ppl A3: Coping with Forms: Implementing a Web Form Management Application By www.ukoln.ac.uk Published On :: 2008-07-22 Creating good forms is a tricky business encompassing a wide range of disciples (accessibility, usability, security, etc). What's more, the development of bespoke online forms, and their back-end reporting interfaces, can be a huge resource drain for institutional Web teams. This session will tackle these problems by asking 'what do we need to know to make better forms, and how can we better manage form development processes'? As a case study, we will look at how the implementation of a form building and management application has aided the Web team at City University. The session was facilitated by Dan Jackson, City University. Full Article
ppl David Supple (2004) By www.ukoln.ac.uk Published On :: 2004-07-27 David Supple is manager of the Corporate Web team at the University of Birmingham and manager of the University's Institutional Portal Project. His teams remit is the development of the site to facilitate the e-business and e-learning aims of the institution, and the delivery of a Web-enabled organisational vision. In real terms this means the re-corporatization of the University Web site, through a focussed Web strategy, common infrastructures and templates, centralised hardware, adequate support and a customer focussed internal sales process to help convince users to migrate back to the centre. The Web Team uses mostly Microsoft products (a challenge in itself), with occasional forays into MySQL and Unix just to keep us sane. Over the coming year, David's focus will be on developing a major portal environment for the University, something that has been in planning for almost 2 years now, and he is keen to engage with the HE community on this new type of development to help maximise the potential of this technology. David is also interested in Web strategy in general and the development of organisational structures and processes as they respond to a more electronic view of the world. David Supple gave a plenary talk on Trials, Trips and Tribulations of an Integrated Web Strategy. Full Article
ppl Plenary Talk 3: Building Highly Scalable Web Applications By www.ukoln.ac.uk Published On :: 2007-07-17 Jeff Barr, Amazon Web Services (Senior Manager, Web Services Evangelism) will discuss Amazon's approach to Web-scale computing. Using this new approach, developers can use Amazon's broad line of web services to rapidly and cost-effectively build scalable and flexible Web applications. Jeff will focus on Amazon's newest services, including the Simple Queue Service, the Simple Storage Service, and the Elastic Compute Cloud. The talk will include technical details and an overview of how the services are being used by customers all over the world. Full Article
ppl EU AI Act Will Formally Become Law and Provisions Will Start to Apply on a Staged Basis By www.littler.com Published On :: Mon, 15 Jul 2024 13:37:45 +0000 As previously discussed, in March the European Parliament approved the EU Artificial Intelligence Act (the “Act”), creating the world’s first comprehensive set of rules for artificial intelligence. On July 12, 2024, the Act was published in the European Union Official Journal, which is the final step in the EU legislative process. Full Article
ppl US biz concerned over crackdown on Xinjiang supply chain, fears backfiring By www.littler.com Published On :: Thu, 05 Aug 2021 20:03:33 +0000 Stefan Marculewicz weighs in on the possibility of the US government implementing supply chain restrictions amid claims of forced labor in Xinjiang, despite the opposition of the business world. Global Times View Full Article
ppl An application for refugee status may prevent you from starting work By www.littler.com Published On :: Thu, 05 May 2022 17:35:13 +0000 Karolina Schiffter discusses whether Ukrainian citizens who claim refugee status can work in Poland. Gazeta Prawna View (Subscription required.) Full Article
ppl Business and Human Rights for Small Companies – What is the Impact of the German Supply Chain Due Diligence Act on the Supplier Side? By www.littler.com Published On :: Thu, 23 Feb 2023 14:06:18 +0000 The new German Supply Chain Due Diligence Act imposes new obligations on larger companies, which must, among other things, check their entire supply chain for violations of human rights and environmental concerns. Companies that are not yet directly covered by the scope of application—i.e., suppliers—are also indirectly affected, as they are subject to comparable obligations. Full Article
ppl Germany: Update on the European Supply Chain Directive By www.littler.com Published On :: Fri, 22 Mar 2024 19:32:19 +0000 On March 15, 2024, the EU member states voted in favor of the European Supply Chain Directive (Corporate Sustainability Due Diligence Directive – CSDDD) in the EU Committee of Permanent Representatives (COREPER) after a long back-and-forth. The vote, originally scheduled for February 9, 2024, had been initially canceled and postponed indefinitely. The reason for this was that numerous member states – including Germany – had already announced their abstention from the vote in advance. The final version of the directive is less burdensome for companies compared to the previous draft. Full Article
ppl EU Parliament Votes in Favor of the European Supply Chain Due Diligence Directive (CSDDD) By www.littler.com Published On :: Wed, 24 Apr 2024 15:16:30 +0000 On Wednesday, April 24, 2024, the EU member states in the EU Parliament voted in favor of the European Supply Chain Directive (Corporate Sustainability Due Diligence Directive – CSDDD). This is one of the final steps in a long legislative process. The vote had been delayed several times at the beginning of the year because some EU member states—including Germany—had announced that they would vote against the directive. The planned liability regime of the directive was a particular point of contention. Content and scope Full Article
ppl How AI Will Make Global Supply Chains Smarter, and Alter the Employment Landscape in a Post-Pandemic World By www.littler.com Published On :: Thu, 09 Jul 2020 20:37:50 +0000 Mickey Chichester and Natalie Pierce examine how companies may turn to AI and robotics to mitigate disruption and some of the employment implications of such initiatives. Supply Chain Toolbox View Article Full Article
ppl New Jersey Court Clarifies Application of 2019 Wage and Hour Law Amendments By www.littler.com Published On :: Tue, 11 Jun 2024 14:18:33 +0000 On August 6, 2019, New Jersey’s wage and hour laws were amended to include liquidated damages on some claims, a new retaliation cause of action, and expansion of the statute of limitations from two to six years (the “2019 amendments”). Since then, litigants in New Jersey have struggled with the effect those amendments have had on their lawsuits. One of the main points of confusion centered around whether the 2019 amendments applied retroactively to violations prior to August 6, 2019, or whether the changes applied prospectively only. A significant conflict developed between federal and Full Article
ppl Puerto Rico Secretary of Labor Clarifies the Application of Act No. 27-2024 By www.littler.com Published On :: Fri, 13 Sep 2024 17:52:27 +0000 On September 10, 2024, the Puerto Rico Secretary of Labor issued an Opinion (No. 2024-02) to clarify and provide additional information about the application of Act No. 27-2024, known as the "Act to Facilitate the Implementation of Remote Work in the Private Sector and to Incentivize the Establishment of Airline Bases in Puerto Rico.” Act No. 27-2024 exempts from certain employment law coverage domiciled and non-domiciled employees working remotely from Puerto Rico for out-of-state employers with no business nexus to Puerto Rico, and certain unionized airline employees. Full Article
ppl Belgium: New Rules Apply in the Brussels Capital Region Regarding International Mobility By www.littler.com Published On :: Fri, 20 Sep 2024 14:47:21 +0000 The rules on the employment of third-country nationals (which apply regionally) were recently amended in the Brussels Capital Region by an ordinance issued on February 1, 2024, and its implementing decree on May 16, 2024. The following is a summary of these new rules. Full Article
ppl OFCCP Identifies 400 Supply & Service Contractor Establishments to be Audited Beginning in June By www.littler.com Published On :: Tue, 31 May 2022 18:50:12 +0000 On May 20, 2022, the Office of Federal Contract Compliance Programs (OFCCP) published its FY 2022 Corporate Scheduling Announcement List (CSAL) for supply and service contractors. OFCCP has stated that it will immediately begin to send out scheduling letters to some of the contractors on the new list. This is a change from the past when OFCCP would wait at least 45 days from publication of the list before beginning audits. See U.S. Full Article
ppl OFCCP Identifies 500 Compliance Evaluations for Supply & Service Contractors By www.littler.com Published On :: Mon, 23 Jan 2023 15:51:24 +0000 On January 20, 2023, the Office of Federal Contract Compliance Programs (OFCCP) published its FY 2023 Corporate Scheduling Announcement List (CSAL) for supply and service contractors. The CSAL includes 452 establishment reviews, 24 Corporate Management Compliance Evaluation reviews, and 24 Functional Affirmative Action Program (FAAP) reviews. Full Article
ppl OFCCP Identifies 500 Compliance Evaluations for Supply & Service Contractors By www.littler.com Published On :: Fri, 07 Jun 2024 20:34:24 +0000 On June 7, 2024, the Office of Federal Contract Compliance Programs (OFCCP) published its FY 2024 Corporate Scheduling Announcement List (CSAL) for Supply and Service Contractors. The CSAL is a courtesy notification, and the review will start once the establishment receives OFCCP’s Office of Management and Budget (OMB) approved scheduling letter. Full Article
ppl SEC In-House Judges Ruling Will Ripple to Other Federal Agencies By www.littler.com Published On :: Mon, 01 Jul 2024 21:08:42 +0000 Michael Lotito says the Supreme Court’s decision to curb the SEC’s in-house courts may result in challenges for state labor agencies that use a similarly modeled in-house enforcement and appeals process. Bloomberg Law View (Subscription required.) Full Article
ppl Insight: Puerto Rico Labor secretary clarifies application of Act 27-2024 By www.littler.com Published On :: Fri, 20 Sep 2024 17:31:09 +0000 Verónica M. Torres-Torres explains new guidance on exemptions for remote workers and airline staff in Puerto Rico. News is My Business View Full Article
ppl New Whistleblowing Law Applies to Internal Complaints By www.littler.com Published On :: Tue, 22 Jun 2021 16:20:43 +0000 Philip Berkowitz weighs in on the Anti-Money Laundering Act’s whistleblower protections that took effect this year. SHRM Online View (Subscription required.) Full Article
ppl Connecticut Limits Inquiries into Age of Job Applicants By www.littler.com Published On :: Thu, 05 Aug 2021 20:09:49 +0000 Kyle Roseman and Lori Alexander examine a new law in Connecticut, Public Act 21-69, which bans employers from inquiring into the ages of prospective employees "on an initial employment application." SHRM Online View (Subscription required.) Full Article
ppl How to Identify Forced Labor in Supply Chains By www.littler.com Published On :: Fri, 30 Dec 2022 16:29:47 +0000 Donald Dowling says abusive labor practices are a huge problem around the world, and often the smaller local manufacturers, miners and growers within countries that are committing labor abuses are bigger problems than the multinational firms. SHRM Online View (Subscription required). Full Article
ppl High Court to Review Standard Applied to “Reverse Discrimination” Cases By www.littler.com Published On :: Mon, 28 Oct 2024 13:55:45 +0000 On October 4, 2024, the U.S. Supreme Court granted certiorari in Ames v. Ohio Department of Youth Services (Case No. 23-1039) to decide whether plaintiffs who are members of historically majority communities asserting “reverse discrimination” claims under Title VII must show there are “background circumstances” that support the inference that the defendant is the “unusual employer who discriminates against the majority.” The “Background Circumstances” Requirement Full Article
ppl COVID-19: The New Normal – International Guide Supplement By www.littler.com Published On :: Mon, 11 May 2020 13:20:36 +0000 Due to the effects of the COVID-19 pandemic, governments across the world have implemented various measures to slow the spread of the virus, protect workers’ health and safety, and assist employers to recover from the economic crisis, among other programs. Full Article
ppl U.S. Supreme Court Clarifies When the Federal Arbitration Act’s “Transportation Exemption” Applies By www.littler.com Published On :: Mon, 15 Apr 2024 21:47:00 +0000 On April 12, 2024, the U.S. Supreme Court addressed whether the Federal Arbitration Act’s (FAA) transportation exemption—meaning the FAA would not apply—only relates to workers within the transportation industry. In Bissonnette v. LePage Bakeries Park St., LLC,1 the Supreme Court unanimously held Section 1 of the FAA exempts classes of workers who are actively engaged in interstate transportation, even if the individuals are not employed by a company in the transportation industry (the “Transportation Exemption”). Full Article
ppl Ninth Circuit: “Transportation Exemption” Does Not Apply to Arbitration Clauses Between Corporate Entities or in Commercial Contracts By www.littler.com Published On :: Tue, 23 Apr 2024 21:40:41 +0000 Two days before the United States Supreme Court ruled in Bissonnette v. LePage Bakeries Park St., LLC,1 that the Federal Arbitration Act’s (FAA) transportation worker exemption (meaning the FAA would not apply) extends beyond the transportation industry, the U.S. Court of Appeals for the Ninth Circuit addressed whether the exemption applies to “contracts of employment” between business entities. In Fli-Lo Falcon, LLC v. Full Article
ppl Pencils, Paper, and Now NLRA Legal Protections – New General Counsel Memorandum Provides College Student Athletes with a Very Significant New “School Supply” By www.littler.com Published On :: Fri, 01 Oct 2021 18:32:52 +0000 On September 29, 2021, National Labor Relations Board (NLRB) General Counsel (GC) Jennifer A. Abruzzo released a nine-page memorandum taking the unequivocal position that “certain Players at Academic Institutions” are employees under Section 2(3) of the National Labor Relations Act (NLRA). Refusing to call such players “student athletes,” Abruzzo asserts in the memorandum (GC 21-08) that: Full Article
ppl High Court to Review Standard Applied to ‘Reverse Discrimination’ Cases By www.littler.com Published On :: Thu, 07 Nov 2024 14:46:32 +0000 Alyesha Asghar and Julian G.G. Wolfson explain “background circumstances,” which are required as evidence in cases of reverse discrimination, and the implications for employers and IE&D. Wolters Kluwer View (Subscription required) Full Article
ppl ETSI releases first globally applicable standard for consumer IoT security By www.etsi.org Published On :: Thu, 28 Apr 2022 09:30:38 GMT ETSI releases first globally applicable standard for consumer IoT security Sophia Antipolis, 19 February 2019 The ETSI Technical Committee on Cybersecurity (TC CYBER) has just released ETSI TS 103 645, a standard for cybersecurity in the Internet of Things, to establish a security baseline for internet-connected consumer products and provide a basis for future IoT certification schemes. Read More... Full Article
ppl ETSI Open Source MANO unveils Release SEVEN, enables more than 20,000 cloud-native applications for NFV environments By www.etsi.org Published On :: Thu, 28 Apr 2022 13:56:06 GMT ETSI Open Source MANO unveils Release SEVEN, enables more than 20,000 cloud-native applications for NFV environments Sophia Antipolis, 12 December 2019 Today, the ETSI Open Source MANO group is pleased to unveil its latest release, OSM Release SEVEN. This release brings cloud-native applications to NFV deployments, enabling OSM to on-board over 20,000 pre-existing production-ready Kubernetes applications, with no need of any translation or repackaging. OSM release SEVEN allows you to combine within the same Network Service the flexibility of cloud-native applications with the predictability of traditional virtual and physical network functions (VNFs and PNFs) and all the required advanced networking required to build complex end to end telecom services. Read More... Full Article
ppl ETSI releases a Technical Report on autonomic network management and control applying machine learning and other AI algorithms By www.etsi.org Published On :: Thu, 28 Apr 2022 06:14:33 GMT ETSI releases a Technical Report on autonomic network management and control applying machine learning and other AI algorithms Sophia Antipolis, 5 March 2020 The ETSI Technical Committee on Core Network and Interoperability Testing (TC INT) has just released a Technical Report, ETSI TR 103 626, providing a mapping of architectural components for autonomic networking, cognitive networking and self-management. This architecture will serve the self-managing Future Internet. The ETSI TR 103 626 provides a mapping of architectural components developed in the European Commission (EC) WiSHFUL and ORCA Projects, using the ETSI Generic Autonomic Networking Architecture (GANA) model. The objective is to illustrate how the ETSI GANA model specified in the ETSI specification TS 103 195-2 can be implemented when using the components developed in these two projects. The Report also shows how the WiSHFUL architecture augmented with virtualization and hardware acceleration techniques can implement the GANA model. This will guide implementers of autonomics components for autonomic networks in their optimization of their GANA implementations. The TR addresses autonomic decision-making and associated control-loops in wireless network architectures and their associated management and control architectures. The mapping of the architecture also illustrates how to implement self-management functionality in the GANA model for wireless networks, taking into consideration another Report ETSI TR 103 495, where GANA cognitive algorithms for autonomics, such as machine learning and other AI algorithms, can be applied. Full Article
ppl New ETSI specification allows single UICC to support the use of multiple applications simultaneously By www.etsi.org Published On :: Thu, 27 Oct 2022 09:48:19 GMT New ETSI specification allows single UICC to support the use of multiple applications simultaneously Sophia Antipolis, 26 October 2022 New specifications released by ETSI will enable multiple subscriptions and identities to exist in the same smartphone handset without needing several SIM cards to be within the device. The mobile telecom industry has been facing an increasing demand for applications running on mobile devices like banking, payments, transport and identity for some time. These new specifications address this demand by adding the possibility to host and address several "virtual secure elements" into the same UICC. This allows multiple virtual secure elements to coexist logically separated, whilst having the ability to be addressed independently through the same physical interface. Read More... Full Article
ppl New ETSI White Paper on MEC Support for Edge Native Design: an application developer perspective By www.etsi.org Published On :: Thu, 22 Jun 2023 13:06:18 GMT Sophia Antipolis, 22 June 2023 ETSI has just released a new White Paper on “MEC Support for Edge Native Design” written by members of the ETSI Multi-access Edge Computing group (ISG MEC). This White Paper provides an overview and vision about the Edge Native approach, as a natural evolution of Cloud Native. Read More... Full Article
ppl ETSI Open Source MANO announces Release SIXTEEN, enabling cloud-native orchestration of cloud infrastructure and applications By www.etsi.org Published On :: Wed, 04 Sep 2024 10:25:15 GMT Sophia Antipolis, 4 September 2024 The ETSI Open Source MANO community is proud to announce OSM Release SIXTEEN, a Long-Term-Support (LTS) release of ETSI OSM, which becomes the most innovative and feature-packed release shipped by OSM to date. This release brings a revolution in OSM’s functionality, positioning OSM as a generalized cloud-native orchestrator for infrastructure, platforms and services, which extends significantly its former scope. Full cloud-native management of Kubernetes clusters in public clouds, together with the applications or software units running on them, is now possible with Release SIXTEEN. Every operation related to the cluster management (creation, upgrading, scaling, deletion) or the applications running on them is reflected in Git repositories, following the GitOps model. This has been possible thanks to a major change in the internal architecture of OSM. Read More... Full Article
ppl Cybersecurity Snapshot: Apply Zero Trust to Critical Infrastructure’s OT/ICS, CSA Advises, as Five Eyes Spotlight Tech Startups’ Security By www.tenable.com Published On :: Fri, 01 Nov 2024 09:00:00 -0400 Should critical infrastructure orgs boost OT/ICS systems’ security with zero trust? Absolutely, the CSA says. Meanwhile, the Five Eyes countries offer cyber advice to tech startups. Plus, a survey finds “shadow AI” weakening data governance. And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy.Dive into six things that are top of mind for the week ending Nov. 1.1 - Securing OT/ICS in critical infrastructure with zero trustAs their operational technology (OT) computing environments become more digitized, converged with IT systems and cloud-based, critical infrastructure organizations should beef up their cybersecurity by adopting zero trust principles.That’s the key message of the Cloud Security Alliance’s “Zero Trust Guidance for Critical Infrastructure,” which focuses on applying zero trust methods to OT and industrial control system (ICS) systems.While OT/ICS environments were historically air gapped, that’s rarely the case anymore. “Modern systems are often interconnected via embedded wireless access, cloud and other internet-connected services, and software-as-a-service (SaaS) applications,” reads the 64-page white paper, which was published this week.The CSA hopes the document will help cybersecurity teams and OT/ICS operators enhance the way they communicate and collaborate. Among the topics covered are:Critical infrastructure’s unique threat vectorsThe convergence of IT/OT with digital transformationArchitecture and technology differences between OT and ITThe guide also outlines this five-step process for implementing zero trust in OT/ICS environments:Define the surface to be protectedMap operational flowsBuild a zero trust architectureDraft a zero trust policyMonitor and maintain the environmentA zero trust strategy boosts the security of critical OT/ICS systems by helping teams “keep pace with rapid technological advancements and the evolving threat landscape,” Jennifer Minella, the paper’s lead author, said in a statement.To get more details, read:The report’s announcement “New Paper from Cloud Security Alliance Examines Considerations and Application of Zero Trust Principles for Critical Infrastructure”The full report “Zero Trust Guidance for Critical Infrastructure”A complementary slide presentationFor more information about OT systems cybersecurity, check out these Tenable resources: “What is operational technology (OT)?” (guide)“Discover, Measure, and Minimize the Risk Posed by Your Interconnected IT/OT/IoT Environments” (on-demand webinar)“How To Secure All of Your Assets - IT, OT and IoT - With an Exposure Management Platform” (blog)“Blackbox to blueprint: The security leader’s guidebook to managing OT and IT risk” (white paper)“Tenable Cloud Risk Report 2024” (white paper)2 - Five Eyes publish cyber guidance for tech startupsStartup tech companies can be attractive targets for hackers, especially if they have weak cybersecurity and valuable intellectual property (IP).To help startups prevent cyberattacks, the Five Eyes countries this week published cybersecurity guides tailored for these companies and their investors.“This guidance is designed to help tech startups protect their innovation, reputation, and growth, while also helping tech investors fortify their portfolio companies against security risks," Mike Casey, U.S. National Counterintelligence and Security Center Director, said in a statement.These are the top five cybersecurity recommendations from Australia, Canada, New Zealand, the U.S. and the U.K. for tech startups:Be aware of threat vectors, including malicious insiders, insecure IT and supply chain risk.Identify your most critical assets and conduct a risk assessment to pinpoint vulnerabilities.Build security into your products by managing intellectual assets and IP; monitoring who has access to sensitive information; and ensuring this information’s protection.Conduct due diligence when choosing partners and make sure they’re equipped to protect the data you share with them.Before you expand abroad, prepare and become informed about these new markets by, for example, understanding local laws in areas such as IP protection and data protection. “Sophisticated nation-state adversaries, like China, are working hard to steal the intellectual property held by some of our countries’ most innovative and exciting startups,” Ken McCallum, Director General of the U.K.’s MI5, said in a statement.To get more details, check out these Five Eyes’ cybersecurity resources for tech startups:The announcement “Five Eyes Launch Shared Security Advice Campaign for Tech Startups”The main guides: “Secure Innovation: Security Advice for Emerging Technology Companies”“Secure Innovation: Security Advice for Emerging Technology Investors”These complementary documents:“Secure Innovation: Scenarios and Mitigations”“Secure Innovation: Travel Security Guidance”“Secure Innovation: Due Diligence Guidance”“Secure Innovation: Companies Summary”3 - Survey: Unapproved AI use impacting data governanceEmployees’ use of unauthorized AI tools is creating compliance issues in a majority of organizations. Specifically, it makes it harder to control data governance and compliance, according to almost 60% of organizations surveyed by market researcher Vanson Bourne.“Amid all the investment and adoption enthusiasm, many organisations are struggling for control and visibility over its use,” reads the firm’s “AI Barometer: October 2024” publication. Vanson Bourne polls 100 IT and business executives each month about their AI investment plans.To what extent do you think the unsanctioned use of AI tools is impacting your organisation's ability to maintain control over data governance and compliance?(Source: Vanson Bourne’s “AI Barometer: October 2024”)Close to half of organizations surveyed (44%) believe that at least 10% of their employees are using unapproved AI tools.On a related front, organizations are also grappling with the issue of software vendors that unilaterally and silently add AI features to their products, especially to their SaaS applications.While surveyed organizations say they’re reaping advantages from their AI usage, “such benefits are dependent on IT teams having the tools to address the control and visibility challenges they face,” the publication reads.For more information about the use of unapproved AI tools, an issue also known as “shadow AI,” check out:“Do You Think You Have No AI Exposures? Think Again” (Tenable)“Shadow AI poses new generation of threats to enterprise IT” (TechTarget)“10 ways to prevent shadow AI disaster” (CIO)“Never Trust User Inputs -- And AI Isn't an Exception: A Security-First Approach” (Tenable)“Shadow AI in the ‘dark corners’ of work is becoming a big problem for companies” (CNBC)VIDEOShadow AI Risks in Your Company 4 - NCSC explains nuances of multi-factor authenticationMulti-factor authentication (MFA) comes in a variety of flavors, and understanding the differences is critical for choosing the right option for each use case in your organization.To help cybersecurity teams better understand the different MFA types and their pluses and minuses, the U.K. National Cyber Security Centre (NCSC) has updated its MFA guidance.“The new guidance explains the benefits that come with strong authentication, while also minimising the friction that some users associate with MFA,” reads an NCSC blog. In other words, what type of MFA method to use depends on people’s roles, how they work, the devices they use, the applications or services they’re accessing and so on.Topics covered include:Recommended types of MFA, such as FIDO2 credentials, app-based and hardware-based code generators and message-based methodsThe importance of using strong MFA to secure users’ access to sensitive dataThe role of trusted devices in boosting and simplifying MFABad practices that weaken MFA’s effectiveness, such as:Retaining weaker, password-only authentication protocols for legacy servicesExcluding certain accounts from MFA requirements because their users, usually high-ranking officials, find MFA inconvenientTo get more details, read:The NCSC blog “Not all types of MFA are created equal”The NCSC guide “Multi-factor authentication for your corporate online services”For more information about MFA:“Multifactor Authentication Cheat Sheet” (OWASP)“Deploying Multi Factor Authentication – The What, How, and Why” (SANS Institute)“How MFA gets hacked — and strategies to prevent it” (CSO)“How Multifactor Authentication Supports Growth for Businesses Focused on Zero Trust” (BizTech)“What is multi-factor authentication?” (TechTarget)5 - U.S. gov’t outlines AI strategy, ties it to national security The White House has laid out its expectations for how the federal government ought to promote the development of AI in order to safeguard U.S. national security.In the country’s first-ever National Security Memorandum (NSM) on AI, the Biden administration said the federal government must accomplish the following:Ensure the U.S. is the leader in the development of safe, secure and trustworthy AILeverage advanced AI technologies to boost national securityAdvance global AI consensus and governance“The NSM’s fundamental premise is that advances at the frontier of AI will have significant implications for national security and foreign policy in the near future,” reads a White House statement. The NSM’s directives to federal agencies include:Help improve the security of chips and support the development of powerful supercomputers to be used by AI systems.Help AI developers protect their work against foreign spies by providing them with cybersecurity and counterintelligence information.Collaborate with international partners to create a governance framework for using AI in a way that is ethical, responsible and respects human rights. The White House also published a complementary document titled “Framework To Advance AI Governance and Risk Management in National Security,” which adds implementation details and guidance for the NSM.6 - State CISOs on the frontlines of AI securityAs the cybersecurity risks and benefits of AI multiply, most U.S. state CISOs find themselves at the center of their governments' efforts to craft AI security strategies and policies.That’s according to the “2024 Deloitte-NASCIO Cybersecurity Study,” which surveyed CISOs from all 50 states and the District of Columbia.Specifically, 88% of state CISOs reported being involved in the development of a generative AI strategy, while 96% are involved with creating a generative AI security policy.However, their involvement in AI cybersecurity matters isn’t necessarily making them optimistic about their states’ ability to fend off AI-boosted attacks.None said they feel “extremely confident” that their state can prevent AI-boosted attacks, while only 10% reported feeling “very confident.” The majority (43%) said they feel “somewhat confident” while the rest said they are either “not very confident” or “not confident at all.” Naturally, most state CISOs see AI-enabled cyberthreats as significant, with 71% categorizing them as either “very high threat” (18%) or “somewhat high threat” (53%).At the same time, state CISOs see the potential for AI to help their cybersecurity efforts, as 41% are already using generative AI for cybersecurity, and another 43% have plans to do so by mid-2025.Other findings from the "2024 Deloitte-NASCIO Cybersecurity Study" include:4 in 10 state CISOs feel their budget is insufficient.Almost half of respondents rank cybersecurity staffing as one of the top challenges.In the past two years, 23 states have hired new CISOs, as the median tenure of a state CISO has dropped to 23 months, down from 30 months in 2022.More state CISOs are taking on privacy protection duties — 86% are responsible for privacy protection, up from 60% two years ago.For more information about CISO trends:“What’s important to CISOs in 2024” (PwC)“The CISO’s Tightrope: Balancing Security, Business, and Legal Risks in 2024” (The National CIO Review)“State of CISO Leadership: 2024” (SC World)“4 Trends That Will Define the CISO's Role in 2024” (SANS Institute) Full Article
ppl OSC seeks applications for the Registrant Advisory Committee By www.osc.ca Published On :: Thu, 10 Oct 2024 15:29:30 GMT TORONTO – The Ontario Securities Commission (OSC) is inviting applications for membership on its Registrant Advisory Committee (RAC or the Committee). Full Article
ppl Capital Markets Tribunal seeks applications for the Securities Proceedings Advisory Committee By www.osc.ca Published On :: Tue, 22 Oct 2024 13:28:40 GMT TORONTO – The Capital Markets Tribunal is seeking applications for membership to the Securities Proceedings Advisory Committee (SPAC). Full Article
ppl Apple of my pie / Mika Song. By library.gcpl.lib.oh.us Published On :: "When local park fixture (and spy-master) Pops gets squirrel-napped, it's up to Norma, Belly, and their friend little B to save him!" -- Provided by publisher. Full Article
ppl Integrated transcriptomics and proteomics analysis reveals muscle metabolism effects of dietary Ulva lactuca and ulvan lyase supplementation in weaned piglets - Nature.com By news.google.com Published On :: Mon, 26 Feb 2024 08:00:00 GMT Integrated transcriptomics and proteomics analysis reveals muscle metabolism effects of dietary Ulva lactuca and ulvan lyase supplementation in weaned piglets Nature.com Full Article
ppl Micropillar arrays, wide window acquisition and AI-based data analysis improve comprehensiveness in multiple proteomic applications - Nature.com By news.google.com Published On :: Sat, 03 Feb 2024 08:00:00 GMT Micropillar arrays, wide window acquisition and AI-based data analysis improve comprehensiveness in multiple proteomic applications Nature.com Full Article
ppl Application of Proteomics in Cancer: Recent Trends and Approaches for Biomarkers Discovery - Frontiers By news.google.com Published On :: Tue, 25 Jun 2024 19:46:28 GMT Application of Proteomics in Cancer: Recent Trends and Approaches for Biomarkers Discovery Frontiers Full Article
ppl CTA Seeking New Applications for ADA Advisory Committee By www.transitchicago.com Published On :: Tue, 08 Oct 2024 12:00:00 GMT In alignment with its ongoing commitment to bringing equity and inclusion to all aspects of its decision-making, the Chicago Transit Authority (CTA) announced today it will be seeking new applicants to join the agency’s Americans with Disabilities Act (ADA) Advisory Committee. Full Article
ppl Planet Money's Supply Chain Holiday Extravaganza By www.npr.org Published On :: Thu, 23 Dec 2021 05:29:00 +0000 Planet Money's Supply Chain Holiday Extravaganza Did the supply chain wreck your holiday shopping? Planet Money comes to the rescue. | Subscribe to our weekly newsletter here.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article
ppl Two indicators: supply chain solutions By www.npr.org Published On :: Wed, 26 Jan 2022 22:27:51 +0000 Two stories about people trying to overcome supply chain challenges. We follow a ship that is forced to get creative to bypass clogged ports, and we visit a warehouse that is running out of space. | Subscribe to our weekly newsletter here.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article
ppl The miracle apple (Classic) By www.npr.org Published On :: Wed, 28 Sep 2022 23:06:41 +0000 Today on the show, how we got from mealy, nasty apples to apples that taste delicious. The story starts with a breeder who discovered a miracle apple. But discovering that apple wasn't enough.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article
ppl Supply, demand, extinction By www.npr.org Published On :: Fri, 30 Jun 2023 22:03:23 +0000 Back in the 90s, Ivan Lozano Ortega was in charge of Bogota's wildlife rescue center. And he kept getting calls from the airport to come deal with... frogs. Hundreds of brightly colored, poisonous frogs.Ivan had stumbled upon the poisonous frog black market. Tens of thousands of frogs were being poached out of the Colombian rainforest and sold to collectors all around the world by smugglers. And it put these endangered frogs at risk of going extinct.Today on the show, how Ivan tried to put an end to the poison frog black market, by breeding and selling frogs legally. And he learns that it's not so easy to get a frog out of hot water.This episode was hosted by Stan Alcorn and Sarah Gonzalez, and co-reported and written with Charlotte de Beauvoir. It was produced by Willa Rubin with help from Emma Peaslee. It was edited by Jess Jiang. It was fact-checked by Sierra Juarez. It was engineered by Josh Newell. Alex Goldmark is our executive producer.Help support Planet Money and get bonus episodes by subscribing to Planet Money+ in Apple Podcasts or at plus.npr.org/planetmoney.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article
ppl What Topples Democracies By www.npr.org Published On :: Fri, 24 Nov 2023 08:00:59 +0000 Around the world, democratic ideals are being tested in surprising ways. As the curtains rise on a big election year, TED speakers explore what can keep people united and what drives them apart. Guests include journalist and Broadway producer Jose Antonio Vargas, civil war expert Barbara Walter, and political scientist Yascha Mounk. TED Radio Hour+ subscribers now get access to bonus episodes, with more ideas from TED speakers and a behind the scenes look with our producers. A Plus subscription also lets you listen to regular episodes (like this one!) without sponsors. Sign-up at: plus.npr.org/tedLearn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article
ppl University of Toronto’s Faculty of Applied Science & Engineering announces establishment of the Foundation CMG Research Chair in Fundamental Petroleum Rock Physics and Rock Mechanics By media.utoronto.ca Published On :: Thu, 02 Jun 2016 12:55:18 +0000 Toronto, ON – University of Toronto Professor Giovanni Grasselli, of the Department of Civil Engineering, has been named the inaugural holder of the Foundation CMG Industrial Research Chair in Fundamental Petroleum Rock Physics and Rock Mechanics. Professor Grasselli is joining 12 chairs at 12 universities, including Penn State and the University of Texas in Austin, […] Full Article Engineering Media Releases Science University of Toronto
ppl Thornapple Elementary News Archives - Forest Hills Public Schools By www.fhps.net Published On :: Full Article
ppl Researchers identify major security and privacy issues in Popular China Browser Application, QQ By media.utoronto.ca Published On :: Mon, 28 Mar 2016 21:01:43 +0000 Toronto, ON — A new study from the University of Toronto’s Citizen Lab identifies security and privacy issues in QQ Browser, a mobile browser produced by China-based Internet giant Tencent, which may put many millions of users of the application at risk of serious compromise. Citizen Lab researchers identified problems in both the Android and […] Full Article International Affairs Media Releases New Media & Technology University of Toronto
ppl How Apple Is Organized for Innovation: The Leadership Model By hbr.org Published On :: Wed, 27 Jan 2021 05:00:00 GMT Apple leaders need deep expertise, immersion in details, and collaborative debate. Full Article