with Amin Bandali

Fifteen new GNU releases in the last month (as of August 31, 2024):




pot

September GNU spotlight with Amin Bandali

Fourteen new GNU releases in the last month (as of September 30, 2024):




pot

October GNU Spotlight with Amin Bandali: Seven new GNU releases!

Seven new GNU releases in the last month (as of October 31, 2024):




pot

Marine Microbe Survey Reveals Potential Problem-Solvers

Researchers went 'bioprospecting' in marine microbes, looking for those that can perform helpful functions like eating plastic or generating antibiotics.



  • Earth & The Environment

pot

From Seagrass to Antibiotics: The Breakthrough Potential of Small Molecule In situ Resin Capture

How can oceanic microbes help produce antibiotics? This is what a recent study published in Nature Communications hopes to address as a team of researchers



  • Earth & The Environment

pot

Marine Microbe Survey Reveals Potential Problem-Solvers

Researchers went 'bioprospecting' in marine microbes, looking for those that can perform helpful functions like eating plastic or generating antibiotics.



  • Genetics & Genomics

pot

Potential links between cannabis legalization and mental health medications

What influence does cannabis legalization, whether medical or recreational, have on mental health prescription medications? This is what a recent study pub




pot

From Seagrass to Antibiotics: The Breakthrough Potential of Small Molecule In situ Resin Capture

How can oceanic microbes help produce antibiotics? This is what a recent study published in Nature Communications hopes to address as a team of researchers




pot

Marine Microbe Survey Reveals Potential Problem-Solvers

Researchers went 'bioprospecting' in marine microbes, looking for those that can perform helpful functions like eating plastic or generating antibiotics.




pot

AI in Hiring In-House Lawyer Blind Spot, Survey Says

Niloy Ray discusses findings in Littler’s AI C-Suite Survey Report that reveal an awareness gap between legal chiefs and HR regarding whether their company is using AI tools.

Bloomberg Law 

View (Subscription required)




pot

Spotlight on Positive Employee Relations Training: How Employers Can Reap the Benefits of Employee Engagement

In this podcast, Littler attorneys Michael Kessel, Russ McEwan and Alan Model, out of our Newark office, discuss the importance of cultivating “employee engagement” to foster a productive, invested workforce. They also describe the new Littler Positive Employee Relations Series, which offers customized, intensive training to supervisors on the causes of negative morale and then arms them with practical tools to spot and handle problems before they get out of hand.
 




pot

Back to the Future? UK Government Consults on the Potential Reintroduction of Tribunal Fees

At the end of January 2024, the UK Government set out a surprise proposal to introduce a £55 fee for individuals to bring proceedings in the Employment Tribunals (ET) and Employment Appeal Tribunal (EAT).




pot

SEC Continues to Attack Non-Disclosure Agreements and Personnel Policy Provisions that Could Impede Employees from Reporting Potential Violations of U.S. Securities Law

  • Recent SEC cease-and-desist Orders indicate how publicly traded and other SEC-regulated employers should be on alert to the agency’s ongoing attention to enforcement actions under Rule 21F-17.
  • The SEC has been examining whether non-disclosure agreements and other confidential business information provisions could impede whistleblowers from communicating with the SEC.




pot

Psychedelics and Marijuana on the Ballot: How Should Employers Prepare for Potential Legalization?

Voters in several states will decide whether marijuana or, in one case, psychedelic substances should be legal in the upcoming November 5, 2024 general election. Employers should keep their eyes on these ballot measures and prepare for questions regarding changes to workplace policies if some or all of them pass. A rundown of the ballot measures in these jurisdictions follows.




pot

Rebuilding America: The Potential Impact of President Biden’s Infrastructure Plan on South Carolina’s Businesses and Workforce

William H. Foster and Katie E. Towery examine the impact President Biden’s “America’s Jobs Plan” might have on South Carolina’s growing businesses and workforce. 

Association of Corporate Counsel South Carolina

View 




pot

Spotting and Solving Workplace Issues Before They Lead to Legal Troubles




pot

Missouri Appears to Have Approved Paid Sick and Safe Time Ballot Measure as Rumors of Potential Challenge Circulate

  • New statewide paid sick and safe time law would take effect on May 1, 2025.
  • Law would allow employers to limit annual use to either 40 or 56 hours, limit carryover to 80 hours, but is silent on accrual caps.
  • Notice obligations would begin before law takes effect.




pot

Canada: SCC Decision Offers Potential Insight into Privacy Rights for Private-Sector Employees

In a significant decision focused on public employers, the Supreme Court of Canada (SCC) recently held that Ontario public school boards are “government” and, as such, they are subject to the provisions of the Canadian Charter of Rights and Freedoms (Charter), and their teachers are protected from unreasonable search and seizure in their places of employment. In York Region District School Board v.




pot

Alumni Spotlight — Meet Erin Webber

Erin Webber talks about how her father inspired her future career in labor and employment law and recalls her journey to become the Managing Director of Littler. 

MIZZOU Magazine

View




pot

Summary of Comments to CSA/CIRO Staff Notice 23-331 Request for Feedback on December 2022 SEC Market Structure Proposals and Potential Impact on Canadian Capital Markets

This document is only available in PDF format.




pot

SpotOn London 2012 Storify: eBooks and apps

Here is a Storify round up of the SpotOn London session: Enhanced eBooks & BookApps: The




pot

SpotOn London 2012 Storify: Collaborating and building your online presence: educating scientists and science students

Jenny Evans has created a Storify summary of her SpotOn London session: Collaborating and building your online




pot

SpotOn London 2012 Storify: BrainSpace, a global interest graph for scientists

Here is a Storify summary of the SpotOn London session: BrainSpace, a global interest graph for




pot

Share your experiences to create some SpotOn social media tips for scientists!

It ain’t a party if you can’t join us Towards the end of April, SpotOn




pot

SpotOn London 2013 – draft programme: Tools track

This year, Digital Science are sponsoring the Tools track and we’re grateful to them for




pot

SpotOn London 2013: What should the scientific record look like in the digital age?

Julia Schölermann is the organiser for this year’s SpotOn London session on, What should the scientific




pot

SpotOn London 2013: How are online tools changing science education?

The place we’re in as a society is a crowded field of scattered tools and




pot

SpotOn London Storify: Wikipedia editing session

Here is a Storify collecting the online conversations from the Wikipedia editing workshop at this year’s




pot

Cybersecurity Snapshot: Apply Zero Trust to Critical Infrastructure’s OT/ICS, CSA Advises, as Five Eyes Spotlight Tech Startups’ Security

Should critical infrastructure orgs boost OT/ICS systems’ security with zero trust? Absolutely, the CSA says. Meanwhile, the Five Eyes countries offer cyber advice to tech startups. Plus, a survey finds “shadow AI” weakening data governance. And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy.

Dive into six things that are top of mind for the week ending Nov. 1.

1 - Securing OT/ICS in critical infrastructure with zero trust

As their operational technology (OT) computing environments become more digitized, converged with IT systems and cloud-based, critical infrastructure organizations should beef up their cybersecurity by adopting zero trust principles.

That’s the key message of the Cloud Security Alliance’s “Zero Trust Guidance for Critical Infrastructure,” which focuses on applying zero trust methods to OT and industrial control system (ICS) systems.

While OT/ICS environments were historically air gapped, that’s rarely the case anymore. “Modern systems are often interconnected via embedded wireless access, cloud and other internet-connected services, and software-as-a-service (SaaS) applications,” reads the 64-page white paper, which was published this week.

The CSA hopes the document will help cybersecurity teams and OT/ICS operators enhance the way they communicate and collaborate.

 

 

Among the topics covered are:

  • Critical infrastructure’s unique threat vectors
  • The convergence of IT/OT with digital transformation
  • Architecture and technology differences between OT and IT

The guide also outlines this five-step process for implementing zero trust in OT/ICS environments:

  • Define the surface to be protected
  • Map operational flows
  • Build a zero trust architecture
  • Draft a zero trust policy
  • Monitor and maintain the environment

A zero trust strategy boosts the security of critical OT/ICS systems by helping teams “keep pace with rapid technological advancements and the evolving threat landscape,” Jennifer Minella, the paper’s lead author, said in a statement.

To get more details, read:

For more information about OT systems cybersecurity, check out these Tenable resources: 

2 - Five Eyes publish cyber guidance for tech startups

Startup tech companies can be attractive targets for hackers, especially if they have weak cybersecurity and valuable intellectual property (IP).

To help startups prevent cyberattacks, the Five Eyes countries this week published cybersecurity guides tailored for these companies and their investors.

“This guidance is designed to help tech startups protect their innovation, reputation, and growth, while also helping tech investors fortify their portfolio companies against security risks," Mike Casey, U.S. National Counterintelligence and Security Center Director, said in a statement.

These are the top five cybersecurity recommendations from Australia, Canada, New Zealand, the U.S. and the U.K. for tech startups:

  • Be aware of threat vectors, including malicious insiders, insecure IT and supply chain risk.
  • Identify your most critical assets and conduct a risk assessment to pinpoint vulnerabilities.
  • Build security into your products by managing intellectual assets and IP; monitoring who has access to sensitive information; and ensuring this information’s protection.
  • Conduct due diligence when choosing partners and make sure they’re equipped to protect the data you share with them.
  • Before you expand abroad, prepare and become informed about these new markets by, for example, understanding local laws in areas such as IP protection and data protection.

 

 

“Sophisticated nation-state adversaries, like China, are working hard to steal the intellectual property held by some of our countries’ most innovative and exciting startups,” Ken McCallum, Director General of the U.K.’s MI5, said in a statement.

To get more details, check out these Five Eyes’ cybersecurity resources for tech startups:

3 - Survey: Unapproved AI use impacting data governance

Employees’ use of unauthorized AI tools is creating compliance issues in a majority of organizations. Specifically, it makes it harder to control data governance and compliance, according to almost 60% of organizations surveyed by market researcher Vanson Bourne.

“Amid all the investment and adoption enthusiasm, many organisations are struggling for control and visibility over its use,” reads the firm’s “AI Barometer: October 2024” publication. Vanson Bourne polls 100 IT and business executives each month about their AI investment plans.

To what extent do you think the unsanctioned use of AI tools is impacting your organisation's ability to maintain control over data governance and compliance?

(Source: Vanson Bourne’s “AI Barometer: October 2024”)

Close to half of organizations surveyed (44%) believe that at least 10% of their employees are using unapproved AI tools.

On a related front, organizations are also grappling with the issue of software vendors that unilaterally and silently add AI features to their products, especially to their SaaS applications.

While surveyed organizations say they’re reaping advantages from their AI usage, “such benefits are dependent on IT teams having the tools to address the control and visibility challenges they face,” the publication reads.

For more information about the use of unapproved AI tools, an issue also known as “shadow AI,” check out:

VIDEO

Shadow AI Risks in Your Company

 

4 - NCSC explains nuances of multi-factor authentication

Multi-factor authentication (MFA) comes in a variety of flavors, and understanding the differences is critical for choosing the right option for each use case in your organization.

To help cybersecurity teams better understand the different MFA types and their pluses and minuses, the U.K. National Cyber Security Centre (NCSC) has updated its MFA guidance.

“The new guidance explains the benefits that come with strong authentication, while also minimising the friction that some users associate with MFA,” reads an NCSC blog.

 

 

In other words, what type of MFA method to use depends on people’s roles, how they work, the devices they use, the applications or services they’re accessing and so on.

Topics covered include:

  • Recommended types of MFA, such as FIDO2 credentials, app-based and hardware-based code generators and message-based methods
  • The importance of using strong MFA to secure users’ access to sensitive data
  • The role of trusted devices in boosting and simplifying MFA
  • Bad practices that weaken MFA’s effectiveness, such as:
    • Retaining weaker, password-only authentication protocols for legacy services
    • Excluding certain accounts from MFA requirements because their users, usually high-ranking officials, find MFA inconvenient

To get more details, read:

For more information about MFA:

5 - U.S. gov’t outlines AI strategy, ties it to national security 

The White House has laid out its expectations for how the federal government ought to promote the development of AI in order to safeguard U.S. national security.

In the country’s first-ever National Security Memorandum (NSM) on AI, the Biden administration said the federal government must accomplish the following:

  • Ensure the U.S. is the leader in the development of safe, secure and trustworthy AI
  • Leverage advanced AI technologies to boost national security
  • Advance global AI consensus and governance

“The NSM’s fundamental premise is that advances at the frontier of AI will have significant implications for national security and foreign policy in the near future,” reads a White House statement.

 

 

The NSM’s directives to federal agencies include:

  • Help improve the security of chips and support the development of powerful supercomputers to be used by AI systems.
  • Help AI developers protect their work against foreign spies by providing them with cybersecurity and counterintelligence information.
  • Collaborate with international partners to create a governance framework for using AI in a way that is ethical, responsible and respects human rights. 

The White House also published a complementary document titled “Framework To Advance AI Governance and Risk Management in National Security,” which adds implementation details and guidance for the NSM.

6 - State CISOs on the frontlines of AI security

As the cybersecurity risks and benefits of AI multiply, most U.S. state CISOs find themselves at the center of their governments' efforts to craft AI security strategies and policies.

That’s according to the “2024 Deloitte-NASCIO Cybersecurity Study,” which surveyed CISOs from all 50 states and the District of Columbia.

Specifically, 88% of state CISOs reported being involved in the development of a generative AI strategy, while 96% are involved with creating a generative AI security policy.

However, their involvement in AI cybersecurity matters isn’t necessarily making them optimistic about their states’ ability to fend off AI-boosted attacks.

None said they feel “extremely confident” that their state can prevent AI-boosted attacks, while only 10% reported feeling “very confident.” The majority (43%) said they feel “somewhat confident” while the rest said they are either “not very confident” or “not confident at all.”

 

 

Naturally, most state CISOs see AI-enabled cyberthreats as significant, with 71% categorizing them as either “very high threat” (18%) or “somewhat high threat” (53%).

At the same time, state CISOs see the potential for AI to help their cybersecurity efforts, as 41% are already using generative AI for cybersecurity, and another 43% have plans to do so by mid-2025.

Other findings from the "2024 Deloitte-NASCIO Cybersecurity Study" include:

  • 4 in 10 state CISOs feel their budget is insufficient.
  • Almost half of respondents rank cybersecurity staffing as one of the top challenges.
  • In the past two years, 23 states have hired new CISOs, as the median tenure of a state CISO has dropped to 23 months, down from 30 months in 2022.
  • More state CISOs are taking on privacy protection duties — 86% are responsible for privacy protection, up from 60% two years ago.

For more information about CISO trends:




pot

SpotOn London 2012 Storify: Fixing the fraud: how do we safeguard science from misconduct?

#solo12fraud




pot

SpotOn London 2012 Storify: Crowdfunded science – new opportunities or dangerous echo chamber?

Finding sources for funding research can be a demanding task, and one that's not always successful. A new trend that's emerging out of the necessity to fund projects that have no traditional means of support is "crowdfunding." A panel at SpotOnLondon weighs the resulting apprehensions and benefits.




pot

SpotOn London 2012: My not-so-secret-anymore double life: Juggling research and science communication

Dr Anne Osterrieder is a Research and Science Communication Fellow in Plant Cell Biology at the Department of




pot

SpotOn London 2012 Storify: Incentivising Open Access and Open Science: Carrot and Stick

Here is a Storify round up of the SpotOn London session: Incentivising Open Access and Open




pot

SpotOn London 2012 Storify: ORCID – why do we need a unique researcher ID?

Here is a Storify round up of the SpotOn London session: ORCID – why do we




pot

SpotOn London 2012 Storify: What do you need to start a revolution?

Here is a Storify round up of the SpotOn London session: What do you need to




pot

SpotOn London 2012 Storify: Tackling the terabyte: how should research adapt to the era of big data?

Here is a Storify round up of the SpotOn London session: Tackling the terabyte: how should




pot

SpotOn London 2013 – draft programme: Policy track

As we’re getting ready to make tickets available for this year’s SpotOn London conference, we’re




pot

SpotOn London 2013: Altmetrics – The Opportunities and the Challenges

Marie Boran is a PhD candidate at the INSIGHT Centre for Data Analytics, the National




pot

SpotOn London 2013: Contract for interdisciplinary working

In preparation for this year’s SpotOn London 2013 workshop, Interdisciplinary research: what can scientists, humanists