deploy

ETSI releases a Report to enable MEC deployment in a multi-operator’s environment

ETSI releases a Report to enable MEC deployment in a multi-operator’s environment

Sophia Antipolis, 20 July 2021

The ETSI MEC Industry Specification Group (ETSI ISG MEC) has just released a new Group Report ETSI GR MEC 0035 to enable inter-MEC system deployment and MEC-Cloud system coordination. This Report was motivated by the mobile network operators’ interest in forming federated MEC environments and enabling information exchange in a secure manner, in the event that MEC platforms or applications belong to different MEC systems.

Read More...




deploy

ETSI NFV Release 5 kicks off with increased support for cloud-enabled deployments

ETSI NFV Release 5 kicks off with increased support for cloud-enabled deployments

Sophia Antipolis, 9 November 2021

The ETSI Industry Specification Group (ISG) for Network Functions Virtualization (NFV) has started working on its next specification release, known as "Release 5”, officially kicking off the new Release technical work after their September meeting.

The Release 5 work program is expected to drive ETSI NFV’s work into two main directions: consolidating the NFV framework and expanding its applicability and functionality set. On the one hand, some aspects of the NFV concepts and functionalities that have been addressed in previous Releases, but need additional work, will be further developed in Release 5. For instance, based on development, deployment experience and feedback collected during testing events such as the “NFV/MEC Plugtests”, additional work on VNF configuration was deemed necessary. Another example is the more detailed specification work related to fault management modelling which aims at further defining faults and alarms information to improve interoperability during network operations, in particular for root cause analysis and fault resolution in multi-vendor environments.

Read More...




deploy

Cybersecurity Snapshot: New Guides Offer Best Practices for Preventing Shadow AI and for Deploying Secure Software Updates

Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer valuable tips. Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards.

Dive into six things that are top of mind for the week ending Oct. 25.

1 - CSA: How to prevent “shadow AI” 

As organizations scale up their AI adoption, they must closely track their AI assets to secure them and mitigate their cyber risk. This includes monitoring the usage of unapproved AI tools by employees — an issue known as “shadow AI.”

So how do you identify, manage and prevent shadow AI? You may find useful ideas in the Cloud Security Alliance’s new “AI Organizational Responsibilities: Governance, Risk Management, Compliance and Cultural Aspects” white paper.

The white paper covers shadow AI topics including:

  • Creating a comprehensive inventory of AI systems
  • Conducting gap analyses to spot discrepancies between approved and actual AI usage
  • Implementing ways to detect unauthorized AI wares
  • Establishing effective access controls
  • Deploying monitoring techniques

 

 

“By focusing on these key areas, organizations can significantly reduce the risks associated with shadow AI, ensuring that all AI systems align with organizational policies, security standards, and regulatory requirements,” the white paper reads.

For example, to create an inventory that offers the required visibility into AI assets, the document explains different elements each record should have, such as:

  • The asset’s description
  • Information about its AI models
  • Information about its data sets and data sources
  • Information about the tools used for its development and deployment
  • Detailed documentation about its lifecycle, regulatory compliance, ethical considerations and adherence to industry standards
  • Records of its access control mechanisms

Shadow AI is one of four topics covered in the publication, which also unpacks risk management; governance and compliance; and safety culture and training.

To get more details, read:

For more information about AI security issues, including shadow AI, check out these Tenable blogs:

2 - Best practices for secure software updates

The security and reliability of software updates took center stage in July when an errant update caused massive and unprecedented tech outages globally.

To help prevent such episodes, U.S. and Australian cyber agencies have published “Safe Software Deployment: How Software Manufacturers Can Ensure Reliability for Customers.

“It is critical for all software manufacturers to implement a safe software deployment program supported by verified processes, including robust testing and measurements,” reads the 12-page document.

Although the guide is aimed primarily at commercial software vendors, its recommendations can be useful for any organization with software development teams that deploy updates internally.

 

 

The guide outlines key steps for a secure software development process, including planning; development and testing; internal rollout; and controlled rollout. It also addresses errors and emergency protocols.

“A safe software deployment process should be integrated with the organization’s SDLC, quality program, risk tolerance, and understanding of the customer’s environment and operations,” reads the guide, authored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the FBI and the Australian Cyber Security Centre.

To get more details, read:

For more information about secure software updates:

3 - Report: GenAI, attack variety, data security drive cyber strategies

What issues act as catalysts for organizations’ cybersecurity actions today? Hint: They’re fairly recent concerns. The promise and peril of generative AI ranks first. It’s closely followed by the ever growing variety of cyberattacks; and by the intensifying urgency to protect data.

That’s according to CompTIA’s “State of Cybersecurity 2025” report, based on a survey of almost 1,200 business and IT pros in North America and in parts of Europe and Asia. 

These three key factors, along with others like the scale of attacks, play a critical role in how organizations currently outline their cybersecurity game plans.

“Understanding these drivers is essential for organizations to develop proactive and adaptive cybersecurity strategies that address the evolving threat landscape and safeguard their digital assets,” reads a CompTIA blog about the report.

Organizations are eagerly trying to understand both how generative AI can help their cybersecurity programs and how this technology is being used by malicious actors to make cyberattacks harder to detect and prevent.

Meanwhile, concern about data protection has ballooned in the past couple of years. “As organizations become more data-driven, the need to protect sensitive information has never been more crucial,” reads the blog.

Not only are organizations focused on securing data at rest, in transit and in use, but they’re also creating foundational data-management practices, according to the report.

“The rise of AI has accelerated the need for robust data practices in order to properly train AI algorithms, and the demand for data science continues to be strong as businesses seek competitive differentiation,” the report reads.

To get more details, read:

For more information about data security posture management (DSPM) and preventing AI-powered attacks, check out these Tenable resources:

4 - CISA lists software dev practices most harmful for security

Recommended best practices abound in the cybersecurity world. However, CISA and the FBI are taking the opposite tack in their quest to improve the security of software products: They just released a list of the worst security practices that software manufacturers ought to avoid.

Titled “Product Security Bad Practices,” the document groups the “no-nos” into three main categories: product properties; security features; and organizational processes and policies.

“It’s 2024, and basic, preventable software defects continue to enable crippling attacks against hospitals, schools, and other critical infrastructure. This has to stop,” CISA Director Jen Easterly said in a statement.

“These product security bad practices pose unacceptable risks in this day and age, and yet are all too common,” she added.

 

 

Here are some of the worst practices detailed in the document, which is part of CISA’s “Secure by Design” effort:

  • Using programming languages considered “memory unsafe”
  • Including user-provided input in SQL query strings
  • Releasing a product with default passwords
  • Releasing a product with known and exploited vulnerabilities
  • Not using multi-factor authentication
  • Failing to disclose vulnerabilities in a timely manner

Although the guidance is aimed primarily at software makers whose products are used by critical infrastructure organizations, the recommendations apply to all software manufacturers.

If you’re interested in sharing your feedback with CISA and the FBI, you can submit comments about the document until December 16, 2024 on the Federal Register.

To get more details, check out:

For more information about how to develop secure software:

5 - New EU law focuses on cybersecurity of connected digital products

Makers of digital products — both software and hardware — that directly or indirectly connect to networks and to other devices will have to comply with specific cybersecurity safeguards in the European Union.

A newly adopted law known as the “Cyber Resilience Act” outlines cybersecurity requirements for the design, development, production and lifecycle maintenance of these types of products, including IoT wares such as connected cars.

 

 

For example, it specifies a number of “essential cybersecurity requirements” for these products, including that they:

  • Aren’t shipped with known exploitable vulnerabilities
  • Feature a “secure by default” configuration
  • Can fix their vulnerabilities via automatic software updates
  • Offer access protection via control mechanisms, such as authentication and identity management
  • Protect the data they store, transmit and process using, for example, at-rest and in-transit encryption

“The new regulation aims to fill the gaps, clarify the links, and make the existing cybersecurity legislative framework more coherent, ensuring that products with digital components (...) are made secure throughout the supply chain and throughout their lifecycle,” reads a statement from the EU’s European Council.

The law will “enter into force” after its publication in the EU’s official journal and will apply and be enforceable 36 months later, so most likely in October 2027 or November 2027. However, some of its provisions will be enforceable a year prior.

For more information and analysis about the EU’s Cyber Resilience Act:

VIDEO

The EU Cyber Resilience Act: A New Era for Business Engagement in Open Source Software (Linux Foundation) 

6 - UK cyber agency: CISOs must communicate better with boards

CISOs and boards of directors are struggling to understand each other, and this is increasing their organizations’ cyber risk, new research from the U.K.’s cyber agency has found.

For example, in one alarming finding, 80% of respondents, which included board members, CISOs and other cyber leaders in medium and large enterprises, confessed to being unsure of who is ultimately accountable for cybersecurity in their organizations.

“We found that in many organisations, the CISO (or equivalent role) thought that the Board was accountable, whilst the Board thought it was the CISO,” reads a blog about the research titled “How to talk to board members about cyber.

As a result, the U.K. National Cyber Security Centre (NCSC) has released new guidance aimed at helping CISOs better communicate with their organizations’ boards titled “Engaging with Boards to improve the management of cyber security risk.

“Cyber security is a strategic issue, which means you must engage with Boards on their terms and in their language to ensure the cyber risk is understood, managed and mitigated,” the document reads.

Here’s a small sampling of the advice:

  • Understand your audience, including who are the board’s members and their areas of expertise; and how the board works, such as its meeting formats and its committees.
  • Talk about cybersecurity in terms of risks, and outline these risks concretely and precisely, presenting them in a matter-of-fact way.
  • Don’t limit your communication with board members to formal board meetings. Look for opportunities to talk to them individually or in small groups outside of these board meetings.
  • Elevate the discussions so that you link cybersecurity with your organization’s business challenges, goals and context.
  • Aim to provide a holistic view, and avoid using technical jargon.
  • Aim to advise instead of to educate.




deploy

SE Radio 585: Adam Frank on Continuous Delivery vs Continuous Deployment

Adam Frank, SVP of Product and Marketing at Armory.io, speaks with SE Radio’s Kanchan Shringi about continuous integration, continuous delivery, and continuous deployment – and how they differ. Frank suggests that organizations begin by identifying how the CI/CD process aligns best with their unique goals, noting that such goals might be different for B2C versus B2B SAAS (software as a service). They also discuss how the process can differ for monoliths compared to microservices-based products. Finally, they talk about continuous deployment as a service and some unique aspects of Armory’s approach.




deploy

Rapid Robotics and Universal Robots Partner to Deploy Cobots

Universal Robots will supply cobot arms for Rapid Robotics’ deployment of cobot work cells around North America, which will allow Rapid Robotics to serve an even greater number of customers while maintaining the company’s swift deployment times.




deploy

OracleDevLive Preview | Ophelia Hernandez on Continuous Deployments to Oracle Cloud

Oracle Developer Live — Simplifying Modern App Dev
August 3 & 5 | Register Here

In this short preview I talk with Ophelia Hernandez about her upcoming DevOps session at Oracle Developer Live next week on automating continuous deployments to the cloud.

YouTube Video
https://youtu.be/tp6oEhRg-2Q 

Continuous Deployments: Automating Software Releases to OCI Platforms: This session will introduce OCI’s new DevOps platform that enables developers to automate software deployments to OCI platforms. With OCI DevOps, you can accelerate feature delivery to customers and gain the confidence to quickly recover from errors.

Ophelia Hernandez
https://twitter.com/ophyh
Director, Software Development, Cloud Native Services, Oracle Cloud Infrastructure: Ophelia Hernandez is a director of software development at Oracle. A passionate engineering leader excited about the future of the cloud and DevOps, she enjoys solving difficult technical problems, mentoring, guiding career development, and team building. With more than 10 years of experience leading teams, Ophelia has built high performing global teams from scratch and is always looking for ways to become a better leader. Outside of work, she enjoys her four dogs, two cats, and one daughter and is an avid boxer, hiker, and world traveler.

Jonathan Schreiber
https://twitter.com/jonschreiber
Senior Principal Product Manager, Cloud Native Services, Oracle Cloud Infrastructure: Jonathan Schreiber is a senior principal product manager for Oracle Cloud Infrastructure (OCI), working to empower developers on Oracle Cloud. During his time at Oracle, he contributed to the team that launched Cloud Shell, and now he is excited to bring the OCI continuous integration/continuous delivery (CI/CD) platform to developers. Prior to Oracle, Jonathan spent 10 years working in engineering and product management roles for San Francisco startups. His experience spans from ad tech at Federated Media to content marketing platforms at Chute. He started his career in the twilight of the dotcom era at TiVo, making websites with toothpicks and string

On demand sessions from all previous Oracle Developer Live conferences
https://developer.oracle.com/developer-live/

Oracle Developer Relations
https://developer.oracle.com/team/

#OracleDevLive on Twitter
https://twitter.com/hashtag/OracleDevLive

Podcast Host: Jim Grisanzio, Oracle Developer Relations
https://twitter.com/jimgris
https://developer.oracle.com/team/ 




deploy

Resolution 64 - (Rev. Geneva, 2022) - IP address allocation and facilitating the transition to and deployment of IPv6

Resolution 64 - (Rev. Geneva, 2022) - IP address allocation and facilitating the transition to and deployment of IPv6




deploy

HSTP-IPTV-GUIDE.1 - IPTV service deployment scenarios in high-speed broadband era

HSTP-IPTV-GUIDE.1 - IPTV service deployment scenarios in high-speed broadband era




deploy

[ Z.161.2 (10/19) ] - Testing and Test Control Notation version 3: TTCN-3 language extensions: Configuration and deployment support

Testing and Test Control Notation version 3: TTCN-3 language extensions: Configuration and deployment support




deploy

[ Z.161.2 (10/21) ] - Testing and Test Control Notation version 3: TTCN-3 language extensions: Configuration and deployment support

Testing and Test Control Notation version 3: TTCN-3 language extensions: Configuration and deployment support




deploy

[ Z.161.2 (10/22) ] - Testing and Test Control Notation version 3: TTCN-3 language extensions: Configuration and deployment support

Testing and Test Control Notation version 3: TTCN-3 language extensions: Configuration and deployment support




deploy

Tesla Closes 2023 with Lowest Solar Deployment Since 2020

Tesla's solar deployment continued to drop in the final quarter of 2023, though its energy storage saw massive increases compared to last year.




deploy

Dakota Integrated Solutions awarded contract with DCS Group (UK) Ltd to deploy voice-directed solution within FMCG warehouse

Dakota Integrated Solutions Ltd, a real-time technology, printing, mobility and digital data capture solution specialist, has been awarded a contract to integrate its voice-directed software solution into DCS Group (UK) Ltd’s warehousing facility.




deploy

Wincanton deploys pioneering VersaTile automation solution for high-volume eFulfilment

Wincanton has deployed VersaTile, a new modular automation solution, at its Northampton shared user facility to further enhance its high-volume e-Fulfilment offering for customers.




deploy

Braehead Reynolds Partnership deploys Podfather delivery software

Braehead Foods, one of Scotland’s largest food wholesalers, is using Podfather’s fleet planning, route optimisation and ePOD software to streamline deliveries following their partnership with national food service company Reynolds.




deploy

Defence contractor Marshall deploys tracking solution with AT&T IoT connectivity

Marshall Aerospace and Defence Group (Marshall ADG) will deploy AT&T’s secure IoT capabilities into its overall connected container service model for its end customers, including its recently won global managed container service contract with the Dutch Army.




deploy

National Guard deploys for new emergency: Teacher shortages

Dozens of National Guard Army and Air Force troops in New Mexico have been stepping in to fill a shortage of teachers in schools

The post National Guard deploys for new emergency: Teacher shortages first appeared on Federal News Network.




deploy

Design and deployment of small cell networks

Location: Engineering Library- TK5103.2.D47 2016




deploy

China reveals Mach 7 hypersonic weapon design that can deploy missiles, drones




deploy

Flipkart deployed over 10,000 electric vehicles in delivery fleet

The strategic adoption of EVs has resulted in substantial operational efficiencies, lowering the cost per order at the hub level and improving the last-mile delivery speed by 20 per cent, compared to conventional delivery vehicles, Flipkart said.




deploy

Civilian deployment blog?

I'm looking for a blog about a civilian embarking on a short-term deployment to Afghanistan (or Iraq?) in some sort of support role—I think he was involved in engineering or computer modeling or mapping or something similar. I believe he was either a MeFite or was mentioned somewhere on MetaFilter. Anyone have a link? Other things I remember: I believe it was hosted on Blogger, though it also may not have been. I remember the poster being sad to be away from his daughter and wife for six months, but the money was of course enticing. I remember there being a couple of pretty lengthy rundowns of his time traveling and being processed on a couple of bases in the U.S. before deployment, and being concerned that he wouldn't make his deployment window if he missed a flight, and there being some discussion of all the military-issue stuff he was required to buy in order to deploy (and some things I think he deliberately chose not to bring along). All of that is pretty common fodder for deployment blogs, I guess, but maybe it'll ring a bell with someone!

Searching for "civilian deployment blog" and "Afghanistan deployment blog" has brought up a few results, but I don't think they're the blog I'm seeking. This result isn't the right one, as far as I can tell, but it may be using the same template as the one I'm remembering. This is one of the top search results, but it isn't the one I'm looking for. This and this aren't it, either. Most of the ones I'm finding are from a soldier's perspective, rather than a DoD civilian's one—or if they are about deployed DoD civilians, they mostly seem to be ones who've served in the military in other capacities previously, or who are doing multiple-year tours in Afghanistan. This guy was just going for about six months...

Any help would be greatly appreciated!




deploy

AltLayer unveils ‘Autonome,’ a platform to create and deploy autonomous AI agents

This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the…




deploy

Iranian Hackers Use "Dream Job" Lures to Deploy SnailResin Malware in Aerospace Attacks

The Iranian threat actor known as TA455 has been observed taking a leaf out of a North Korean hacking group's playbook to orchestrate its own version of the Dream Job campaign targeting the aerospace industry by offering fake jobs since at least September 2023. "The campaign distributed the SnailResin malware, which activates the SlugResin backdoor," Israeli cybersecurity company ClearSky said




deploy

News24 | Mozambique deploys soldiers ahead of planned protests

Soldiers and police were patrolling Mozambique's capital Maputo early on Thursday ahead of a planned protest against election results seen by the opposition as fraudulent.




deploy

Problem Notes for SAS®9 - 66507: The “RegisterFontTask" install task fails during out-of-the-box, add-on, or upgrade-in-place deployments if Hot Fix D7G004 is applied

The SAS 9.4M4 (TS1M4) Hot Fix D7G004 for ODS Templates installs national language support (NLS) content regardless of whether the languages were installed during the initial deployment. Having sparse




deploy

Rapid Deployment of Remote Learning: Lessons From 4 Districts

Chief technology officers are facing an unprecedented test of digital preparedness due to the coronavirus pandemic, struggling with shortfalls of available learning devices and huge Wi-Fi access challenges.




deploy

Rapid Deployment of Remote Learning: Lessons From 4 Districts

Chief technology officers are facing an unprecedented test of digital preparedness due to the coronavirus pandemic, struggling with shortfalls of available learning devices and huge Wi-Fi access challenges.




deploy

Rapid Deployment of Remote Learning: Lessons From 4 Districts

Chief technology officers are facing an unprecedented test of digital preparedness due to the coronavirus pandemic, struggling with shortfalls of available learning devices and huge Wi-Fi access challenges.




deploy

FAO in review: Building and deploying professional and practical expertise

Read the seriesFull Article



deploy

Paris to deploy 4,000 police officers for Israel-France soccer match following violence in Amsterdam

Paris police said Sunday that 4,000 officers and 1,600 stadium staff will be deployed for a France-Israel soccer match to ensure security a week after violence against Israeli fans in Amsterdam.




deploy

SCCM deployment

We are having some issues with deploying i. We are looking for the silent command switch for deployment including the licence agreement acceptance.

Ideally we would like a regular MSI that we could install for all users and not in the user content.




deploy

Deploy NodeJS Express Application to Firebase as Function.

Few days back I posted an article about how to implement restful apis using the Node Express and MySql. In this post I am going to discuss deploying NodeJS RESTful apis with Express framework to the Firebase functions. This is helpful when you deal with external endpoints which need secret keys. Google Firebase functions as an alternate product for Amazon Lambda, and Google Firebase is offering Storage and Real-time databases.





deploy

Automated Deployment of PHP Application using Github Push.

Nowadays most of my side projects are managed with Github. It has more advantages and flexibility to manage file versions. I am following a different webhook system to automatically deploy my old PHP projects. Not sure about the standards, but the following solution is an alternative approach that may solve your deployment problem for every Github push.





deploy

Deploy a PHP Application on AWS Lambda Function Serverless

In this post, I will explain the steps to deploy a simple PHP email MX record validation application on AWS lambda function using Bref layers. AWS Lambda natively supports Java, Go, PowerShell, Node. js, C#, Python, and Ruby code, not PHP. You can deploy the lite weight PHP function to improve the application performance and it will reduce cost compared with the EC2 instance. AWS is offering the first one million requests free and you need an AWS account with a payment setup. The only disadvantage is that port 25(mail/SMTP) will not support it.





deploy

Paris deploying extra police for France-Israel soccer match following Amsterdam violence 

Paris — Paris police said Sunday that 4,000 officers and 1,600 stadium staff will be deployed for a France-Israel soccer match to ensure security in and around the stadium and on public transportation a week after violence against Israeli fans in Amsterdam.  France and Israel are playing in a UEFA Nations League match Thursday.  “There's a context, tensions that make that match a high-risk event for us,” Paris police chief Laurent Nuñez said on French news broadcaster BFM TV, adding authorities “won't tolerate” any violence.  Nuñez said that 2,500 police officers would be deployed around the Stade de France stadium, north of the French capital, in addition to 1,500 others in Paris and on public transportation.  “There will be an anti-terrorist security perimeter around the stadium,” Nuñez said. Security checks will be “reinforced,” he added, including with systematic pat-downs and bag searches.  Nuñez said that French organizers have been in contact with Israeli authorities and security forces to prepare for the match.  Israeli fans were assaulted last week after a soccer game in Amsterdam by hordes of   young people apparently riled up by calls on social media to target Jewish people,   according to Dutch authorities. Five people were treated at hospitals and dozens were arrested after the attacks, which were condemned as antisemitic by authorities in Amsterdam, Israel and across Europe.  On Sunday, Dutch police detained several people for taking part in a demonstration in central Amsterdam that had been outlawed following the violence targeting Israeli fans, a local broadcaster reported.  French Interior Minister Bruno Retailleau confirmed Friday that the France-Israel match would go ahead as planned.  “I think that for a symbolic reason we must not yield, we must not give up,” he said, noting that sports fans from around the world came together for the Paris Olympics this year to celebrate the “universal values” of sports. 




deploy

Ramaphosa extends deployment of SANDF to support SAPS in clamping down on illegal mining




deploy

204652: US. "boots on the ground" were to accompany Pakistan Frontier Corps for a joint operation, but were "denied deployment" at the last minute




deploy

Polling parties deployed by helicopter to conduct elections in remote areas of Jharkhand

The personnel deputed for election duty were sent on Monday to 225 polling stations located in remote and inaccessible areas of five districts of the state -- West Singhbhum, Latehar, Lohardaga, Gumla and Garhwa.




deploy

U.S. to Deploy Troops to European Allies Amid Russia-Ukraine Crisis

The Pentagon announced on Wednesday a plan to deploy more than 3,000 troops to Europe in the first major movement of U.S. forces in Russia’s military standoff with Ukraine. Photo: Andrew Harnik/Associated Press




deploy

Digital transformation solutions player UST named Workday services deployment partner 

UST will leverage its cross-platform SaaS expertise, Generative AI thought leadership, industry solutions, and automation tools to enable customers get the most from their Workday experience




deploy

Shaping the Future of Web Apps: Full Stack Developer's Expertise in API Design and Cloud Deployment

Naga Lalitha has become visible as someone who is changing the face of technology for industry verticals like supply chain and manufacturing.




deploy

Device which can convert any normal bed into a step-down ICU to be deployed in six States 

This will be deployed in public healthcare systems across Karnataka, Tamil Nadu, Andhra Pradesh, Madhya Pradesh, Odisha, and Sikkim




deploy

The Efficient Deployment of Police Resources: Theory and New Evidence from a Randomized Drunk Driving Crackdown in India [electronic journal].

National Bureau of Economic Research




deploy

Tech Mahindra partners with OxygenForIndia to deploy 3,000 oxygen concentrators and 40,000 oxygen cylinders

The OxygenForIndia campaign is aimed at providing oxygen cylinders to those in need




deploy

Drones to be deployed to check sand smuggling

The unmanned aerial vehicles will be used to check illegal sand mining, smuggling, stock-keeping, and selling sand on the black market, says Police Commissioner




deploy

Campaign to discourage open burning from Nov 6, 588 teams to be deployed: Delhi Minister Rai

Mr. Rai said 588 teams from different civic agencies, including the Municipal Corporation of Delhi (MCD), will be deployed to report open burning incidents across the national capital




deploy

Andhra Pradesh govt.. to deploy ‘kisan drones’ in agriculture sector this year

The drones would be mainly helpful in spraying fertilizer and pesticides, and said all villages in the State are targeted to be covered in three years, says Minister Atchannaidu




deploy

Amsterdam violence: Paris will deploy 4,000 police officers for France-Israel soccer match

Israel’s National Security Council warned citizens abroad to avoid sports and cultural events, specifically the match in Paris, and be careful of violent attacks “under the pretense of demonstrations”




deploy

L&T, E2E Network form alliance for deployment of Gen AI solutions in India

“The partnership is a significant step towards adoption of GenAI solutions in India to foster a fundamental shift in the way Accelerated Computing on Cloud is used by Indian organisations,” the companies said




deploy

Techno-economic insights and deployment prospects of permanent carbon dioxide sequestration in solid carbonates

Energy Environ. Sci., 2024, 17,8756-8775
DOI: 10.1039/D4EE03166K, Paper
Open Access
  This article is licensed under a Creative Commons Attribution 3.0 Unported Licence.
Andreas Mühlbauer, Dominik Keiner, Christian Breyer
While a rapid defossilisation of the energy system is the highest priority, additional post-fossil CDR for net-negative emissions will be necessary. Routes for mineralisation (in situ-, ex situ mineralisation, enhanced rock weathering) are examined.
The content of this RSS Feed (c) The Royal Society of Chemistry