sec Bruce Schneier on Cybersecurity in the Age of Coronavirus By feedproxy.google.com Published On :: Apr 20, 2020 Apr 20, 2020Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus. Full Article
sec Closing Critical Gaps that Hinder Homeland Security Technology Innovation By feedproxy.google.com Published On :: Apr 23, 2020 Apr 23, 2020Rapid technological advances are making nonstate actors much more capable than they were even a decade ago. Malicious actors like terrorist groups, criminal organizations, and state proxies are increasingly able to threaten American civilians and their interests around the world. At the same time, we are increasingly vulnerable to the emergence of new disease and natural disasters, as vividly shown by the hurricanes of 2017 (Harvey, Irma, and Maria) and the COVID-19 pandemic. Effectively countering these threats, including by developing and supporting private sector-generated new technological solutions, is a core government responsibility. DHS is the U.S. government’s primary civilian public safety agency and the main source of government funding for nonmilitary development of public safety technologies. Unfortunately, DHS has a poor record of developing new technological solutions to advance its mission and address emerging threats. This article assesses the current situation, identifies lines of research that are urgently needed, and makes recommendations on how DHS can more effectively partner with industry and how new technologies can be quickly seeded. Full Article
sec An Interview with Bruce Schneier, Renowned Security Technologist By feedproxy.google.com Published On :: Apr 1, 2020 Apr 1, 2020Bruce Schneier discusses current security technology concerns with The Politic's Eric Wallach. Full Article
sec Bruce Schneier on Cybersecurity in the Age of Coronavirus By feedproxy.google.com Published On :: Apr 20, 2020 Apr 20, 2020Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus. Full Article
sec Closing Critical Gaps that Hinder Homeland Security Technology Innovation By feedproxy.google.com Published On :: Apr 23, 2020 Apr 23, 2020Rapid technological advances are making nonstate actors much more capable than they were even a decade ago. Malicious actors like terrorist groups, criminal organizations, and state proxies are increasingly able to threaten American civilians and their interests around the world. At the same time, we are increasingly vulnerable to the emergence of new disease and natural disasters, as vividly shown by the hurricanes of 2017 (Harvey, Irma, and Maria) and the COVID-19 pandemic. Effectively countering these threats, including by developing and supporting private sector-generated new technological solutions, is a core government responsibility. DHS is the U.S. government’s primary civilian public safety agency and the main source of government funding for nonmilitary development of public safety technologies. Unfortunately, DHS has a poor record of developing new technological solutions to advance its mission and address emerging threats. This article assesses the current situation, identifies lines of research that are urgently needed, and makes recommendations on how DHS can more effectively partner with industry and how new technologies can be quickly seeded. Full Article
sec Bruce Schneier on Cybersecurity in the Age of Coronavirus By feedproxy.google.com Published On :: Apr 20, 2020 Apr 20, 2020Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus. Full Article
sec An Interview with Bruce Schneier, Renowned Security Technologist By feedproxy.google.com Published On :: Apr 1, 2020 Apr 1, 2020Bruce Schneier discusses current security technology concerns with The Politic's Eric Wallach. Full Article
sec Bruce Schneier on Cybersecurity in the Age of Coronavirus By feedproxy.google.com Published On :: Apr 20, 2020 Apr 20, 2020Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus. Full Article
sec Closing Critical Gaps that Hinder Homeland Security Technology Innovation By feedproxy.google.com Published On :: Apr 23, 2020 Apr 23, 2020Rapid technological advances are making nonstate actors much more capable than they were even a decade ago. Malicious actors like terrorist groups, criminal organizations, and state proxies are increasingly able to threaten American civilians and their interests around the world. At the same time, we are increasingly vulnerable to the emergence of new disease and natural disasters, as vividly shown by the hurricanes of 2017 (Harvey, Irma, and Maria) and the COVID-19 pandemic. Effectively countering these threats, including by developing and supporting private sector-generated new technological solutions, is a core government responsibility. DHS is the U.S. government’s primary civilian public safety agency and the main source of government funding for nonmilitary development of public safety technologies. Unfortunately, DHS has a poor record of developing new technological solutions to advance its mission and address emerging threats. This article assesses the current situation, identifies lines of research that are urgently needed, and makes recommendations on how DHS can more effectively partner with industry and how new technologies can be quickly seeded. Full Article
sec Bruce Schneier on Cybersecurity in the Age of Coronavirus By feedproxy.google.com Published On :: Apr 20, 2020 Apr 20, 2020Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus. Full Article
sec Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance By feedproxy.google.com Published On :: Mar 25, 2020 Mar 25, 2020Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance Full Article
sec An Interview with Bruce Schneier, Renowned Security Technologist By feedproxy.google.com Published On :: Apr 1, 2020 Apr 1, 2020Bruce Schneier discusses current security technology concerns with The Politic's Eric Wallach. Full Article
sec Hamilton looks to 2011 for second title By en.espnf1.com Published On :: Mon, 15 Nov 2010 10:50:24 GMT Lewis Hamilton is determined to bounce back in 2011 after missing out on the championship this year, and is confident McLaren is the team to deliver him a car to do it Full Article
sec Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance By feedproxy.google.com Published On :: Mar 25, 2020 Mar 25, 2020Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance Full Article
sec An Interview with Bruce Schneier, Renowned Security Technologist By feedproxy.google.com Published On :: Apr 1, 2020 Apr 1, 2020Bruce Schneier discusses current security technology concerns with The Politic's Eric Wallach. Full Article
sec Bruce Schneier on Cybersecurity in the Age of Coronavirus By feedproxy.google.com Published On :: Apr 20, 2020 Apr 20, 2020Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus. Full Article
sec An Interview with Bruce Schneier, Renowned Security Technologist By feedproxy.google.com Published On :: Apr 1, 2020 Apr 1, 2020Bruce Schneier discusses current security technology concerns with The Politic's Eric Wallach. Full Article
sec Bruce Schneier on Cybersecurity in the Age of Coronavirus By feedproxy.google.com Published On :: Apr 20, 2020 Apr 20, 2020Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus. Full Article
sec Closing Critical Gaps that Hinder Homeland Security Technology Innovation By feedproxy.google.com Published On :: Apr 23, 2020 Apr 23, 2020Rapid technological advances are making nonstate actors much more capable than they were even a decade ago. Malicious actors like terrorist groups, criminal organizations, and state proxies are increasingly able to threaten American civilians and their interests around the world. At the same time, we are increasingly vulnerable to the emergence of new disease and natural disasters, as vividly shown by the hurricanes of 2017 (Harvey, Irma, and Maria) and the COVID-19 pandemic. Effectively countering these threats, including by developing and supporting private sector-generated new technological solutions, is a core government responsibility. DHS is the U.S. government’s primary civilian public safety agency and the main source of government funding for nonmilitary development of public safety technologies. Unfortunately, DHS has a poor record of developing new technological solutions to advance its mission and address emerging threats. This article assesses the current situation, identifies lines of research that are urgently needed, and makes recommendations on how DHS can more effectively partner with industry and how new technologies can be quickly seeded. Full Article
sec Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance By feedproxy.google.com Published On :: Mar 25, 2020 Mar 25, 2020Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance Full Article
sec An Interview with Bruce Schneier, Renowned Security Technologist By feedproxy.google.com Published On :: Apr 1, 2020 Apr 1, 2020Bruce Schneier discusses current security technology concerns with The Politic's Eric Wallach. Full Article
sec Capital Choices: Sectoral Politics and the Variation of Sovereign Wealth By feedproxy.google.com Published On :: Jul 8, 2019 Jul 8, 2019Capital Choices analyzes the creation of different SWFs from a comparative political economy perspective, arguing that different state-society structures at the sectoral level are the drivers for SWF variation. Juergen Braunstein focuses on the early formation period of SWFs, a critical but little understood area given the high levels of political sensitivity and lack of transparency that surround SWF creation. Braunstein’s novel analytical framework provides practical lessons for the business and finance organizations and policymakers of countries that have created, or are planning to create, SWFs. Full Article
sec Bruce Schneier on Cybersecurity in the Age of Coronavirus By feedproxy.google.com Published On :: Apr 20, 2020 Apr 20, 2020Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus. Full Article
sec Capital Choices: Sectoral Politics and the Variation of Sovereign Wealth By feedproxy.google.com Published On :: Jul 8, 2019 Jul 8, 2019Capital Choices analyzes the creation of different SWFs from a comparative political economy perspective, arguing that different state-society structures at the sectoral level are the drivers for SWF variation. Juergen Braunstein focuses on the early formation period of SWFs, a critical but little understood area given the high levels of political sensitivity and lack of transparency that surround SWF creation. Braunstein’s novel analytical framework provides practical lessons for the business and finance organizations and policymakers of countries that have created, or are planning to create, SWFs. Full Article
sec Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance By feedproxy.google.com Published On :: Mar 25, 2020 Mar 25, 2020Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance Full Article
sec An Interview with Bruce Schneier, Renowned Security Technologist By feedproxy.google.com Published On :: Apr 1, 2020 Apr 1, 2020Bruce Schneier discusses current security technology concerns with The Politic's Eric Wallach. Full Article
sec An Interview with Bruce Schneier, Renowned Security Technologist By feedproxy.google.com Published On :: Apr 1, 2020 Apr 1, 2020Bruce Schneier discusses current security technology concerns with The Politic's Eric Wallach. Full Article
sec Bruce Schneier on Cybersecurity in the Age of Coronavirus By feedproxy.google.com Published On :: Apr 20, 2020 Apr 20, 2020Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus. Full Article
sec Closing Critical Gaps that Hinder Homeland Security Technology Innovation By feedproxy.google.com Published On :: Apr 23, 2020 Apr 23, 2020Rapid technological advances are making nonstate actors much more capable than they were even a decade ago. Malicious actors like terrorist groups, criminal organizations, and state proxies are increasingly able to threaten American civilians and their interests around the world. At the same time, we are increasingly vulnerable to the emergence of new disease and natural disasters, as vividly shown by the hurricanes of 2017 (Harvey, Irma, and Maria) and the COVID-19 pandemic. Effectively countering these threats, including by developing and supporting private sector-generated new technological solutions, is a core government responsibility. DHS is the U.S. government’s primary civilian public safety agency and the main source of government funding for nonmilitary development of public safety technologies. Unfortunately, DHS has a poor record of developing new technological solutions to advance its mission and address emerging threats. This article assesses the current situation, identifies lines of research that are urgently needed, and makes recommendations on how DHS can more effectively partner with industry and how new technologies can be quickly seeded. Full Article
sec 2020–2021 International Security Program Research Fellowships: Apply Now By feedproxy.google.com Published On :: Jan 9, 2020 Jan 9, 2020The International Security Program (ISP) is still accepting applications for 2020–2021. ISP is a multidisciplinary research group that develops and trains new talent in security studies by hosting pre- and postdoctoral research fellows. Full Article
sec China issues second batch of oil product export quotas By www.argusmedia.com Published On :: 06 May 2020 13:08 (+01:00 GMT) Full Article Oil products Jet fuel Gasoil Gasoline Asia-Pacific China Fundamentals
sec European automotive sector plans recovery By www.argusmedia.com Published On :: 06 May 2020 14:36 (+01:00 GMT) Full Article Metals Ferrous Non-ferrous Steel Base metals Ferro-alloys and ores Minor metals Aluminium Base oil Europe Supply Vehicles Automotive
sec Brazil oil sector transcends political crisis for now By www.argusmedia.com Published On :: 07 May 2020 15:47 (+01:00 GMT) Full Article Crude oil Oil products Brazil Corporate Politics
sec Slumping auto sector faces long road to recovery By www.argusmedia.com Published On :: 07 May 2020 17:52 (+01:00 GMT) Full Article Metals Ferrous Non-ferrous Scrap Global Industry Vehicles
sec Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance By feedproxy.google.com Published On :: Mar 25, 2020 Mar 25, 2020Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance Full Article
sec An Interview with Bruce Schneier, Renowned Security Technologist By feedproxy.google.com Published On :: Apr 1, 2020 Apr 1, 2020Bruce Schneier discusses current security technology concerns with The Politic's Eric Wallach. Full Article
sec Webber grateful for second-place finish By en.espnf1.com Published On :: Sun, 29 Aug 2010 15:09:58 GMT Mark Webber confessed himself happy with his second place at the Belgian Grand Prix after a clutch issue saw him drop back several places from his starting position of second Full Article
sec Nine drivers hit with five-second penalties By en.espnf1.com Published On :: Sun, 27 Jun 2010 17:14:09 GMT The stewards have slapped five-second penalties onto the finishing times of nine Formula One drivers at the European Grand Prix for lapping too quickly under safety car conditions Full Article
sec Hamilton eyeing victory from second row By en.espnf1.com Published On :: Sat, 23 Oct 2010 07:22:40 GMT Lewis Hamilton insists he is not out of the running at the Korean Grand Prix, despite qualifying fourth and admitting he was baffled by the Red Bulls' pace Full Article
sec Second 'a great result' - Hamilton By en.espnf1.com Published On :: Sun, 24 Oct 2010 11:00:13 GMT Lewis Hamilton said it was still a great result to finish second behind Fernando Alonso and remain firmly in the title hunt Full Article
sec 2020–2021 International Security Program Research Fellowships: Apply Now By feedproxy.google.com Published On :: Jan 9, 2020 Jan 9, 2020The International Security Program (ISP) is still accepting applications for 2020–2021. ISP is a multidisciplinary research group that develops and trains new talent in security studies by hosting pre- and postdoctoral research fellows. Full Article
sec 2020–2021 International Security Program Research Fellowships: Apply Now By feedproxy.google.com Published On :: Jan 9, 2020 Jan 9, 2020The International Security Program (ISP) is still accepting applications for 2020–2021. ISP is a multidisciplinary research group that develops and trains new talent in security studies by hosting pre- and postdoctoral research fellows. Full Article
sec Grosjean gets second Renault seat By en.espnf1.com Published On :: Fri, 09 Dec 2011 14:45:56 GMT Lotus Renault has announced that Romain Grosjean will drive alongside Kimi Raikkonen next season Full Article
sec Section 3: Building Skills By webfeeds.brookings.edu Published On :: Thu, 19 Jun 2014 00:00:00 -0400 Full Article
sec Section 2: Supporting Disadvantaged Youth By webfeeds.brookings.edu Published On :: Thu, 19 Jun 2014 00:00:00 -0400 Full Article
sec Section 4: Improving Safety Net and Work Support By webfeeds.brookings.edu Published On :: Thu, 19 Jun 2014 00:00:00 -0400 Full Article
sec Section 1: Promoting Early Childhood Development By webfeeds.brookings.edu Published On :: Thu, 19 Jun 2014 00:00:00 -0400 Full Article
sec How Second Earners Can Rescue the Middle Class from Stagnant Incomes By webfeeds.brookings.edu Published On :: Tue, 10 Feb 2015 00:00:00 -0500 In his state of the union and his budget, the President spoke of the stagnation of middle class incomes. Whatever growth we have had has not been broadly shared. More than 78% of the growth in GDP between 1979 and 2013 has gone to the top one percent. Even Republicans are beginning to worry about this issue although they have yet to develop concrete proposals to address it. Slow Growth in Incomes Middle class incomes were growing slowly before the recession and have actually declined over the past decade. In addition, according to the New York Times, the proportion of the population with incomes between $35,000 and $100,000 in inflation-adjusted terms fell from 53% in 1967 to 43% in 2013. During the first four decades this was primarily because more people were moving into higher income groups, but more recently it was because they have moved down the ladder, not up. One can define the middle class in many different ways or torture the data in various ways, but there is plenty of evidence that we have a problem. What to Do The most promising approach is what I call “the second earner solution.” For many decades now, the labor force participation rate of prime age men has been falling while that of women has been rising. The entry of so many women into the labor force was the major force propelling whatever growth in middle class incomes occurred up until about 2000. That growth in women’s work has now levelled off. Getting it back on an upward track would do more than any policy I can think of to help the middle class. Imagine a household with one earner making the average wage of today’s worker and spending full-time in the job market. That household will have an income of around $34,000. But if he (or she) has a spouse making a similar amount, the household’s income will double to $68,000. That is why the President’s focus on a second-earner credit of $500, a tripling of the child care tax credit, expanding the Earned Income Tax Credit, and providing paid leave are so important. These policies are all pro-work and research shows they would increase employment. No Marriage = No Second Earner One problem, of course, is that fewer and fewer households contain two potential workers. So it would also help to bring back marriage or at least its first cousin, a stable cohabiting relationship. My ideas on this front are spelled out in my new book, Generation Unbound. In a nutshell, we need to empower women to not have children before they have found a committed partner with whom to raise children in a stable, two-parent family. Whatever the other benefits of two parents, they have twice as much time and potentially twice as much income. Other Needed Responses Shouldn’t we also worry about the wages or the employment of men? Of course. But an increase in, say, the minimum wage or a better collective bargaining environment or more job training will have far smaller effects than “the second earner solution.” In addition, the decline in male employment is related to still more difficult problems such as high rates of incarceration and the failure of men to take advantage of postsecondary education as much as women have. Still the two-earner solution should not be pursued in isolation. In the short-term, a stronger recovery from the recession is needed and in the longer-term, more effective investments in education, research, infrastructure, and in labor market institutions that produce more widely-shared growth, as argued by the Commission on Inclusive Prosperity. But do we really expect families to wait for these long-term policies to pay off? It could be decades. In the meantime, the President’s proposals to make work more appealing to existing or potential second earners deserves more attention. Authors Isabel V. Sawhill Publication: Real Clear Markets Image Source: © Kevin Lamarque / Reuters Full Article
sec The Need for Creative and Effective Nuclear Security Vulnerability Assessment and Testing By feedproxy.google.com Published On :: Feb 10, 2020 Feb 10, 2020Realistic, creative vulnerability assessment and testing are critical to finding and fixing nuclear security weaknesses and avoiding over-confidence. Both vulnerability assessment and realistic testing are needed to ensure that nuclear security systems are providing the level of protection required. Systems must be challenged by experts thinking like adversaries, trying to find ways to overcome them. Effective vulnerability assessment and realistic testing are more difficult in the case of insider threats, and special attention is needed. Organizations need to find ways to give people the mission and the incentives to find nuclear security weaknesses and suggest ways they might be fixed. With the right approaches and incentives in place, effective vulnerability assessment and testing can be a key part of achieving and sustaining high levels of nuclear security. Full Article
sec The Risks and Rewards of Emerging Technology in Nuclear Security By feedproxy.google.com Published On :: Feb 10, 2020 Feb 10, 2020Nuclear security is never finished. Nuclear security measures for protecting all nuclear weapons, weapons-usable nuclear materials, and facilities whose sabotage could cause disastrous consequences should protect against the full range of plausible threats. It is an ongoing endeavor that requires constant assessment of physical protection operations and reevaluation of potential threats. One of the most challenging areas of nuclear security is how to account for the impact–positive and negative—of non-nuclear emerging technologies. The amended Convention on the Physical Protection of Nuclear Material (amended CPPNM) states it should be reviewed in light of the prevailing situation, and a key part of the prevailing situation is technological evolution. Therefore, the upcoming review conference in 2021, as well as any future review conferences, should examine the security threats and benefits posed by emerging technologies. Full Article