ive Detailed Data on CSA Multilateral Staff Notice 58-317 Report on tenth Staff Review of Disclosure regarding Women on Boards and in Executive Officer Positions By www.osc.ca Published On :: Tue, 29 Oct 2024 15:53:42 GMT Full Article
ive CSA Notice Regarding Coordinated Blanket Order 96-932 Re Temporary Exemptions from Certain Derivatives Data Reporting Requirements By www.osc.ca Published On :: Wed, 30 Oct 2024 18:15:28 GMT This document is only available as a PDF. Full Article
ive Administrative Coordinator By phf.tbe.taleo.net Published On :: Tue, 06 Aug 2024 13:25:08 GMT Job Summary : The Director General’s Office (DGO) of the International Food Policy Research Institute (IFPRI) seeks an Administrative Coordinator (AC) for one-year, non-exempt, renewable appointment. The Executive Assistant to Director General will be responsible for the AC’s work plan and performance evaluation, subject to the approval of the Director General. This position is based at IFPRI headquarters in Washington, D.C. Essential Duties The AC’s main duties and responsibilities include (a) providing administrative support to the Executive Assistant and other DGO staff (as needed), and (b) coordinating logistics for the following: Travel arrangement: Travel planner form, visa applications, request for itineraries, issuance of air and/or train tickets, cash advances/honoraria, and preparation of travel expense reports. Meetings: Coordinate arrangements for organizing special events, including lunches, meetings and conferences. This function will include room reservation, organizing meeting materials, presentation requirements, setting up teleconference and virtual calls, and catering. Visitors: Coordinating visits of high-level guests to IFPRI such as who else from staff will join the meeting, ordering of food for breakfast or lunch as necessary, office/hotel reservation, pick-up and return of office keys, computer connections, assigned office name tag/labeling, and arrangement for brown bag/seminar/presentation. DG’s contact database: Ensure that the database is current through regular maintenance/updating and accurate data entry of business cards from the DG’s travels. Office supplies: Maintain adequate supply of commonly used/requested items for the division’s use. Service Center assistance, which includes but not limited to the following: Photocopying/printing/scanning Letters/mails - for fax, pick-up and distribution, maintain an updated pigeonhole assignment for DGO staff. Orderliness and adequate supplies are available for printers, photo-copying machine and coffee service. Files: Create and maintain a complete, updated and functional filing system for DGO records and perform periodic filing of DG documents and archiving. Other duties and responsibilities that may be required from time to time. It is expected that the AC will: Handle multiple tasks and prioritizes work with minimal supervision. Pay attention to detail and follows through to closure. Be able to work in a fast-paced, multicultural environment, and follow established procedures. Perform other duties/assignments as necessary. Required Qualifications : Bachelor’s degree or associate’s degree plus three years of administrative work experience, or high school diploma plus four years of relevant experience. Excellent oral and written English language skills. Solid composition, grammar and proofreading skills with the ability to compose correspondence. Demonstrated experience handling confidential matters. Demonstrated expertise with financial information. Demonstrated proficiency with computers: Experience with MS Office, especially Microsoft Word, Outlook, Excel and PowerPoint required. Excellent typing skills required; 50-65 wpm preferred. Demonstrated ability to work productively within a multi-cultural team environment. Ability to handle multiple tasks and prioritize work responsibly with minimal supervision. Demonstrated ability to pay attention to detail and follow-through to closure. Demonstrated experience working in a fast-paced work environment. Physical Demand & Work environment: Employee will sit in an upright position for a long period of time. Employee will lift between 0-10 pounds. Employee is required to have close visual acuity to perform activities such as: preparing and analyzing data and figures; transcribing; viewing computer terminal; extensive reading. Salary Range : The expected salary range for this job requisition is between $23.37 - $28.65/hour. In determining your salary, we will consider your experience and other job-related factors. Benefits : IFPRI is committed to providing our staff members with valuable and competitive benefits, as it is a core part of providing a strong overall employee experience. This position is eligible for health insurance coverage and a summary of our benefits can be found on our website . Please note that the listed benefits are generally available to active, non-temporary, full-time and part-time US-based employees who work at least 25 hours per week. IFPRI Washington D.C. has a hybrid work environment that allows staff members a minimum of two days (preference for 3 days) in-office work and the remaining two to three days remote work. The International Food Policy Research Institute (IFPRI) is an equal employment opportunity employer - F/M/Disability/Vet/Sexual Orientation/Gender Identity. Full Article
ive Administrative Coordinator I By phf.tbe.taleo.net Published On :: Thu, 26 Sep 2024 16:00:49 GMT Job Summary: The Market, Trade, and Institutions Unit of the International Food Policy Research Institute (IFPRI) seeks an Administrative Coordinator I to provide administrative support. This is a one-year, non-exempt, renewable appointment and is located at IFPRI’s Headquarters in Washington, D.C. Essential Duties: Specific duties and responsibilities include but are not limited to: Document Support : Edit and/or transcribe reports, manuscripts, and other documents as needed, for the unit staff. Project Logistical Coordination : Draft and monitor contracts for collaborators and services. Accounting Support : Prepare travel and field expense reports. File & monitor project budgets, collaborator and donor-approved budget expenditures, and sub-contracts. Travel arrangement: Prepare hotel and travel requests for staff and visitors, assist in coordinating visa applications, request for itineraries, and issuance of air and/or train tickets, cash advances/honoraria, and preparation of travel expense reports. Coordinate with Travel Office & Accounting for processing travel requests. Meetings : Coordinate arrangements for organizing special events, including lunches, meetings, conferences, and other training events. This function will include room reservation, organizing meeting materials, presentation requirements, setting up teleconferences, catering, and taking/taping and/or transcribing minutes of meetings, as needed. Appointment schedule & Visitors’ Support : Manage appointment scheduling for Research fellows as requested and provide logistical support for visitors, to include office/hotel reservation, pick-up, and return of office keys, computer connections, assigned office name tag/labeling, and arrangement for brown bag/seminar/presentation. Contact Data Base Support : Maintain various administrative/unit database including Collaborator & Project main list, staff contact/emergency file, and other master files. Outposted Staff Administrative Support : Provide administrative support to outposted staff, as applicable. Mail Support : If requested, manage incoming & outgoing mail and monitor equipment inventory. Perform other duties as assigned. Required Qualifications: Bachelor's degree; or Associate's degree plus three years of relevant experience; or high school diploma plus four years of relevant experience. Excellent oral and written English language skills. Solid composition, grammar and proofreading skills with the ability to compose correspondence. Demonstrated experience handling confidential matters. Demonstrated expertise with financial information. Familiarity with monitoring/managing project budgets and contracts. Demonstrated proficiency with computers: Experience with MS Office, especially Microsoft Word, Outlook, Excel and PowerPoint required. Excellent typing skills required; 50-65 wpm preferred. Demonstrated ability to work productively within a multi-cultural team environment. Ability to handle multiple tasks and prioritize work responsibly with minimal supervision. Demonstrated ability to pay attention to detail and follow-through to closure. Demonstrated experience working in a fast-paced work environment. Preferred Qualifications: Proficiency in a second language of the U.N. system Physical Demand & Work environment: Employee will sit in an upright position for a long period of time with little opportunity to move/stretch. Employee will lift between 0-10 pounds. Employee is required to have close visual acuity to perform activities such as: preparing and analyzing data and figures; transcribing; viewing computer terminal; extensive reading. Salary Range : The expected salary range for this job requisition is between $23.37 - $28.65/hour. In determining your salary, we will consider your experience and other job-related factors. Benefits : IFPRI is committed to providing our staff members with valuable and competitive benefits, as it is a core part of providing strong overall employee experience. This position is eligible for health insurance coverage and a summary of our benefits can be found on our website . Please note that the listed benefits are generally available to active, non-temporary, full-time and part-time US-based employees who work at least 25 hours per week. IFPRI Washington D.C. has a hybrid work environment that allows staff members a minimum of two days (preference for 3 days) in-office work and the remaining two to three days remote work. The International Food Policy Research Institute (IFPRI) is an equal employment opportunity employer - F/M/Disability/Vet/Sexual Orientation/Gender Identity Full Article
ive Finance and Administrative Coordinator By phf.tbe.taleo.net Published On :: Fri, 11 Oct 2024 21:08:35 GMT Job Summary: The International Food Policy Research Institute (IFPRI) seeks a Finance & Administrative Coordinator for its Development Strategies and Governance Unit (DSG). This is a one-year, renewable appointment and is located at IFPRI’s South Asia Office in India. This position will work within the DSG department in providing support with travel organization, contract drafting & monitoring, revision of deliverables, financial reports, and invoices; workshops, edit narratives; close contracts and projects. Interested applicants must have work authorization to work in India. Essential Duties and Responsibilities Project Logistical Coordination : Provide logistical coordination for project activities, to include drafting and monitoring of project subcontracts, for complex Divisional projects. Monitor deadlines and coordinate the receipt of collaborator deliverables and submission of donor deliverables as requested. Accounting Support : Prepare travel and field expense reports. File & monitor project budgets, collaborator and donor-approved budget expenditures, and sub-contracts. Submit and monitor collaborator invoices upon submission/approval of deliverables. Monitor weekly unit payments and submit updates to vendors and/or PM/PL/ project coordinators. Follow-up and process invoices from centers that host Group staff. Assist, as needed, on provision of monthly General Ledgers (GLs)/Project Summary Report (PSRs) to PM/PLs. Submit/correct project-related expense adjustments (as needed) Contact Data Base Support: Maintain various administrative/unit database including Collaborator & Project main list, staff contact/emergency file, and other master files. Monitor SAC calendar to identify: Project end-dates and eventual closeout. Provide project budget burn rates to projects leaders upon request. Electronic filing of documents. Closeout collaborator and sub-contractor contracts after detailed verification that all deliverables have been received and all funds have been disbursed, filling in the checklist, obtaining the Project Leader signature, and importing the Close Out Form onto D4D. Timely preparation of periodic financial reports and invoices for a range of donors. Monitor billed and unbilled receivables for delinquent payments and billable cost. Data Entry in Tally and Finalization of accounts books as per Indian Accounting standards. Review monthly project status reports. Address internal and external inquiries regarding project financial matters. Assist with annual statutory audit. Other duties as assigned. Required Qualifications: Bachelor’s degree in accounting/finance plus two years of relevant experience or associate’s degree plus five years of relevant experience. Preference would be given to Intermediate/pursuing CA/CS/CWA. Knowledge of Tally is preferable. Demonstrated proficiency with computers: experience with MS Office, especially Microsoft Word, Outlook, Excel, and PowerPoint required. Strong analytical skills. Demonstrated ability to work productively within a multi-cultural team environment. Excellent oral and written communications skills. Demonstrated ability to pay diligence and follow-through to closure. Demonstrated experience working in a fast-paced work environment. Physical Demand & Work environment: Employee will sit in an upright position for a long period of time. Employee will lift between 0-10 pounds. Employee is required to have close visual acuity to perform activity such as: preparing and analyzing data and figures; viewing computer terminal; extensive reading. Full Article
ive Driver II By phf.tbe.taleo.net Published On :: Thu, 31 Oct 2024 20:56:07 GMT Job Summary: The Development Strategies and Governance Unit (DSG), of the International Food Policy Research Institute (IFPRI) seeks a qualified candidate to serve as a Driver II. This position is a two-years, renewable appointment based in Dakar, Senegal. Under the general supervision of the Manager of Administration and Corporate Services, Africa Region, and direct supervision of the Dakar Senior Logistics Coordinator, the successful candidate will offer reliable transportation services to authorized personnel and visitors, ensuring the safety of persons, property and vehicles, and aid in the delivery of logistics services. The incumbent must be client-oriented approach, high sense of responsibility, courtesy, tact and ability to work with people of different national and cultural backgrounds. Interested applicants must be authorized to work in Senegal. Essential Duties: Specific duties will include the following Operate and maintain transportation vehicles with a focus on safety and courtesy Keep the logbook of assigned vehicle in a regular and precise manner Prepares accident and incident reports as necessary and ensures that immediate steps as required by rules and regulations are taken in case of involvement in an accident Performs daily vehicle inspections and fill out inspection forms; ensure that the vehicle is kept clean Ensure that periodic scheduled vehicle maintenance is completed and reported. Perform customs clearance and vehicle registrations procedures for office and IRS vehicles. In collaboration with the Senior Logistics Coordinator, follow up on procedures/documentation relating to formalities for exemptions on local or imported purchases for the office and IRS. Assist the facilities department with procurement and service supply (request for competitive quotes and other documents). Perform other related duties as assigned and required. Required Qualifications: Ten years of education and one year of relevant experience, plus certifications, and/or on-the-job training. Must have a valid driver's license. Good spoken and written French language skills (basic knowledge in English desirable). Have a good knowledge of local suppliers, services and public administration services Basic computer skills (word, Excel, Internet). Ability to communicate clearly and in a courteous manner Punctuality and flexible schedule Good physical condition Respect for confidentiality Full Article
ive Cybersecurity Snapshot: Apply Zero Trust to Critical Infrastructure’s OT/ICS, CSA Advises, as Five Eyes Spotlight Tech Startups’ Security By www.tenable.com Published On :: Fri, 01 Nov 2024 09:00:00 -0400 Should critical infrastructure orgs boost OT/ICS systems’ security with zero trust? Absolutely, the CSA says. Meanwhile, the Five Eyes countries offer cyber advice to tech startups. Plus, a survey finds “shadow AI” weakening data governance. And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy.Dive into six things that are top of mind for the week ending Nov. 1.1 - Securing OT/ICS in critical infrastructure with zero trustAs their operational technology (OT) computing environments become more digitized, converged with IT systems and cloud-based, critical infrastructure organizations should beef up their cybersecurity by adopting zero trust principles.That’s the key message of the Cloud Security Alliance’s “Zero Trust Guidance for Critical Infrastructure,” which focuses on applying zero trust methods to OT and industrial control system (ICS) systems.While OT/ICS environments were historically air gapped, that’s rarely the case anymore. “Modern systems are often interconnected via embedded wireless access, cloud and other internet-connected services, and software-as-a-service (SaaS) applications,” reads the 64-page white paper, which was published this week.The CSA hopes the document will help cybersecurity teams and OT/ICS operators enhance the way they communicate and collaborate. Among the topics covered are:Critical infrastructure’s unique threat vectorsThe convergence of IT/OT with digital transformationArchitecture and technology differences between OT and ITThe guide also outlines this five-step process for implementing zero trust in OT/ICS environments:Define the surface to be protectedMap operational flowsBuild a zero trust architectureDraft a zero trust policyMonitor and maintain the environmentA zero trust strategy boosts the security of critical OT/ICS systems by helping teams “keep pace with rapid technological advancements and the evolving threat landscape,” Jennifer Minella, the paper’s lead author, said in a statement.To get more details, read:The report’s announcement “New Paper from Cloud Security Alliance Examines Considerations and Application of Zero Trust Principles for Critical Infrastructure”The full report “Zero Trust Guidance for Critical Infrastructure”A complementary slide presentationFor more information about OT systems cybersecurity, check out these Tenable resources: “What is operational technology (OT)?” (guide)“Discover, Measure, and Minimize the Risk Posed by Your Interconnected IT/OT/IoT Environments” (on-demand webinar)“How To Secure All of Your Assets - IT, OT and IoT - With an Exposure Management Platform” (blog)“Blackbox to blueprint: The security leader’s guidebook to managing OT and IT risk” (white paper)“Tenable Cloud Risk Report 2024” (white paper)2 - Five Eyes publish cyber guidance for tech startupsStartup tech companies can be attractive targets for hackers, especially if they have weak cybersecurity and valuable intellectual property (IP).To help startups prevent cyberattacks, the Five Eyes countries this week published cybersecurity guides tailored for these companies and their investors.“This guidance is designed to help tech startups protect their innovation, reputation, and growth, while also helping tech investors fortify their portfolio companies against security risks," Mike Casey, U.S. National Counterintelligence and Security Center Director, said in a statement.These are the top five cybersecurity recommendations from Australia, Canada, New Zealand, the U.S. and the U.K. for tech startups:Be aware of threat vectors, including malicious insiders, insecure IT and supply chain risk.Identify your most critical assets and conduct a risk assessment to pinpoint vulnerabilities.Build security into your products by managing intellectual assets and IP; monitoring who has access to sensitive information; and ensuring this information’s protection.Conduct due diligence when choosing partners and make sure they’re equipped to protect the data you share with them.Before you expand abroad, prepare and become informed about these new markets by, for example, understanding local laws in areas such as IP protection and data protection. “Sophisticated nation-state adversaries, like China, are working hard to steal the intellectual property held by some of our countries’ most innovative and exciting startups,” Ken McCallum, Director General of the U.K.’s MI5, said in a statement.To get more details, check out these Five Eyes’ cybersecurity resources for tech startups:The announcement “Five Eyes Launch Shared Security Advice Campaign for Tech Startups”The main guides: “Secure Innovation: Security Advice for Emerging Technology Companies”“Secure Innovation: Security Advice for Emerging Technology Investors”These complementary documents:“Secure Innovation: Scenarios and Mitigations”“Secure Innovation: Travel Security Guidance”“Secure Innovation: Due Diligence Guidance”“Secure Innovation: Companies Summary”3 - Survey: Unapproved AI use impacting data governanceEmployees’ use of unauthorized AI tools is creating compliance issues in a majority of organizations. Specifically, it makes it harder to control data governance and compliance, according to almost 60% of organizations surveyed by market researcher Vanson Bourne.“Amid all the investment and adoption enthusiasm, many organisations are struggling for control and visibility over its use,” reads the firm’s “AI Barometer: October 2024” publication. Vanson Bourne polls 100 IT and business executives each month about their AI investment plans.To what extent do you think the unsanctioned use of AI tools is impacting your organisation's ability to maintain control over data governance and compliance?(Source: Vanson Bourne’s “AI Barometer: October 2024”)Close to half of organizations surveyed (44%) believe that at least 10% of their employees are using unapproved AI tools.On a related front, organizations are also grappling with the issue of software vendors that unilaterally and silently add AI features to their products, especially to their SaaS applications.While surveyed organizations say they’re reaping advantages from their AI usage, “such benefits are dependent on IT teams having the tools to address the control and visibility challenges they face,” the publication reads.For more information about the use of unapproved AI tools, an issue also known as “shadow AI,” check out:“Do You Think You Have No AI Exposures? Think Again” (Tenable)“Shadow AI poses new generation of threats to enterprise IT” (TechTarget)“10 ways to prevent shadow AI disaster” (CIO)“Never Trust User Inputs -- And AI Isn't an Exception: A Security-First Approach” (Tenable)“Shadow AI in the ‘dark corners’ of work is becoming a big problem for companies” (CNBC)VIDEOShadow AI Risks in Your Company 4 - NCSC explains nuances of multi-factor authenticationMulti-factor authentication (MFA) comes in a variety of flavors, and understanding the differences is critical for choosing the right option for each use case in your organization.To help cybersecurity teams better understand the different MFA types and their pluses and minuses, the U.K. National Cyber Security Centre (NCSC) has updated its MFA guidance.“The new guidance explains the benefits that come with strong authentication, while also minimising the friction that some users associate with MFA,” reads an NCSC blog. In other words, what type of MFA method to use depends on people’s roles, how they work, the devices they use, the applications or services they’re accessing and so on.Topics covered include:Recommended types of MFA, such as FIDO2 credentials, app-based and hardware-based code generators and message-based methodsThe importance of using strong MFA to secure users’ access to sensitive dataThe role of trusted devices in boosting and simplifying MFABad practices that weaken MFA’s effectiveness, such as:Retaining weaker, password-only authentication protocols for legacy servicesExcluding certain accounts from MFA requirements because their users, usually high-ranking officials, find MFA inconvenientTo get more details, read:The NCSC blog “Not all types of MFA are created equal”The NCSC guide “Multi-factor authentication for your corporate online services”For more information about MFA:“Multifactor Authentication Cheat Sheet” (OWASP)“Deploying Multi Factor Authentication – The What, How, and Why” (SANS Institute)“How MFA gets hacked — and strategies to prevent it” (CSO)“How Multifactor Authentication Supports Growth for Businesses Focused on Zero Trust” (BizTech)“What is multi-factor authentication?” (TechTarget)5 - U.S. gov’t outlines AI strategy, ties it to national security The White House has laid out its expectations for how the federal government ought to promote the development of AI in order to safeguard U.S. national security.In the country’s first-ever National Security Memorandum (NSM) on AI, the Biden administration said the federal government must accomplish the following:Ensure the U.S. is the leader in the development of safe, secure and trustworthy AILeverage advanced AI technologies to boost national securityAdvance global AI consensus and governance“The NSM’s fundamental premise is that advances at the frontier of AI will have significant implications for national security and foreign policy in the near future,” reads a White House statement. The NSM’s directives to federal agencies include:Help improve the security of chips and support the development of powerful supercomputers to be used by AI systems.Help AI developers protect their work against foreign spies by providing them with cybersecurity and counterintelligence information.Collaborate with international partners to create a governance framework for using AI in a way that is ethical, responsible and respects human rights. The White House also published a complementary document titled “Framework To Advance AI Governance and Risk Management in National Security,” which adds implementation details and guidance for the NSM.6 - State CISOs on the frontlines of AI securityAs the cybersecurity risks and benefits of AI multiply, most U.S. state CISOs find themselves at the center of their governments' efforts to craft AI security strategies and policies.That’s according to the “2024 Deloitte-NASCIO Cybersecurity Study,” which surveyed CISOs from all 50 states and the District of Columbia.Specifically, 88% of state CISOs reported being involved in the development of a generative AI strategy, while 96% are involved with creating a generative AI security policy.However, their involvement in AI cybersecurity matters isn’t necessarily making them optimistic about their states’ ability to fend off AI-boosted attacks.None said they feel “extremely confident” that their state can prevent AI-boosted attacks, while only 10% reported feeling “very confident.” The majority (43%) said they feel “somewhat confident” while the rest said they are either “not very confident” or “not confident at all.” Naturally, most state CISOs see AI-enabled cyberthreats as significant, with 71% categorizing them as either “very high threat” (18%) or “somewhat high threat” (53%).At the same time, state CISOs see the potential for AI to help their cybersecurity efforts, as 41% are already using generative AI for cybersecurity, and another 43% have plans to do so by mid-2025.Other findings from the "2024 Deloitte-NASCIO Cybersecurity Study" include:4 in 10 state CISOs feel their budget is insufficient.Almost half of respondents rank cybersecurity staffing as one of the top challenges.In the past two years, 23 states have hired new CISOs, as the median tenure of a state CISO has dropped to 23 months, down from 30 months in 2022.More state CISOs are taking on privacy protection duties — 86% are responsible for privacy protection, up from 60% two years ago.For more information about CISO trends:“What’s important to CISOs in 2024” (PwC)“The CISO’s Tightrope: Balancing Security, Business, and Legal Risks in 2024” (The National CIO Review)“State of CISO Leadership: 2024” (SC World)“4 Trends That Will Define the CISO's Role in 2024” (SANS Institute) Full Article
ive Social Media for Science Outreach – A Case Study: The Beagle Project, Galapagos Live & ISS Wave By www.nature.com Published On :: Tue, 30 Apr 2013 19:00:04 +0000 Selected responses categorized into 'helped', 'helped and harmed' and 'harmed'. Full Article Featured Guest Posts Outreach SpotOn NYC (#SoNYC) #reachingoutsci #SoNYC Social Media Case Study
ive Canadian securities regulators announce results of 10th annual review of representation of women on boards and in executive officer positions in Canada By www.osc.ca Published On :: Tue, 29 Oct 2024 18:20:36 GMT TORONTO – Participating Canadian securities regulators today published the results of their 10th consecutive annual review of disclosures relating to women on boards and in executive officer positions, as well as the underlying data that was used to prepare the report. Full Article
ive Canadian securities regulators publish coordinated blanket orders to provide temporary exemptions from certain derivatives data reporting requirements By www.osc.ca Published On :: Wed, 30 Oct 2024 17:52:49 GMT TORONTO – The Canadian Securities Administrators (CSA) today published Full Article
ive SpotOn London 2013: Thank you to this year’s livestreaming team! By www.nature.com Published On :: Wed, 06 Nov 2013 12:08:38 +0000 In true adherence to the age old phrase 'let them eat cake' and its traditional application to the under-funded and under-fed masses, for SpotOn London cakes were duly provided much to the enjoyment of the delegates. Since this act generated its own hashtag, it also deserves a Story... Full Article SpotOn London (#SoLo) #solo13
ive Reflections on rural revitalization from a global perspective [in Chinese] By www.ifpri.org Published On :: Fri, 11 Dec 2020 5:05:01 EST Full Article
ive Political and economic drivers of Sudan's armed conflict: Implications for the agri-food system [in Arabic] By www.ifpri.org Published On :: Fri, 12 Jan 2024 5:05:01 EST Full Article
ive Exclusive Sandra Brown. By library.gcpl.lib.oh.us Published On :: #1 New York Times bestselling author Sandra Brown weaves a tale of murder, passion, and intrigue in the pristine corridors of the White House. Barrie Travis is not famous: she's just a damn good reporter stuck at a low-budget television station. Then, her old friend and now First Lady calls her to investigate the supposed SIDS death of her baby. Stunned by grief after the loss of her infant son, the President's wife hints that her child may have murdered. Blind to everything but finding the truth, Barrie delves into the private lives of the president and his wife and uncovers dark and terrible secrets that will test her ethics, her patriotism, and her courage. With the help of Gray Bondurant, a mysterious former presidential aide, this story could topple the presidency and change the course of history. In this fast-moving political thriller, Barrie must fight powerful forces that want nothing more than to see the scandalous past-and a certain young reporter-dead and buried. Full Article
ive Edited out : a mysterious detective mystery / E. J. Copperman. By library.gcpl.lib.oh.us Published On :: Mystery author Rachel Goldman is getting used to the idea that her fictional creation Duffy Madison has somehow taken flesh-and-blood form and is investigating missing person cases not far from where Rachel lives. Wait. No. She’s not getting used to it at all, and the presence of this real-life Duffy is making her current manuscript—what’s the word?—lousy. So she doesn’t want to see Duffy—the living one—at all. To make matters worse, when he shows up at her door and insists on talking to her, it’s about the one thing she doesn’t want to do: Find a missing person. But the man Duffy seeks this time around might be able to solve Rachel’s problem. He might just be the man Duffy was before he became Duffy five years ago. The only problem is she could be letting Duffy lead her into danger yet again… Entertaining and witty, the second in E.J. Copperman's Mysterious Detective Mystery series Edited Out will delight his fans, both new and old. Full Article
ive Aggressive Stock Promotion Exploits Fears of Coronavirus Recession By www.osc.ca Published On :: Tue, 14 Apr 2020 12:00:00 GMT TORONTO – The Ontario Securities Commission (OSC) is warning the public about aggressive promotion of Crestview Exploration Inc. Full Article
ive Irrigation schemes in Ethiopia’s Awash River Basin: An examination of physical, knowledge, and governance infrastructures By essp.ifpri.info Published On :: Wed, 06 Nov 2024 09:06:37 +0000 Using a representative sample of irrigation schemes, the study documents the physical, knowledge, and governance infrastructures of irrigation schemes in Ethiopia’s most intensively used river basin, the Awash. The findings show that about 20 percent of the equipped area of irrigation schemes in the basin is not being irrigated, while the number of actual beneficiaries […] Source: IFPRI Ethiopia: Ethiopia Strategy Support Program Full Article News Publications
ive Job Opportunity: Driver II By africa.ifpri.info Published On :: Wed, 06 Nov 2024 11:53:03 +0000 The DSG Unit of IFPRI seeks a qualified candidate to serve as a Driver II. This position is a two-years, renewable appointment based in Dakar, Senegal. Source: IFPRI Africa Regional Office (AFR) Full Article dakar driver Job opportunity News job
ive Register: Delivering for Nutrition in South Asia Conference By bangladesh.ifpri.info Published On :: Thu, 07 Nov 2024 08:02:49 +0000 South Asia grapples with escalating levels of malnutrition in various forms, including undernutrition, overweight and obesity, and micronutrient deficiencies, alongside the increasing incidence of diet-related non-communicable diseases. Malnutrition re... Source: IFPRI Bangladesh Country Office Full Article D4N2024 Delivering for Nutrition Events News Conference implementation research
ive Hybrid Research and Policy Conference on “Livestock, Gender, and Agency Amid Conflict in Ethiopia” By essp.ifpri.info Published On :: Wed, 13 Nov 2024 04:55:41 +0000 The CGIAR Initiative on National Policies and Strategies (NPS) presents: 'Livestock, Gender, and Agency Amid Conflict in Ethiopia' 📅 Dec 11, 2024, ILRI Info Center, Addis Ababa. Join us as we discuss CGIAR NPS’s latest findings to guide policies that strengthen Ethiopia’s livestock sector. CGIAR International Food Policy Research Institute (IFPRI) International Livestock Research Institute (ILRI) Policy Studies Institute […] Source: IFPRI Ethiopia: Ethiopia Strategy Support Program Full Article Events Featured Post News
ive Mapeo de intervenciones en seguridad alimentaria y nutrición en Guatemala: Análisis a nivel municipal By www.ifpri.org Published On :: Wed, 28 Dec 2022 5:05:01 EST La desnutrición y la deficiencia de micronutrientes es un problema grave en Guatemala. Los resultados de la IV Encuesta Nacional de Salud Materno-Infantil 2014-15 (MSPAS, INE, ICF, 2017) indican que el 46.5% de los niños menores de cinco años padecen de desnutrición crónica. Según el portal de datos del Banco Mundial, Guatemala es el país con mayor prevalencia de desnutrición crónica de América Latina y el Caribe y sexto en el mundo. Full Article
ive Five nights at Freddy's. [2], The twisted ones : the graphic novel / by Scott Cawthon and Kira Breed-Wrisley ; adapted by Christopher Hastings ; illustrated by Claudia Aguirre ; colors by Laurie Smith and Eva de la Cruz. By library.gcpl.lib.oh.us Published On :: "It's been a year since the horrific events at Freddy Fazbear's Pizza, and Charlie is just trying to move on. Even with the excitement of a new school and a fresh start, she's still haunted by nightmares of a masked murderer and four gruesome animatronic puppets. Charlie thinks her ordeal is over, but when a series of bodies are discovered near her school bearing wounds that are disturbingly familiar she finds herself drawn back into the world of her father's frightening creations. Something twisted is hunting Charlie, and this time if it finds her, it's not letting her go." -- Publisher's description. Full Article
ive Batman, the Dark Knight detective. Volume 5 / Alan Grant, Archie Goodwin, writers ; pencilers, Norm Breyfogle, Dan Jurgens ; Steve Mitchell, Dick Giordano, inkers ; Adrienne Roy, colorist ; Todd Klein, letterer. By library.gcpl.lib.oh.us Published On :: "Bruce Wayne's latest ward, Tim Drake, has all the makings of becoming the greatest Robin yet. He's intelligent, athletic, and levelheaded, and his detective skills rival those of his mentor. However, every Boy Wonder who has come before has endured tragedy, and Tim may be no exception when his parents are marked for death by the sinister Obeah Man. Will the Dark Knight stop the Obeah Man in time, or must Tim face a deadly rite of passage in order to be worthy of inheriting the mantle of Robin?"--Provided by publisher. Full Article
ive Future state. Batman, dark detective / Mariko Tamaki, Joshua Williamson, Gene Luen Yang [and others], writers ; Dan Mora, Giannis Milonogiannis, Ben Oliver [and others], art ; Jordie Bellaire, Arif Prianto, Otto Schmidt [and others], color ; Aditya Bidika By library.gcpl.lib.oh.us Published On :: "Welcome to the possible future state of Gotham. The Magistrate, a freelance military and surveillance corporation, has been hired by Gotham's leadership to turn the old city into a futuristic surveillance state free of vigilante-based crime/heroics. Batman, horrified to see what his city was becoming, fought tooth and nail against Magistrate— and they killed him for it. Or did they? Bruce Wayne survived this assassination attempt, and has been laying low for years now trying to sort out how to beat Magistrate. The only problem? He doesn't think he can anymore. They're too big, they're too powerful. And the latest horrific revelation? They have eyes everywhere. It's left to Batman for one last mission. Destroy their command center, expose the drones, and free the city. Whatever the cost." -- Provided by publisher. Full Article
ive The way of the hive : a honey bee's story / Jay Hosler. By library.gcpl.lib.oh.us Published On :: "Nyuki is a brand-new honey bee, and she has a lot of questions. Follow her on a lifelong journey as she annoys her sisters, avoids predators, and learns to trust her inner voice as she masters the way of the hive. Includes a section at the end of the book called 'Odds & Ends' with facts and information about bees."--Provided by publisher. Full Article
ive CSA Notice of Consultation – Proposed Amendments to National Instrument 94-101 Mandatory Central Counterparty Clearing of Derivatives By www.osc.ca Published On :: Thu, 19 Sep 2024 14:12:34 GMT IntroductionThe members of the Canadian Securities Administrators (the CSA or we) are publishing for comment proposed amendments to National Instrument 94-101 Mandatory Central Counterparty Clearing of Derivatives (National Instrument 94 Full Article
ive Reducing child undernutrition: Past drivers and priorities for the post-MDG era [in Amharic] By www.ifpri.org Published On :: Tue, 22 Dec 2015 4:12:54 EST Full Article
ive Tenable Introduces AI Aware: A Groundbreaking Proactive Security Solution for AI and Large Language Models By www.tenable.com Published On :: Tue, 10 Sep 2024 09:00:00 -0400 Tenable®, the exposure management company, today announced the release of AI Aware, advanced detection capabilities designed to rapidly surface artificial intelligence solutions, vulnerabilities and weaknesses available in Tenable Vulnerability Management, the world’s #1 vulnerability management solution. Tenable AI Aware provides exposure insight into AI applications, libraries and plugins so organizations can confidently expose and close AI risk, without inhibiting business operations.The rapid development and adoption of AI technologies in the past two years has introduced major cybersecurity and compliance risks that organizations must proactively address without established best practices. As a result, cybersecurity teams face significant AI-related challenges, such as vulnerability detection and remediation, containing data leakage and reining in unauthorized AI use. According to recent Tenable Research, more than one-third of security teams are finding usage of AI applications in their environment that might not have been provisioned via formal processes. In fact, during a 75-day period between late June and early September, Tenable found over 9 million instances of AI applications on more than 1 million hosts. The cybersecurity risk of unfettered AI usage is compounded by the increasing volume of AI vulnerabilities. Tenable Research has found and disclosed several vulnerabilities in AI solutions, including in Microsoft Copilot, Flowise, Langflow, among others.With AI Aware, Tenable transforms proactive security for AI solutions. Tenable AI Aware uniquely leverages agents, passive network monitoring, dynamic application security testing and distributed scan engines to detect approved and unapproved AI software, libraries and browser plugins, along with associated vulnerabilities, thereby mitigating risks of exploitation, data leakage and unauthorized resource consumption. The combined depth of these multiple assessment methods delivers the most complete detection of AI in the modern ecosystem. [Watch the Tenable AI Aware product demo video here.]“In an effort to keep pace with the sea change introduced by AI, organizations around the world ran full speed ahead, potentially bypassing countless cybersecurity, privacy and compliance red flags,” said Shai Morag, chief product officer, Tenable. “Perhaps more so than with any other new technology we’ve seen, there are many risk factors to consider, especially with rushed development and deployment. Tenable AI Aware empowers organizations to deploy AI confidently, ensuring their security measures keep pace with the rapid evolution of AI technologies.”In addition to AI software and vulnerability detection, key AI Aware features available in Tenable Vulnerability Management, Tenable Security Center and Tenable One include:Dashboard Views provide a snapshot of the most common AI software discovered in the ecosystem, top assets with vulnerabilities related to AI and the most common communication ports leveraged by AI technologies. Shadow Software Development Detection illuminates the unexpected existence of the building blocks of AI development in the environment, enabling businesses to align initiatives with organizational best practices.Filter Findings for AI Detections enable teams to focus on AI-related findings when reviewing vulnerability assessment results. Combined with the power of Tenable Vulnerability Prioritization Rating (VPR), teams can effectively assess and prioritize vulnerabilities introduced by AI packages and libraries. Asset-Centric AI-Inventory provides a complete inventory of AI-related packages, libraries and browser plugins while reviewing the detailed profile of an asset. Join the upcoming Tenable webinar titled, "Mitigating AI-Related Security Risks: Insights and Strategies with Tenable AI Aware" on October 9, 2024 at 11:00 am ET, by registering here.More information on Tenable AI Aware is available at: https://www.tenable.com/products/vulnerability-management/ai-aware About TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com. ###Media Contact:Tenabletenablepr@tenable.com Full Article
ive Tenable Selected by Bank of Yokohama to Secure its Active Directory and Eliminate Attack Paths By www.tenable.com Published On :: Fri, 20 Sep 2024 09:00:47 -0400 Tenable®, Inc. the exposure management company, today announced that Bank of Yokohama, one of the largest of the major regional banks in Japan, has chosen Tenable Identity Exposure to protect its Active Directory and enhance the bank’s ability to protect its internal systems from cyber threats.Bank of Yokohama, based in Kanagawa Prefecture and Tokyo Metropolitan, is committed to enhancing industry security standards. In 2023, it collaborated with 19 other regional banks to establish CMS-CSIRT, an organization providing mutual cybersecurity support. Unlike megabanks, regional banks often face resource and budget constraints, making such collaborative efforts crucial for implementing effective security programs.As part of its objectives for FY 2023, the Bank of Yokohama wanted to improve Active Directory (AD) security as it’s the most crucial system in the bank’s intranet. Previously, the bank only applied security patches periodically without any tool or system to detect Active Directory misconfigurations or attacks. Given the evolving threat landscape and rise of attacks involving an identity breach, enhancing the security of Active Directory became a top priority.“Attackers who have infiltrated an organization's internal system or who wield ransomware and other malware, almost always make a beeline for Active Directory,” said Mr. Akihiro Fushimi, Leader, Concordia Financial Group ICT Governance Department, Security Governance Section and Bank of Yokohama ICT Planning & Promotion Department, Security Governance Section. “They steal user account privileges and elevate them via Active Directory, to enable them to access important data. So, securing Active Directory was an area that we wanted to invest in.”Bank of Yokohama already used Tenable Security Center for vulnerability management and trusted Tenable's reliability. Selecting Tenable Identity Exposure was an easy decision, with its fast, agentless feature ensuring a seamless deployment process.The deployment of Tenable Identity Exposure provided the Bank of Yokohama with an in-depth view of its Active Directory. The bank can now accurately identify every AD account, including dormant accounts and machine identities, and understand the potential risks of exploitation by malicious actors due to the multi-functional capabilities of Active Directory. Tenable Identity Exposure detects many of the techniques used in cyber attacks to gain elevated privileges and enable lateral movement, including DCShadow, Brute Force, Password Spraying, Golden Ticket and more.“Previously, we were under the impression that all we needed to do was to apply patches and manage accounts. Now, with the deployment of Tenable Identity Exposure, we are physically able to see the risk of exploitation. This, I believe, is the positive impact of deploying Tenable Identity Exposure. Its alert functions are comprehensive—it detects vulnerabilities as well as misconfigurations,” said Mr. Shinnosuke Shimada, Bank of Yokohama ICT Planning & Promotion Department, Security, Governance Section.“Many organizations struggle to maintain proper Active Directory security as their domains grow more complex, often leaving flaws undetected until a major incident occurs. Given the high-profile attacks involving AD in recent years, it's crucial to prioritize AD security within the overall cybersecurity strategy,” said Naoya Kishima, Country Manager, Tenable Japan. “Bank of Yokohama recognizes this need, and we're pleased to support them in their security journey.”About TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com. Media contactTenable PRtenablepr@tenable.com Full Article
ive Leading Analyst Firm Ranks Tenable #1 for Sixth Consecutive Year in Market Share for Device Vulnerability Management By www.tenable.com Published On :: Thu, 10 Oct 2024 09:00:00 -0400 Tenable®, the exposure management company, today announced that it has been ranked first for 2023 worldwide market share for device vulnerability management in the IDC Worldwide Device Vulnerability Management Market Shares (doc #US51417424, July 2024) report. This is the sixth consecutive year Tenable has been ranked first for market share.According to the IDC market share report, Tenable is ranked first in global 2023 market share and revenue. Tenable credits its success to its strategic approach to risk management, which includes a suite of industry-leading exposure management solutions that expose and close security gaps, safeguarding business value, reputation and trust. The Tenable One Exposure Management Platform, the world’s only AI-powered exposure management platform, radically unifies security visibility, insight and action across the modern attack surface – IT, cloud, OT and IoT, web apps and identity systems.According to the IDC market share report, “The top 3 device vulnerability management vendors remained the same in 2023 as previous years, with Tenable once again being the top vendor.”The report highlighted Tenable’s use of generative AI, noting, “ExposureAI, available as part of the Tenable One platform, provides GenAI-based capabilities that include natural language search queries, attack path and asset exposure summaries, mitigation guidance suggestions, and a bot assistant to ask specific questions about attack path results.”Tenable’s latest innovations in the vulnerability management market – Vulnerability Intelligence and Exposure Response – were also highlighted in the report, stating, “Vulnerability Intelligence provides dynamic vulnerability information collected from multiple data sources and vetted by Tenable researchers, while Exposure Response enables security teams to create campaigns based on risk posture trends so remediation progress can be monitored internally.”The report also spotlighted the Tenable Assure Partner Program and MDR partnerships, noting, “Tenable has made more of a strategic effort to recruit managed security service providers (SPs) and improve the onboarding experience for them, as well as their customers. Managed detection and response (MDR) providers have been adding proactive exposure management because it helps shrink the customer attack surface, helping them provide better outcomes. Sophos and Coalfire are recently announced partners adding managed exposure management services to their MDR and pen testing services, respectively.”“At Tenable, we build products for a cloud-first, platform centric world, meeting customers' evolving risk management needs,” said Shai Morag, chief product officer, Tenable. “We leverage cutting edge technology, innovating across our portfolio to help customers know, expose and close priority security gaps that put businesses at risk.” "The device vulnerability management market is characterized by a focus on broader exposure management, with a number of acquisitions to round out exposure management portfolios," said Michelle Abraham, senior research director, Security and Trust at IDC. "Vendors are advised to enhance their offerings with additional security signals and automated remediation workflows to stay competitive in this evolving landscape."To read an excerpt of the IDC market share report, visit https://www.tenable.com/analyst-research/idc-worldwide-device-vulnerability-management-market-share-report-2023 About TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com. ###Media Contact:Tenabletenablepr@tenable.com Full Article
ive El Museo Van Gogh celebra 150 años de Impresionismo en «¡Vive l’impressionnisme!» By theartwolf.com Published On :: Tue, 08 Oct 2024 07:02:01 +0000 El Museo Van Gogh celebra 150 años de Impresionismo en «¡Vive l’impressionnisme!» Del 11 de... Full Article
ive WAS Executive Summary By www.tenable.com Published On :: Tue, 22 Aug 2023 14:44:48 -0400 From e-commerce to online banking, the world is interconnected with web applications. The internet provides a contactless method to conduct office meetings, engage with healthcare professionals, shop, attend classes, and more. Protecting data has never been more important. Failure to secure web applications can lead to serious financial and reputational consequences. According to statistics published in Tenable's Threat Landscape Report, web application vulnerabilities continue to repeatedly pose a significant threat to organizations. Web application security refers to the practices employed to detect and mitigate threats and vulnerabilities that may compromise the confidentiality, integrity, and availability of web applications. As the internet has evolved to become an integral part of how organizations conduct business, web applications have become increasing popular and essential to meet the requirements. This growing popularity of web applications and online transactions provides lucrative targets for cybercriminals. Data presented within this report highlights the top most vulnerable web applications and assets at risk for exploitation. This report leverages data from Tenable Web App Scanning, a comprehensive and automated vulnerability scanning tool for modern web applications. Organizations can perform Dynamic Application Security Tests (DAST) on any application, anywhere, at any point in the application lifecycle. Of specific importance is the Tenable Web App Scanning ability to scan for vulnerabilities from the Open Web Application Security Project (OWASP) Top 10 risks, and provide comprehensive and accurate vulnerability data. The Open Web Application Security Project (OWASP) is a non-profit foundation that provides community-driven consensus insight into web application security concerns. The OWASP Top 10 list highlights several different aspects of web-based security, such as Cross-Site Scripting attacks, security misconfigurations, and sensitive data exposure. The focus of the OWASP Top 10 is to reduce risk across the most vulnerable aspects of web applications across the internet. Following these guidelines enables organizations to reduce risk of organizational and customer data theft. In addition, Common Vulnerability and Exposures (CVE), and other configuration tests provide insight into thousands of related vulnerabilities and misconfigurations. Vulnerability data presented in this report leverages all the gathered web application vulnerability information to provide organizations with a method to break the vulnerability cycle. The data provided in the report enables organizations to better communicate risk, prioritize patching efforts, and reduce the attack surface. This report is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The report can be easily located in the Tenable.sc Feed under the category Executive. The report requirements are: Tenable.sc 6.2.0 Tenable Web App Scanning Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable Security Center discovers and analyzes assets continuously to provide an accurate and unified view of an organization's security posture. Chapters New Web Application Vulnerabilities: This chapter provides a view of web application vulnerabilities which are newly discovered. The elements summarize the first stage of vulnerabilities in the risk life cycle. The Web Application Vulnerabilities by State matrix tracks web application vulnerabilities through each state provides management information on the progress of risk mitigation efforts. The following two tables provide the Top 100 Web URLs and newly discovered vulnerabilities. The Top 100 Most Vulnerable Web Applications (Last 14 Days) focuses on the Assets according to the URL scanned using the Tenable Web Application Scanner. While the Top 100 WAS Vulnerabilities and Affected Assets (Last 14 Days) table provides more detail showing the vulnerability and the associated assets. New OWASP 2021 Vulnerabilities: This chapter provides a view of OWASP 2021 vulnerabilities which are newly discovered. The OWASP 2021 Categories (Last 14 days) matrix displays web application vulnerabilities identified using the 2021 OWASP categories. The following two tables provide the Top 100 Web URLs and newly discovered vulnerabilities. The OWASP 2021 Top 100 Most Vulnerable Web Applications (Last 14 Days) focuses on the Assets according to the URL scanned using the Tenable Web Application Scanner. While the OWASP 2021 Top 100 WAS Vulnerabilities and Affected Assets (Last 14 Days) table provides more detail showing the vulnerability and the associated assets. Full Article
ive Dear Lilly : from father to daughter : the truth about life, love, and the world we live in. By library.gcpl.lib.oh.us Published On :: A father offers his advice, opinions, and the many useful stories gleaned from his past experiences in order to help his beloved daughter not only survive, but thrive in the dangerous and unpredictable world of young adulthood. From the pen of a former abused child, drug addict, womanizing frat boy, and suicidal depressive, comes forth the emotionally stirring account of a young man's battle with crippling inner demons and his eventual road to enlightenment. Peter Greyson calls upon his wisdom as both father and school teacher to gently lead teenage girls through a maze of truth, deception, and adolescent uncertainty. Greyson's literary style sparkles with a youthful enthusiasm that will capture your heart and provide boundless inspiration. Dear Lilly is a survival guide that offers the brutally honest male perspective to young women struggling for answers to life's deepest questions. Topics include: Boys lie What every guy wants from his girlfriend Tales from the drug world Everybody hurts High school exposed Full Article
ive Une analyse comparative des méthodes de mise á jour et de rééquilibrage des matrices de comptabilité sociale By www.ifpri.org Published On :: Thu, 29 Sep 2022 5:05:01 EDT Les modèles d’équilibre général calculable (MEGC), largement admis dans la littérature et utilisés comme outils d’analyse d’impacts potentiels de politiques économiques, sont alimentés par des données provenant de la Matrice de Comptabilité Sociale (MCS). Celle-ci appartient à la grande famille des comptes nationaux, représentant l’ensemble des interrelations entre les activités, les institutions d’une économie. Full Article
ive Van Gogh Museum celebrates 150 years of Impressionism in “Vive l’impressionnisme!” By theartwolf.com Published On :: Tue, 08 Oct 2024 07:04:01 +0000 Van Gogh Museum celebrates 150 years of Impressionism in “Vive l’impressionnisme!” From 11 October 2024... Full Article
ive The MFAH is the exclusive U.S. Venue for “Gauguin’s World” By theartwolf.com Published On :: Sun, 03 Nov 2024 07:04:01 +0000 The MFAH is the exclusive U.S. Venue for “Gauguin’s World” From November 3, 2024, through... Full Article
ive WAS Executive Summary By www.tenable.com Published On :: Mon, 21 Aug 2023 19:41:49 -0400 From e-commerce to online banking, the world is interconnected with web applications. The internet provides a contactless method to conduct office meetings, engage with healthcare professionals, shop, attend classes, and more. Protecting data has never been more important. Failure to secure web applications can lead to serious financial and reputational consequences. According to statistics published in Tenable's Threat Landscape Report, web application vulnerabilities continue to repeatedly pose a significant threat to organizations. Web application security refers to the practices employed to detect and mitigate threats and vulnerabilities that may compromise the confidentiality, integrity, and availability of web applications. As the internet has evolved to become an integral part of how organizations conduct business, web applications have become increasing popular and essential to meet the requirements. This growing popularity of web applications and online transactions provides lucrative targets for cybercriminals. Data presented within this dashboard highlights the top most vulnerable web applications and assets at risk for exploitation. This dashboard leverages data from Tenable Web App Scanning, a comprehensive and automated vulnerability scanning tool for modern web applications. Organizations can perform Dynamic Application Security Tests (DAST) on any application, anywhere, at any point in the application lifecycle. Of specific importance is the Tenable Web App Scanning ability to scan for vulnerabilities from the Open Web Application Security Project (OWASP) Top 10 risks, and provide comprehensive and accurate vulnerability data. The Open Web Application Security Project (OWASP) is a non-profit foundation that provides community-driven consensus insight into web application security concerns. The OWASP Top 10 list highlights several different aspects of web-based security, such as Cross-Site Scripting attacks, security misconfigurations, and sensitive data exposure. The focus of the OWASP Top 10 is to reduce risk across the most vulnerable aspects of web applications across the internet. Following these guidelines enables organizations to reduce risk of organizational and customer data theft. In addition, Common Vulnerability and Exposures (CVE), and other configuration tests provide insight into thousands of related vulnerabilities and misconfigurations. Vulnerability data presented in this dashboard leverages all the gathered web application vulnerability information to provide organizations with a method to break the vulnerability cycle. The data provided in the dashboard enables organizations to better communicate risk, prioritize patching efforts, and reduce the attack surface. Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable Security Center discovers and analyzes assets continuously to provide an accurate and unified view of an organization's security posture. The requirement for this dashboard is: Tenable Web App Scanning. Components Top 100 Most Vulnerable Web Applications (Last 14 Days): The table displays a list of the vulnerabilities the application from most severe to least severe. This information enables analysts to prioritize remediation efforts by identifying the top vulnerabilities to remediate that will reduce the organization's overall attack surface. Top 100 WAS Vulnerabilities by Plugins (Last 14 Days): This table provides a list of Web Application vulnerabilities that have been seen within the last 14 days as well as the total number of instances of each vulnerability. The Plugin Family is displayed as well as the Plugin ID and Severity of each vulnerability. This information enables analysts to prioritize remediation efforts by identifying the top vulnerabilities to remediate that will reduce the organization's overall attack surface. Web App Vulnerabilities by State: This matrix provides a view into the vulnerability life cycle for web applications. Tracking web application vulnerabilities through each state provides management information on the progress of risk mitigation efforts. Top 2021 OWASP Categories Discovered in the Last 14 Days: This matrix displays active Web Application vulnerabilities from Tenable Web App Security by OWASP category for 2021. Displayed is a row for assets and vulnerabilities for each OWASP category. Full Article
ive Does conflict-driven internal displacement influence demand for agricultural inputs? Evidence from Nigeria By www.ifpri.org Published On :: Thu, 26 Sep 2024 16:29:26 +0000 Does conflict-driven internal displacement influence demand for agricultural inputs? Evidence from Nigeria Examining the effectiveness of vouchers and marketing information. The post Does conflict-driven internal displacement influence demand for agricultural inputs? Evidence from Nigeria appeared first on IFPRI. Full Article
ive Global Food Policy Report 2024: Improving governance to create supportive environments for diet and nutrition policies By www.ifpri.org Published On :: Fri, 11 Oct 2024 14:09:33 +0000 Global Food Policy Report 2024: Improving governance to create supportive environments for diet and nutrition policies Key steps to strengthen institutions and relationships The post Global Food Policy Report 2024: Improving governance to create supportive environments for diet and nutrition policies appeared first on IFPRI. Full Article
ive Comprehensive sanitation in India: Despite progress, an unfinished agenda By www.ifpri.org Published On :: Wed, 23 Oct 2024 17:03:18 +0000 Comprehensive sanitation in India: Despite progress, an unfinished agenda Building on improvements in Infant mortality. The post Comprehensive sanitation in India: Despite progress, an unfinished agenda appeared first on IFPRI. Full Article
ive World Cities Day 2024: Building more inclusive, sustainable, and resilient urban food systems By www.ifpri.org Published On :: Thu, 31 Oct 2024 16:12:18 +0000 World Cities Day 2024: Building more inclusive, sustainable, and resilient urban food systems IFPRI researchers on urbanization. The post World Cities Day 2024: Building more inclusive, sustainable, and resilient urban food systems appeared first on IFPRI. Full Article
ive EHP Funds Inc. and EHP Global Multi-Strategy Alternative Fund By www.osc.ca Published On :: Thu, 07 Nov 2024 15:09:26 GMT HeadnoteNational Policy 11-203 Process for Exemptive Relief Applications in Multiple Jurisdictions -- Relief granted from fund multi-layering restriction in paragraph 2.5(2)(b) of NI 81-102 to permit an investment fund to invest in another investment fund under common management that hol Full Article
ive Ruthless river : love & survival by raft on the Amazon's relentless Madre de Dios / Holly Conklin FitzGerald. By library.gcpl.lib.oh.us Published On :: The author describes how her honeymoon was cut short when her plane crashed in the jungles of Peru, forcing her and her husband to try to survive aboard a makeshift raft as they made their way down the Amazon River to civilization. Full Article
ive Donia Human Rights Center Panel Discussion | Reproductive Rights as Human Rights: International Perspectives (November 13, 2024 4:00pm) By events.umich.edu Published On :: Thu, 17 Oct 2024 08:56:22 -0400 Event Begins: Wednesday, November 13, 2024 4:00pm Location: Lane Hall Organized By: Donia Human Rights Center Payal Shah, JD, Director, Program on Sexual Violence in Conflict Zones, Physicians for Human Rights; Tamara Dávila, Human Rights Fellow at the Arcus Center for Social Justice Leadership in Kalamazoo College, Michigan; Seda Saluk, Assistant Professor, Women’s and Gender Studies, University of Michigan. Co-sponsored by: U-M Global Feminisms Project, Department of Women's and Gender Studies, Institute for Research on Women and Gender, University of Michigan, and Center for Middle East and North African Studies This interdisciplinary panel will discuss ongoing efforts around the world to defend reproductive justice as an essential human right, tied to the rights to life, health, equality and autonomy. Speakers will address the role of legal and medical professionals as well as scholars and activists in documenting the harm of restrictions on reproductive rights and advocating for victims with particular focus on the U.S., Nicaragua and Turkey. This event is free and open to the public, but registration is required if you intend to participate virtually. Register at: https://myumi.ch/qV9xg CHAIR: Professor Michele Heisler, MD, MPA Professor, Internal Medicine, Health Behavior and Health Equity; Medical Director, Physicians for Human Rights. Dr. Michele Heisler is renowned for her work in advancing health through respect for human rights and addressing social determinants of health. Internationally recognized for her research on the health consequences of human rights violations, she has authored over 300 peer-reviewed articles and has been instrumental in developing protocols, legislation, and partnerships aimed at preventing violence and discrimination. PANELISTS: Payal Shah, JD Director, Program on Sexual Violence in Conflict Zones, Physicians for Human Rights (participating virtually via Zoom) Payal Shah, a distinguished human rights lawyer with over 15 years in gender equality and sexual and reproductive rights advocacy, currently directs a major initiative on reproductive rights at Physicians for Human Rights. Her work focuses on training and advocacy to support survivors of sexual violence and improve forensic evidence collection globally. Tamara Dávila Human Rights Fellow, Arcus Center for Social Justice Leadership, Kalamazoo College, Michigan Tamara Dávila, a Nicaraguan psychologist, feminist activist, and human rights defender, has dedicated her career to advocating for sexual and reproductive rights and supporting survivors of violence. Dávila's activism has led to her imprisonment, and she continues her advocacy work from exile in the United States, focusing on empowering marginalized communities. Seda Saluk, PhD Assistant Professor, Women’s and Gender Studies, University of Michigan Feminist anthropologist Seda Saluk specializes in medical anthropology, science and technology studies, and Middle East studies. Her current book project, “Monitoring Reproduction: Surveillance and Care in Turkey”, investigates the complexities of reproductive surveillance against the backdrop of demographic changes. Her research has been widely supported and published in several leading academic journals. If there is anything we can do to make this event accessible to you, please contact us. Please be aware that advance notice is necessary as some accommodations may require more time for the university to arrange. Full Article Conference / Symposium
ive Distinguished University Professorship Lecture Series (November 13, 2024 4:00pm) By events.umich.edu Published On :: Thu, 10 Oct 2024 13:08:06 -0400 Event Begins: Wednesday, November 13, 2024 4:00pm Location: Michigan League Organized By: University and Development Events Sponsored by the Office of the President and the Office of the Provost, this event features three Distinguished University Professors speaking on their professional and scholarly experiences. Each concise lecture will be followed by a brief Q & A. “Evolutionary Genetics: Origins of Biodiversity” by Patricia J. Wittkopp (Deborah E. Goldberg Distinguished University & Arthur F. Thurnau Professor of Ecology & Evolutionary Biology and Molecular, Cellular & Developmental Biology, College of Literature, Science, and the Arts). “The Making of an Academic Surgeon” by Kevin C. Chung (William C. Grabb Distinguished University Professor of Surgery, Charles B. G. De Nancrede Professor of Surgery, Plastic Surgery and Orthopaedic Surgery, Michigan Medicine). “Do You Know Mathematics Well Enough to Teach Fourth Grade?” by Deborah Loewenberg Ball (Jessie Jean Storey-Fry Distinguished University Professor of Education, Arthur F. Thurnau Professor, William H. Payne Collegiate Professor of Education, Professor of Education, Marsal Family School of Education, Research Professor, Survey Research Center, Institute for Social Research). Full Article Lecture / Discussion
ive Generative AI in the Classroom, Part 1 (November 13, 2024 12:00pm) By events.umich.edu Published On :: Fri, 04 Oct 2024 13:21:18 -0400 Event Begins: Wednesday, November 13, 2024 12:00pm Location: Off Campus Location Organized By: Information and Technology Services (ITS) This workshop is designed to equip faculty with the necessary skills and knowledge to begin integrating Generative Artificial Intelligence into the classroom setting and considering its impact on students and instructions. Suggestions for discussing GenAI with students and guidance on writing a GenAI syllabus statement are explored in this workshop. This workshop also offers ideas for designing assignments in a GenAI era, ranging from (re)designing assignments to integrating GenAI into assignments. U-M GPT demonstrations will be included in this workshop. Recommended Prerequisites: Generative AI Basics [https://academictechnology.umich.edu/get-help/training/instructional-support/workshops/133] Register: https://ttc.iss.lsa.umich.edu/ttc/sessions/generative-ai-in-the-classroom-11-13-24-2/ Workshop Outline: - Can GenAI complete my assessment? How will GenAI affect my courses? - Talking about GenAI with students - GenAI syllabus statements - Designing assignments in a GenAI era - Resources and Support Topics: Generative AI Level: Beginner Trainers: Monica Hickson and Jennifer Love Full Article Workshop / Seminar
ive Adaptive Rec and Tech Showcase (November 13, 2024 11:30am) By events.umich.edu Published On :: Tue, 05 Nov 2024 10:21:55 -0500 Event Begins: Wednesday, November 13, 2024 11:30am Location: School of Kinesiology Building Organized By: School of Kinesiology Stop by to learn about and try out adaptive sport, recreation, and daily living equipment! Featuring demos from: --- Michigan Disability Rights Coalition Assistive Technology Program --- U-M Adaptive Sports & Fitness --- U-M KidSport Adaptive Summer Camps --- U-M Adaptive & Inclusive Sports Experience (UMAISE) Questions? Email Dr. Haylie Miller at millerhl@umich.edu. Full Article Exhibition
ive Mission Meals Collective and Sheltering in Place By ww2.kqed.org Published On :: Fri, 20 Nov 2020 18:13:57 +0000 Since the beginning of shelter-in-place orders in March, businesses across the U.S. have been forced to close their doors in accordance with shelter-in-place restrictions. While many storefronts now stand quiet and vacant, Eterna Primavera Bakery on 24th and Alabama streets is an exception to the desolation. Every Sunday since early March, the Guatemalan bakery transforms … Continue reading Mission Meals Collective and Sheltering in Place → Full Article
ive A Bay Area Creamery Gives Kamala Harris Its Highest Honor: An Ice Cream Flavor By ww2.kqed.org Published On :: Tue, 19 Jan 2021 23:00:08 +0000 The co-founders of Koolfi Creamery say they resonate with Harris’ mixed-Indian heritage and support of gay marriage—including their own. Full Article
ive Navigating the Trade Landscape: A Latin American Perspective building on the WTO 13th Ministerial Conference By www.ifpri.org Published On :: Thu, 22 Aug 2024 11:33:58 +0000 Navigating the Trade Landscape: A Latin American Perspective building on the WTO 13th Ministerial Conference The governance of agricultural and food trade is facing unprecedented challenges in a rapidly evolving global landscape. As traditional agricultural trade issues, such as domestic support and market access, seem to lose their prominence and the feasibility of advancing with a multilateral strategy diminishes, the focus is shifting toward the environmental and nutritional dimensions of […] The post Navigating the Trade Landscape: A Latin American Perspective building on the WTO 13th Ministerial Conference appeared first on IFPRI. Full Article