your Know Your Delhi Candidate: Kapil Mishra By www.ndtv.com Published On :: Sun, 09 Feb 2020 17:00:59 +0530 Kapil Mishra is a former Aam Aadmi Party (AAP) leader-turned BJP candidate for the Delhi election. When he was with the AAP, Mr Mishra was elected from Delhi's Karawalnagar seat in the 2014 Delhi... Full Article People
your Know Your Delhi Candidate: Arvinder Singh Lovely By www.ndtv.com Published On :: Sun, 09 Feb 2020 18:29:05 +0530 Arvinder Singh Lovely is a Congress leader who had walked out of his party in 2017 to join the BJP. He returned to the Congress in February 2018. Mr Lovely, who has been the Delhi Education Minister... Full Article People
your Know Your Delhi Candidate: Satyendar Jain By www.ndtv.com Published On :: Sun, 09 Feb 2020 19:18:30 +0530 Satyendar Jain is an Aam Aadmi Party (AAP) leader and a minister in Arvind Kejriwal's cabinet. He holds multiple portfolios including the Health Ministry. Full Article People
your Know Your Delhi Candidate: Raghav Chadha By www.ndtv.com Published On :: Tue, 11 Feb 2020 10:51:09 +0530 Aam Aadmi Party (AAP) leader Raghav Chadha, party's candidate from central Delhi's Rajinder Nagar, is pitted against BJP veteran RP Singh, a 58-year-old advertising professional from the same... Full Article People
your CONVERSATIONS-Share your success stories By www.banknetindia.com Published On :: Banknet Group will publish stories of achievers, entrepreneurs from BFSI, IT Full Article
your How To Customise Your Car Insurance Policy? By www.banknetindia.com Published On :: How To Customise Your Car Insurance Policy? Full Article
your Ensure a motivated labour force in your business By www.banknetindia.com Published On :: How to ensure a highly motivated labour force in your business? Full Article
your Wellness is directly proportionate to your health insurance By www.banknetindia.com Published On :: How your wellness is directly proportionate to your health insurance premium? Full Article
your Players getting paid? Video games returning? Answering your NCAA name, image and likeness questions By www.espn.com Published On :: Thu, 30 Apr 2020 09:39:52 EST The NCAA supports a proposal allowing college athletes to sign endorsement deals and receive money for other work, as long as their schools aren't involved. What does this mean for college athletics -- and its beloved football video game? Full Article
your BoardSurfers: Allegro In-Design Impedance Analysis: Screen your Routed Design Quickly By community.cadence.com Published On :: Tue, 28 Apr 2020 13:12:00 GMT Have you ever manufactured a printed circuit board (PCB) without analyzing all the routed signal traces? Most designers will say “yes, all the time.” Trace widths and spacing are set by constraints,... [[ Click on the title to access the full blog on the Cadence Community site. ]] Full Article
your Start Your Engines: AMSD Flex – Your Instant Access to Latest Spectre Features! By community.cadence.com Published On :: Fri, 01 May 2020 06:59:00 GMT Cadence ® Spectre ® AMS Designer is a high-performance mixed-signal simulation system. The ability to use multiple engines, and drive from a variety of platforms enables you to "rev... [[ Click on the title to access the full blog on the Cadence Community site. ]] Full Article
your Tales from DAC: Altair's HERO Is Your Hero By feedproxy.google.com Published On :: Mon, 29 Jul 2019 21:07:00 GMT Emulators are great. They vastly speed up verification to the point where it’s hard to imagine life without them; as designs grow in complexity, simple simulation can’t keep up for the biggest designs. The extra oomph from emulation is almost a necessity for the top percentages of design sizes. However, many users of Palladium aren’t efficiently using their unit’s processing power, and as a result they’re missing out on the full speed-up potential that Palladium can provide. Altair’s HERO is here for you. With its help, your Palladium unit can be even more amazing for your productivity than before. HERO (that’s Hardware Emulator Resource Optimizer) adds emulator support to Altair’s Accelerator. You already know and love Altair’s scheduling tools; so why not make them do more for you, so you can be one of those people who are making the most out of their Palladium system? Emulators are kind of like big computers, but it’s a lot harder to manage leftover resources on an emulator than it is on, say, a CPU. A scheduler like HERO neatly sidesteps this problem by more intelligently using the resources available to ensure that there’s a minimal patchwork of leftover resources to begin with. HERO supports past generations of Palladium as well, so if you’re still using an older version, you can still take advantage of the upgrades HERO provides. There’s a wide variety of features HERO has that make your emulator easier to use. HERO separates a job into a “select” section and a “run” section: the “select” part makes a last-minute decision on which domains or boards to use, while the “run” part is the actual job. This makes it easier to ensure that your Palladium emulator is being used as efficiently as possible. Jobs are placed using “shapes”, which are a set of job types; these can be selected from a list of pre-defined ones by the user. Shapes can have special constraints if those are needed. A new reservation system also helps HERO organize Palladium’s processing power better. HERO offers both “hard” reservations and “soft” reservations. A hard reservation locks other users out of reserving any part of the emulator at all, while a soft reservation allows a user to reserve a part of the emulator for a later use. Think of it like this: a soft reservation is like grabbing a ticket from the deli counter, while a hard reservation stops you from ever entering the market. When using HERO, you can manage your entire verification workload. You’ll find that your utilization of your emulator vastly increases—it’s been reported that some users using only 30% of the capabilities of their Palladium unit(s) saw a massive increase to over 90% once they made the switch to HERO. If you’re ready to take your Palladium productivity to the next level, Altair has a HERO for you. To see the full presentation given by Andrea Casotto in the Cadence Theater at DAC 2019, check here. Full Article Cadence Theater HERO Palladium Altair Engineering DAC 2019
your Specman: Analyze Your Coverage with Python By feedproxy.google.com Published On :: Wed, 06 Nov 2019 13:31:00 GMT In the former blog about Python and Specman: Specman: Python Is here!, we described the technical information around Specman-Python integration. Since Python provides so many easy to use existing libraries in various fields, it is very tempting to leverage these cool Python apps. Coverage has always been the center of the verification methodology, however in the last few years it gets even more focus as people develop advanced utilities, usually using Machine Learning aids. Anyhow, any attempt to leverage your coverage usually starts with some analysis of the behavior and trends of some typical tests. Visualizing the data makes it easier to understand, analyze, and communicate. Fortunately, Python has many Visualization libraries. In this blog, we show an example of how you can use the plotting Python library (matplotlib) to easily display coverage information during a run. In this blog, we use the Specman Coverage API to extract coverage data, and a Python module to display coverage grades interactively during a single run and the way to connect both. Before we look at the example, if you have read the former blog about Specman and Python and were concerned about the fact that python3 is not supported, we are glad to update that in Specman 19.09, Python3 is now supported (in addition to Python2). The TestcaseLet’s say I have a stable verification environment and I want to make it more efficient. For example: I want to check whether I can make the tests shorter while hardly harming the coverage. I am not sure exactly how to attack this task, so a good place to start is to visually analyze the behavior of the coverage on some typical test I chose. The first thing we need to do is to extract the coverage information of the interesting entities. This can be done using the old Coverage API. Coverage APICoverage API is a simple interface to extract coverage information at a certain point. It is implemented through a predefined struct type named user_cover_struct. To use it, you need to do the following: Define a child of user_cover_structusing like inheritance (my_cover_struct below). Extend its relevant methods (in our example we extend only the end_group() method) and access the relevant members (you can read about the other available methods and members in cdnshelp). Create an instance of the user_cover_structchild and call the predefined scan_cover() method whenever you want to query the data (even in every cycle). Calling this method will result in calling the methods you extended in step 2. The code example below demonstrates these three steps. We chose to extend the end_group() method and we keep the group grade in some local variable. Note that we divide it by 100,000,000 to get a number between 0 to 1 since the grade in this API is an integer from 0 to 100,000,000. struct my_cover_struct like user_cover_struct { !cur_group_grade:real; //Here we extend user_cover_struct methods end_group() is also { cur_group_grade = group_grade/100000000; }}; extend sys{ !cover_info : my_cover_struct; run() is also { start monitor_cover (); }; monitor_cover() @any is { cover_info = new; while(TRUE) { // wait some delay, for example – wait [10000] * cycles; // scan the packet.packet_cover cover group compute cover_info.scan_cover("packet.packet_cover"); };//while };// monitor_cover};//sys Pass the Data to a Python ModuleAfter we have extracted the group grade, we need to pass the grade along with the cycle and the coverage group name (assuming there are a few) to a Python module. We will take a look at the Python module itself later. For now, we will first take a look at how to pass the information from the e code to Python. Note that in addition to passing the grade at certain points (addVal method), we need an initialization method (init_plot) with the number of cycles, so that the X axis can be drawn at the beginning, and end_plot() to mark interesting points on the plot at the end. But to begin with, let’s have empty methods on the Python side and make sure we can just call them from the e code. # plot_i.pydef init_plot(numCycles): print (numCycles)def addVal(groupName,cycle,grade): print (groupName,cycle,grade)def end_plot(): print ("end_plot") And add the calls from e code: struct my_cover_struct like user_cover_struct { @import_python(module_name="plot_i", python_name="addVal") addVal(groupName:string, cycle:int,grade:real) is imported; !cur_group_grade:real; //Here we extend user_cover_struct methods end_group() is also { cur_group_grade = group_grade/100000000; //Pass the values to the Python module addVal(group_name,sys.time, cur_group_grade); } //end_group};//user_cover_struct extend sys{ @import_python(module_name="plot_i", python_name="init_plot" init_plot(numCycles:int) is imported; @import_python(module_name="plot_i", python_name="end_plot") end_plot() is imported; !cover_info : my_cover_struct; run() is also { start scenario(); }; scenario() @any is { //initialize the plot in python init_plot(numCycles); while(sys.time<numCycles) { //Here you add your logic //get the current coverage information for packet cover_info = new; var num_items:= cover_info.scan_cover("packet.packet_cover"); //Here you add your logic };//while //Finish the plot in python end_plot(); }//scenario}//sys The green lines define the methods as they are called from the e The blue lines are pre-defined annotations that state that the method in the following line is imported from Python and define the Python module and the name of the method in it. The red lines are the calls to the Python methods. Before running this, note that you need to ensure that Specman finds the Python include and lib directories, and Python finds our Python module. To do this, you need to define a few environment variables: SPECMAN_PYTHON_INCLUDE_DIR, SPECMAN_PYTHON_LIB_DIR, and PYTHONPATH. The Python Module to Draw the PlotAfter we extracted the coverage information and ensured that we can pass it to a Python module, we need to display this data in the Python module. There are many code examples out there for drawing a graph with Python, especially with matplotlib. You can either accumulate the data and draw a graph at the end of the run or draw a graph interactively during the run itself- which is very useful especially for long runs. Below is a code that draws the coverage grade of multiple groups interactively during the run and at the end of the run it prints circles around the maximum point and adds some text to it. I am new to Python so there might be better or simpler ways to do so, but it does the work. The cool thing is that there are so many examples to rely on that you can produce this kind of code very fast. # plot_i.pyimport matplotlibimport matplotlib.pyplot as plt plt.style.use('bmh') #set interactive modeplt.ion() fig = plt.figure(1)ax = fig.add_subplot(111) # Holds a specific cover groupclass CGroup: def __init__(self, name, cycle,grade ): self.name = name self.XCycles=[] self.XCycles.append(cycle) self.YGrades=[] self.YGrades.append(grade) self.line_Object= ax.plot(self.XCycles, self.YGrades,label=name)[-1] self.firstMaxCycle=cycle self.firstMaxGrade=grade def add(self,cycle,grade): self.XCycles.append(cycle) self.YGrades.append(grade) if grade>self.firstMaxGrade: self.firstMaxGrade=grade self.firstMaxCycle=cycle self.line_Object.set_xdata(self.XCycles) self.line_Object.set_ydata(self.YGrades) plt.legend(shadow=True) fig.canvas.draw() #Holds all the data of all cover groups class CData: groupsList=[] def add (self,groupName,cycle,grade): found=0 for group in self.groupsList: if groupName in group.name: group.add(cycle,grade) found=1 break if found==0: obj=CGroup(groupName,cycle,grade) self.groupsList.append(obj) def drawFirstMaxGrade(self): for group in self.groupsList: left, right = plt.xlim() x=group.firstMaxCycle y=group.firstMaxGrade #draw arrow #ax.annotate("first maximum grade", xy=(x,y), #xytext=(right-50, 0.4),arrowprops=dict(facecolor='blue', shrink=0.05),) #mark the points on the plot plt.scatter(group.firstMaxCycle, group.firstMaxGrade,color=group.line_Object.get_color()) #Add text next to the point text='cycle:'+str(x)+' grade:'+str(y) plt.text(x+3, y-0.1, text, fontsize=9, bbox=dict(boxstyle='round4',color=group.line_Object.get_color())) #Global datamyData=CData() #Initialize the plot, should be called oncedef init_plot(numCycles): plt.xlabel('cycles') plt.ylabel('grade') plt.title('Grade over time') plt.ylim(0,1) plt.xlim(0,numCycles) #Add values to the plotdef addVal(groupName,cycle,grade): myData.add(groupName,cycle,grade) #Mark interesting points on the plot and keep it showndef end_plot(): plt.ioff(); myData.drawFirstMaxGrade(); #Make sure the plot is being shown plt.show(); #uncomment the following lines to run this script with simple example to make sure #it runs properly regardless of the Specman interaction #init_plot(300)#addVal("xx",1,0)#addVal("yy",1,0)#addVal("xx",50,0.3)#addVal("yy",60,0.4)#addVal("xx",100,0.8)#addVal("xx",120,0.8)#addVal("xx",180,0.8)#addVal("yy",200,0.9)#addVal("yy",210,0.9)#addVal("yy",290,0.9)#end_plot() In the example we used, we had two interesting entities: packet and state_machine, thus we had two equivalent coverage groups. When running our example connecting to the Python module, we get the following graph which is displayed interactively during the run. When analyzing this specific example, we can see two things. First, packet gets to a high coverage quite fast and significant part of the run does not contribute to its coverage. On the other hand, something interesting happens relating to state_machine around cycle 700 which suddenly boosts its coverage. The next step would be to try to dump graphic information relating to other entities and see if something noticeable happens around cycle 700. To run a complete example, you can download the files from: https://github.com/okirsh/Specman-Python/ Do you feel like analyzing the coverage behavior in your environment? We will be happy to hear about your outcomes and other usages of the Python interface. Orit KirshenbergSpecman team Full Article Specman Specman coverage engine coverage Python Functional Verification Specman e e e language specman elite functional coverage
your BoardSurfers: Allegro In-Design Impedance Analysis: Screen your Routed Design Quickly By feedproxy.google.com Published On :: Tue, 28 Apr 2020 13:12:00 GMT Have you ever manufactured a printed circuit board (PCB) without analyzing all the routed signal traces? Most designers will say “yes, all the time.” Trace widths and spacing are set by constraints, and many designers simply don’t h...(read more) Full Article PCB design Sigrity Allegro
your IC Packagers: Identify Your Components By feedproxy.google.com Published On :: Tue, 24 Mar 2020 14:19:00 GMT We’ve all seen bar codes and the more modern QR codes. They’re everywhere you go – items at the grocery store, advertisements and posters, even on websites. Did you know that, with the productivity toolbox in Allegro Package Designe...(read more) Full Article Allegro Package Designer Allegro PCB Editor
your IC Packagers: You Can Leave Your (Molding) Cap On… By feedproxy.google.com Published On :: Tue, 21 Apr 2020 14:27:00 GMT Molding caps aren’t something we talk about too frequently around here. We all know they exist, and they serve an important purpose of protecting the delicate die from potentially harsh environmental conditions. They impact how well heat can be...(read more) Full Article Allegro Package Designer
your Welcome! Please use this forum to upload your code By feedproxy.google.com Published On :: Tue, 05 Aug 2008 21:01:43 GMT Please include a brief summary of how to use it. Full Article
your Are You Stuck While Synthesizing Your Design Due to Low-Power Issues? We Have the Solution! By feedproxy.google.com Published On :: Tue, 31 Mar 2020 14:39:00 GMT Optimizing power can be a very convoluted and crucial process. To make design chips meet throughput goals along with optimal power consumption, you need to plan right from the beginning! (read more) Full Article Low Power Logic Design
your Start Your Engines: AMSD Flex—Take your Pick! By feedproxy.google.com Published On :: Thu, 16 Apr 2020 22:16:00 GMT Introduction to AMSD Flex mode and its benefits.(read more) Full Article mixed signal design AMS Designer AMSD AMSD Flex Mode mixed-signal verification
your Start Your Engines: AMSD Flex – Your Instant Access to Latest Spectre Features! By feedproxy.google.com Published On :: Fri, 01 May 2020 06:59:00 GMT This blog talks about how to enable the AMS Designer flex mode.(read more) Full Article mixed signal design AMS Designer AMSD AMSD Flex Mode mixed-signal verification
your Virtuosity: Are Your Layout Design Mansions Correct-by-Construction? By community.cadence.com Published On :: Thu, 26 Mar 2020 14:21:00 GMT Do you want to create designs that are correct by construction? Read along this blog to understand how you can achieve this by using Width Spacing Patterns (WSPs) in your designs. WSPs, are track lines that provide guidance for quickly creating wires. Defining WSPs that capture the width-dependent spacing rules, and snapping the pathSegs of a wire to them, ensures that the wires meet width-dependent spacing rules.(read more) Full Article ICADVM18.1 Advanced Node Layout Suite width spacing patterns Layout Virtuoso Virtuosity usability Custom IC Design ux
your #MakeYourOwnMask: সেলাই না করেই বাড়িতে বানিয়ে ফেলুন মাস্ক, জেনে নিন কীভাবে By bengali.news18.com Published On :: Full Article
your #MakeYourOwnMask: বাড়িতেই সহজে বানিয়ে ফেলুন ফেস্ক মাস্ক, জেনে নিন কীভাবে By bengali.news18.com Published On :: Full Article
your #MakeYourOwnMask: ঘরে তৈরি মাস্ক কি করোনা মোকাবিলা করতে পারবে? By bengali.news18.com Published On :: Full Article
your #MakeYourOwnMask: পুরনো টিশার্ট দিয়েই চটজলদি বানিয়ে ফেলুন মাস্ক ! কীভাবে? পড়ে নিন By bengali.news18.com Published On :: Full Article
your #MakeYourOwnMask: বাড়িতেই সহজে বানিয়ে ফেলুন ফেস্ক মাস্ক, জেনে নিন কীভাবে By bengali.news18.com Published On :: Full Article
your Ultrasonic Waves Can Make Siri Share Your Secrets By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:21:08 GMT Full Article headline privacy flaw apple
your Attention Symantec - There Is A Bug Crawling On Your Website By packetstormsecurity.com Published On :: Wed, 15 Apr 2009 10:59:55 GMT Full Article symantec xss
your Oracle Spoils Your Day With Nearly 150 Patches By packetstormsecurity.com Published On :: Thu, 16 Jan 2014 04:00:14 GMT Full Article headline flaw patch oracle blackberry java
your What's This About Canada Reading Your BlackBerry Texts? By packetstormsecurity.com Published On :: Fri, 15 Apr 2016 14:14:41 GMT Full Article headline government privacy phone canada blackberry backdoor
your This App Will Tell You If Your iPhone Gets Hacked By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:40:47 GMT Full Article headline hacker phone apple backdoor
your Vietnamese Security Firm - Your Face Is Easy To Fake By packetstormsecurity.com Published On :: Tue, 02 Dec 2008 12:40:17 GMT Full Article vietnam
your It's Hacker Summer Camp This Week - Expect Searches For Guns In Your Hotel Room By packetstormsecurity.com Published On :: Mon, 05 Aug 2019 14:42:12 GMT Full Article headline hacker government usa terror conference
your Planes, Gate, And Bags: How Hackers Can Hijack Your Local Airport By packetstormsecurity.com Published On :: Fri, 11 Oct 2019 14:57:26 GMT Full Article headline hacker terror
your Smart TVs: The Cyberthreat Lurking In Your Living Room By packetstormsecurity.com Published On :: Mon, 02 Dec 2019 17:31:47 GMT Full Article headline government malware usa spyware backdoor samsung
your FBI, NSA To Hackers: Let Us Be Blunt, Weed Need Your Help By packetstormsecurity.com Published On :: Thu, 08 Aug 2019 14:23:43 GMT Full Article headline hacker government usa fbi nsa
your 4 US Agencies Don't Properly Verify Your Data Due To The Equifax Breach By packetstormsecurity.com Published On :: Fri, 14 Jun 2019 16:08:03 GMT Full Article headline government privacy usa data loss fraud identity theft
your Equifax Owes You Cash For Losing Your Data By packetstormsecurity.com Published On :: Fri, 26 Jul 2019 15:54:45 GMT Full Article headline hacker privacy cybercrime data loss fraud identity theft
your Accepting Network Update Texts Could Have Pwned Your Mobe By packetstormsecurity.com Published On :: Thu, 05 Sep 2019 13:39:40 GMT Full Article headline hacker phone flaw israel google
your New iOS Text Bomb Bug Can Crash Your iPhone By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 14:34:04 GMT Full Article headline phone flaw apple
your Federal Officials Are Using Your Cellphone Data To Respond To The Outbreak By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 15:32:51 GMT Full Article headline government privacy usa virus phone
your COVID-19 Malware Wipes Your PC And Rewrites Your MBR By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 13:49:35 GMT Full Article headline malware virus denial of service
your Android Trojan Has Miner So Aggressive It Can Bork Your Battery By packetstormsecurity.com Published On :: Tue, 19 Dec 2017 14:22:11 GMT Full Article headline malware phone trojan flaw google
your GPlayed Trojan's Baby Brother Is After Your Bank Account By packetstormsecurity.com Published On :: Tue, 30 Oct 2018 15:43:10 GMT Full Article headline malware bank trojan cybercrime fraud
your Chrome 79 Checks Your Passwords Against Public Data Breaches By packetstormsecurity.com Published On :: Fri, 13 Dec 2019 15:07:12 GMT Full Article headline hacker data loss google password chrome
your CursedChrome Turns Your Browser Into A Hacker's Proxy By packetstormsecurity.com Published On :: Mon, 04 May 2020 15:37:12 GMT Full Article headline hacker flaw google chrome
your US To Demand Five Years Of Your Social Media, Email Account Info In Your Visa Application By packetstormsecurity.com Published On :: Mon, 03 Jun 2019 14:09:54 GMT Full Article headline government privacy usa facebook social twitter terror
your Hackers Could Read Your Hotmail, MSN, And Outlook Emails By Abusing Microsoft Support By packetstormsecurity.com Published On :: Mon, 15 Apr 2019 16:32:54 GMT Full Article headline hacker privacy microsoft email flaw
your Improve Your Fundraising Approach and Skills at NetSquared Meetups By feeds.techsoup.org Published On :: Mon, 02 Oct 2017 13:37:00 GMT Fall has arrived, and with it comes fundraising season. More than one-third of charitable giving happens in the last three months of the year, and the emergence of Giving Tuesday (on November 28 this year) makes the year's end even more critical for charities. Feeling overwhelmed? Your local NetSquared group is here to help with free, in-person events being held across the U.S. and the globe. Naples, Florida, is hosting a meetup on tools for effective email fundraising; Chippewa Falls, Wisconsin, is hosting a series of Giving Tuesday brainstorming sessions; and Chicago, Illinois, will explore how your CRM can save end-of-year fundraising plans. With more than 75 events scheduled for October, there's probably an event scheduled for your community, so RSVP now for one of our meetups. Join us! Upcoming Tech4Good Events This roundup of face-to-face nonprofit tech events includes meetups from NetSquared, NTEN's Tech Clubs, and other awesome organizations. If you're holding monthly events that gather the #nptech community, let me know, and I'll include you in the next community calendar, or apply today to start your own NetSquared group. Jump to events in North America or go international with events in Africa and Middle East Asia and Pacific Rim Central and South America Europe and U.K. North America Monday, October 2, 2017 Vancouver, British Columbia: Photojournalism for Nonprofits and Small Businesses #Storymakers2017 Tuesday, October 3, 2017 Portland, Oregon Happy Hour with Nonprofit Tech Luminaries NTEN Presents: Oregon Nonprofit Tech Roundup Montréal, Québec: Développer une Présence Web Efficace Naples, Florida: Tools for Effective Email Communication Mason, Ohio: Connecting Nonprofits and Techies in Cincinnati Wednesday, October 4, 2017 Pittsburgh, Pennsylvania: Bagels and Bytes — Allegheny Baltimore, Maryland: WordPress 101 and Tech Help and Consultations San Francisco, California: Code for America Civic Hack Night (Weekly) Thursday, October 5, 2017 Calgary, Alberta: Evening on Data Ethics Friday, October 6, 2017 Seattle, Washington: King County Executive Director Forum Monday, October 9, 2017 Chippewa Falls, Wisconsin: Giving Tuesday Brainstorming Tuesday, October 10, 2017 Columbus, Ohio: Nonprofit IT Forum Decatur, Illinois: Free and Low-Cost Resources for Nonprofit Software Ottawa, Ontario: Review Progress on Data Analysis Projects Wednesday, October 11, 2017 Mason, Ohio: Help Create an App for Homeless to Manage Money More Effectively San Francisco, California: Code for America Civic Hack Night (Weekly) Boston, Massachusetts: Tech Networks of Boston Roundtable: Building an Effective Data Culture at Your Nonprofit O’Fallon, Missouri: Learn How to Apply for a $10,000 per Month Google AdWords Grant Phoenix, Arizona: Website Building 101: Quick and Easy Web Presence for Nonprofits Los Angeles, California: Nonprofit Volunteer Management Chicago, Illinois: Net Neutrality Thursday, October 12, 2017 Chicago, Illinois: It's Never Too Late: How Your CRM Can Save End-of-Year Fundraising Seattle, Washington: What You Need to Know About Board Governance Saturday, October 14, 2017 Saint Paul, Minnesota: Minnesota Blogger Conference | by Get Social Events, the Social Media Breakfast Folks ($25) Monday, October 16, 2017 San Francisco, California: Social Impact in Tech: Panel Discussion with LinkedIn, Lyft, and Salesforce Chippewa Falls, Wisconsin: Giving Tuesday Brainstorming Seattle, Washington: Fall Nonprofit Technology Speed Geek Tuesday, October 17, 2017 Buffalo, New York: Essential Data Management Orlando, Florida: Tech4Good Orlando October: Search Engine Optimization and Strategy Wednesday, October 18, 2017 San Francisco, California: Code for America Civic Hack Night (Weekly) Houston, Texas: NetSquared Houston Research Triangle Park, North Carolina: Crowdsourcing Change: The Social Web to Nonprofits Thursday, October 19, 2017 Monroeville, Pennsylvania: TechNow 2017 Conference Sweet Briar, Virginia: Using Data to Reach Your Audience Friday, October 20, 2017 West Chester, Ohio: Southwest Ohio Give Camp Boston, Massachusetts: Tech Networks of Boston Roundtable: Can Appmaker Help You? A Free Database Tool from Google Monday, October 23, 2017 Chippewa Falls, Wisconsin: Giving Tuesday Brainstorming Austin, Texas: Engaging the Millennial Donor Tuesday, October 24, 2017 Vancouver, British Columbia: How Delivering Webinars Can Benefit Your Mission Wednesday, October 25, 2017 Baltimore, Maryland: Salesforce 101 for Nonprofits and Free Tech Help and Guidance San Francisco, California: Code for America Civic Hack Night (Weekly) Seattle, Washington: Recruit, Engage, and Retain a Great Board Monday, October 30, 2017 Chippewa Falls, Wisconsin: Giving Tuesday Brainstorming Tuesday, October 31, 2017 Seattle, Washington: Bolder and Wiser: Nonprofit Advocacy Rights (Part 2) Central and South America Wednesday, October 4, 2017 Guatemala City, Guatemala: Pechakucha Guatemala — Historias Digitales Vol. 15 Africa and Middle East Sunday, October 1, 2017 Cotonou, Benin: L'Utilité des Logiciels de TechSoup dans la Progression d Nos ONG dans le Monde Kampala, Uganda: Digital Storytelling for Nonprofits Workshop Monday, October 2, 2017 Ouagadougou, Burkina Faso: Monthly Meeting of Local Members Saturday, October 7, 2017 Matloding, South Africa: Technology for Rural Development Bunda, Tanzania: Microsoft Cloud Computing Morogoro, Tanzania: Role of ICT for Farm Management Wednesday, October 11, 2017 Bamenda, Cameroon: How to Create Digital Stories Friday, October 13, 2017 Katabi, Uganda: Using Social Media Applications for Development Pangani, Tanzania: Storymakers Campaign Saturday, October 14, 2017 Bunda, Tanzania: Microsoft Cloud Computing Sunday, October 15, 2017 Cotonou, Benin: Les Logiciels Mis en Don par Techsoup.org pour les ONG et Association au Benin Saturday, October 21, 2017 Bunda, Tanzania: Microsoft Cloud Computing Saturday, October 28, 2017 Bunda, Tanzania: Microsoft Cloud Computing Morogoro, Tanzania: Technology for Livelihood Improvement Asia and Pacific Rim Tuesday, October 3, 2017 Taipei, Taiwan: NGO要怎麼搞群眾募資?- 綠盟經驗談 Wednesday, October 4, 2017 Singapore, Singapore: DataJam! Tuesday, October 10, 2017 Wellington, New Zealand: Set Your Email Newsletter on Fire | Net2Welly Oct '17 Meetup Sunday, October 15, 2017 Jakarta, Indonesia: Web Hosting Europe and U.K. Tuesday, October 3, 2017 Paris, France: AdWords Express — Grands Débutants Wednesday, October 4, 2017 Puidoux, Switzerland: 7ème Journée Pédagogique ESV-SPV (AVMES/AVMD) Friday, October 6, 2017 Carouge, Switzerland: 12h de Hackaton pour Afficher les Termes et Conditions, Que Vous Ne Lirez Jamais Saturday, October 7, 2017 Genève, Switzerland: LINforum3 Partage Idée, Réflexion, Projet, Startup, Service … Responsables! Wednesday, October 11, 2017 Cambridge, United Kingdom: Social Media Surgery — Hands-on Help with Social Media Thursday, October 12, 2017 Paris, France: La Data pour Vous Renforcer Saturday, October 14, 2017 Pully, Switzerland: Intergen.Digital à Pully Monday, October 16, 2017 Birmingham, United Kingdom: Social Media Session Tuesday, October 17, 2017 Dublin, Ireland: Smart Cities for Good Wednesday, October 18, 2017 Paris, France: Forum National des Associations et des Fondations Bordeaux, France: Les Personas pour Optimiser Votre Conversion Thursday, October 19, 2017 Bath, United Kingdom: Tech for Good Community Mapping Paris, France: Brainstorming, Plans d'Actions sur Internet Wednesday, October 25, 2017 Manchester, United Kingdom: Tech for Good: At the BBC Paris, France: AdWords – Initiation Paudex, Switzerland: RdV4–0.ch: 3. Solutions Informatiques — Cloud — SaaS — Services en Ligne Thursday, October 26, 2017 Barcelona, Spain: ¡Relanzamos NetSquared Barcelona! ¡Te Esperamos! Paris, France: Analytics — Initiation Tuesday, October 31, 2017 Renens, Switzerland: OpenLab: Visite du Fablab de Renens Left photo: Gregory Munyaneza / NetSquared Rwanda / CC BY Center photo: Chrispin Okumu / NetSquared Kenya / CC BY Right photo: Chrispin Okumu / NetSquared Kenya / CC BY spanhidden Full Article fundraising event
your Protecting Yourself from Malware with Better Password Security By feeds.techsoup.org Published On :: Fri, 20 Oct 2017 22:36:00 GMT 4 In Week 1 of National Cybersecurity Awareness Month (NCSAM) we looked at spoofed emails, cybercriminals' preferred method of spreading malware. Today, in an effort to provide you with the best information out there to keep you safe online, we're hitting you with a double dose of cybersafety news. Let's take look at the topics for Week 2 and 3 of National Cybersecurity Awareness Month: malware and password security. They're separate but related issues in the world of Internet crime prevention, and a better understanding of each is key to protecting your property and personal information in today's digital world. Malware Malware is an umbrella term used to describe software that is intended to damage or disable computers and computer systems. If you'd like, you can take a moment and watch this video on malware from Norton Security. But the best way to begin protecting yourself against this stuff is to learn about all the different types of malware that can affect your computer. There are tons, so we'll just go over the broader categories for now. Viruses: Malicious bits of code that replicate by copying themselves to another program, computer boot sector, or document and change how a computer works. Viruses are typically attached to an executable file or program and spread once a user opens that file and executes it. Worms: They're like viruses, but are different in terms of the way they're spread. Worms typically exploit a vulnerability or a weakness that allows an attacker to reduce a system's information assurance. Missed that last Windows update? You might be more vulnerable to worms. Trojans: These look like legitimate pieces of software and are activated after a user executes them. Unlike a virus or a worm, a trojan does not replicate a copy of itself. Instead, it lurks silently in the background, compromising users' sensitive personal data. Ransomware: This refers to a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking or threatening to erase the users' files unless a ransom is paid. You may recall the WannaCry attack that affected users across the globe this summer, only to be thwarted by the accidental discovery of a "kill switch" that saved people from the malicious software. Spyware: This malware collects your personal information (such as credit card numbers) and often passes this information along to third parties online without you knowing. You can check out more descriptions and examples of the types of malware that exist today at MalwareFox, a malware detection and removal software program. Tips for Protecting Yourself Against Malware Staying malware-free doesn't require an engineering degree. You can greatly reduce, if not completely eliminate, your chances of falling victim to malware by following these easy tips. Keep your operating system current. Keep your software up to date, particularly the software you use to browse the Internet. Install antivirus and security software and schedule weekly scans. At TechSoup, we're protected by Symantec Endpoint Protection. At home, there are dozens of solutions you can use to protect yourself (PCMag lists many here). Mind where you click. Think twice before you download torrent videos or free Microsoft Office templates from some random website. Avoid public, nonpassword, nonencrypted Wi-Fi connections when you can. Use a VPN when you cannot. Spread the Word Let people know that TechSoup is helping you become more #CyberAware by sharing a message on your social media channels. If you tag @TechSoup on Twitter, we'll retweet the first two tweets. Remember, we're all in this together. Password Security Now that we've covered the nasty stuff that can make your life miserable if it ends up on your computer, let's go over some password security tips to help prevent malware from getting there in the first place. Using best practices when it comes to protecting your passwords is a proven way to protect your personal and financial information. Curious how knowledgeable you already are? Watch this video and take this quiz to enter a drawing for a $25 Amazon gift card! First, let's go over some facts. Passwords are the first line of defense to protect your personal and financial information. A weak password can allow viruses to gain access to your computer and spread through TechSoup's or your family's network. It's estimated that 73 percent of users have the same password for multiple sites and 33 percent use the same password every time. (Source: Digicert, May 2014) Despite a small sample size of 1,110 U.S. adults, a recent YouGov survey still found that 28 percent of adults use the same passwords for most of their online accounts. (Source: Business Insider, October 2017). Best Practices for Effective Password Protection One great way to better protect yourself is by opting for a passphrase, which is much more difficult to crack than a single-word password. Here are some guidelines to creating one. Pick a famous quote or saying and use the first letter of each word. Add a number that you can remember. Capitalize one letter. Make it unique by adding the first letter of your company's name to the beginning or end of the passphrase. Make it between 16 and 24 characters. You should never write your password down, but if you must, never store user IDs and passwords together. Finally — even though it might seem unwieldy — you should always use a different password for each site that requires one. In today's world, everything is connected. A savvy hacker can easily breach your bank account, email, and medical records in one fell swoop if you're using the same password for all three. Additional Cybersecurity Resources In case you missed it, take a look at last week's post on recognizing suspicious emails. Need a little inspiration? Find out how TechSoup and Symantec are making a difference in the lives of at-risk teens. Get more security tips from the National Cyber Security Alliance. National Cyber Security Alliance Month — observed every October — was created as a collaborative effort between government and industry to ensure that all Americans have the resources they need to stay safer and more secure online. Find out how you can get involved. spanhidden Full Article