sec

T. Hasegawa Secures USDA Certification for Meat and Poultry Flavor Manufacturing

The California-based company is adding equipment, resources and production space to accommodate production of USDA-certified meat and poultry-based products.




sec

FSMA: Getting to the security aspects of food

While we've looked at the key issues - including COVID-19 - facing food processors and A&E/Cs this year in FE's 2020 Annual Plant Construction Survey, there's a lot more to discuss.




sec

Processors up to speed on FSMA, but security issues remain

FSMA’s Intentional Adulteration rule is still a work in progress for some sites, meanwhile processors and retailers are eyeing indoor grow facilities.





sec

Dealers’ Secrets for Selling Laminate

A Google search for “laminate retailers” will retrieve over a million results in about 30 seconds.




sec

Unilin Secures Patent for Eco-Friendly PET Flooring Technology

The technology, marketed as "P-SPC" (PET-based Solid Polymer Composite), offers manufacturers a PVC-free alternative that maintains the familiar characteristics of traditional SPC (Solid Polymer Composite) flooring products.




sec

Now is the Time to Secure Food Processing Facilities

The threats facing food processing facilities are already here, and there is no longer any time to delay implementing minimum protections for these sites.




sec

The Intersection of IoT, Sustainability, and Food Safety: A New Era in Supply Chain Management

Investing in the right IoT hardware and software package can provide actionable data that will help improve business operations.




sec

Food and Beverage Manufacturers Face Mounting Cybersecurity Attacks

Connectivity provides manufacturing plant operations many advantages like increased productivity, faster identification and remediation of quality defects, and better collaboration across functional areas. However, this connectivity is dramatically increasing smart factories’ vulnerabilities and leaving them exposed to cybersecurity threats.




sec

Considerations for Assessing and Mitigating Food Manufacturing Cybersecurity Risks

Ahmik Hindman, senior networks and security consultant at Rockwell Automation, recently spoke about how food manufacturers can assess cybersecurity risks, implement security patches and build a cybersecurity risk management system.




sec

'Generation Z' and 'second generation': an agenda for learning from cross-cultural negotiations of the climate crisis in the lives of second generation immigrants.

Children's Geographies; 06/01/2021
(AN 151284196); ISSN: 14733285
Academic Search Premier





sec

Creativity in childhood: exploring how children's experiences of creativity can be understood intersectionally and spatially.

Children's Geographies; 10/01/2022
(AN 159948772); ISSN: 14733285
Academic Search Premier





sec

Children's physical activity and active travel: a cross-sectional study of activity spaces, sociodemographic and neighborhood associations.

Children's Geographies; 04/01/2023
(AN 163915532); ISSN: 14733285
Academic Search Premier




sec

The right to the school: urban schooling, place-based education, and youth agency at the intersection of gentrification.

Children's Geographies; 08/01/2023
(AN 167303420); ISSN: 14733285
Academic Search Premier




sec

Navigating dis/ableist school playgrounds and toilets with geographic maturity: stories of young people with dwarfism from their secondary education.

Children's Geographies; 08/01/2023
(AN 167303406); ISSN: 14733285
Academic Search Premier




sec

Spatialities of <italic>shabaab</italic>: exploring the intersections of lifestage, space and mobility amongst refugee young people in urban Jordan.

Children's Geographies; 06/08/2024
(AN 177735566); ISSN: 14733285
Academic Search Premier





sec

Children, education and geography rethinking intersections: edited by Hammond, Lauren, Mary Biddulph, Simon Catling, and John H. McKendrick, New York, Routledge, 2022, 280 pp., £102.00 (hardback), £31.44 (paperback), ISBN: 978-1-03216-432-8.

Children's Geographies; 10/01/2024
(AN 180134750); ISSN: 14733285
Academic Search Premier




sec

Social anxiety and bullying victimization: A three-level meta-analysis of cross-sectional and longitudinal studies

Publication date: November 2024 Source: Child Abuse & Neglect, Volume 157 Author(s): Jiaqi Deng, Jiaqi Liu, Jianyu Luo, Yuhong Pi, Jiabing Pan, Zhongfang Fu, Xinfeng Tang Read the full article ›

The post Social anxiety and bullying victimization: A three-level meta-analysis of cross-sectional and longitudinal studies was curated by information for practice.



  • Meta-analyses - Systematic Reviews



sec

Impact of selective reporting bias on stroke trials: potential compromise in evidence synthesis – A cross-sectional study

Accurate reporting of outcomes is crucial for interpreting the results of randomized controlled trials (RCTs). However, selectively reporting outcomes in publications to achieve researchers’ anticipated result… Read the full article ›

The post Impact of selective reporting bias on stroke trials: potential compromise in evidence synthesis – A cross-sectional study was curated by information for practice.



  • Open Access Journal Articles

sec

Factors associated with household willingness to pay for Universal Health Coverage in Cameroon: a nationwide cross-sectional analysis

Sustained financing for Universal Health Coverage (UHC) has been a concern for the Cameroon government. Household contributions have been considered as a financing mechanism, but this raises concerns on the wi… Read the full article ›

The post Factors associated with household willingness to pay for Universal Health Coverage in Cameroon: a nationwide cross-sectional analysis was curated by information for practice.



  • Open Access Journal Articles

sec

Research Intern 2021 - Security & Large Scale Systems (SLSS), Interns/Students, Cambridge, UK, Research


Research Internships 2021 – SLSS

Arm is the industry's leading supplier of microprocessor technology providing efficient, low-power chip intelligence making electronic innovations come to life.  Through our partners, our designs power everything from coffee machines to the fastest supercomputer in the world. Do you want to work on technology that enriches the lives of over 70% of the world’s population?   Our internship programme is now open for applications! We want to hear from curious and enthusiastic candidates interested in working with us on the future generations of compute.

About Arm and Arm Research

Arm plays a key role in our increasingly connected world. Every year, more than 20 billion products featuring Arm technology are shipped.  Our engineers design and develop CPUs, graphics processors, complex system technologies, supporting software development tools, and physical libraries.

At Arm Research, we develop new technology that can grow into new business opportunities. We keep Arm up to speed with recent technological developments by pursuing blue-sky research programmes, collaborating with academia, and integrating emerging technologies into the wider Arm ecosystem.  Our research activities cover a wide range of fields from mobile and personal computing to server, cloud, and HPC computing. Our work and our researchers span a diverse range from circuits to theoretical computer science. We all share a passion for learning and creating.

About the software and large-scale systems group and our work

The Software and Large-Scale Systems Research works on distributed systems, edge computing, compute-in-memory, and computer-in-network among other subjects. We are interested in High Performance Computing, Computational Engineering, and High-Performance Data Analytics.

Through our work we try to address three main questions: How do we balance hardware diversity with the software ecosystem? How do we evolve ARM technology to be relevant at large-scale (scale-up as well as scale-out)? What is the necessary infrastructure for evaluating large scale systems (in the absence of hardware)?

Our research is currently focussed on two threads. One is developing IoT Gateway Reference Design and Proof of concept deployments around various edge use cases (Cities, Agriculture, Rural, Telco). The second one is exploring edge computing, networking, and data centre scale cluster solutions.


 

 




sec

Research Intern 2021 - Security, Interns/Students, Cambridge, UK, Research


Research Internships 2021 – Security

Arm is the industry's leading supplier of microprocessor technology providing efficient, low-power chip intelligence making electronic innovations come to life.  Through our partners, our designs power everything from coffee machines to the fastest supercomputer in the world. Do you want to work on technology that enriches the lives of over 70% of the world’s population?   Our internship programme is now open for applications! We want to hear from curious and enthusiastic candidates interested in working with us on the future generations of compute.

About Arm and Arm Research

Arm plays a key role in our increasingly connected world. Every year, more than 20 billion products featuring Arm technology are shipped.  Our engineers design and develop CPUs, graphics processors, complex system technologies, supporting software development tools, and physical libraries.

At Arm Research, we develop new technology that can grow into new business opportunities. We keep Arm up to speed with recent technological developments by pursuing blue-sky research programmes, collaborating with academia, and integrating emerging technologies into the wider Arm ecosystem.  Our research activities cover a wide range of fields from mobile and personal computing to server, cloud, and HPC computing. Our work and our researchers span a diverse range from circuits to theoretical computer science. We all share a passion for learning and creating.

About our group and our work

The Arm Research Security Group works to "develop technology worthy of the trust that we place in it." We are not a "red team" identifying and publishing vulnerabilities in systems or suggesting point-fixes, but rather we seek to develop techniques and tools that eliminate large classes of vulnerabilities outright. To do this, we have projects broadly focussed on three research areas:

Security. How can we implement systems that remain secure even in the face of well-organised and extraordinarily imaginative adversaries? In this area we are looking at, for example, designing "responsive hardware" that can spot and react to early signs of security threats. We are also looking into how an emerging set of post-quantum ciphers can be efficiently implemented on power-constrained Arm microcontrollers.

Correctness. Can hardware and software systems be designed so that they are correct by construction? And what does "correct" even mean? We are currently trying to establish provable security properties for future extensions of the Arm architecture, and we recently started a collaboration with academics who are applying mathematical techniques to spot Spectre-like bugs in hardware designs.

Privacy. How can emerging technologies increase the privacy of computations and data? We are investigating how trusted hardware and remote attestation protocols can be used to implement efficient secure-multiparty computations. We are collaborating with academic partners around the design and implementation of hardware acceleration for homomorphic encryption. Other ongoing projects look at using the high assurance seL4 Operating System to ensure security and privacy on untrustworthy Edge devices.


 

 

 

 




sec

Intern, Research - Security, Interns/Students, Austin (TX), USA, Research

Arm is the industry's leading supplier of microprocessor technology providing efficient, low-power chip intelligence making electronic innovations come to life.  Through our partners, our designs power everything from coffee machines to the fastest supercomputer in the world. Do you want to work on technology that enriches the lives of over 70% of the world’s population?   Our internship program is now open for applications! We want to hear from curious and enthusiastic candidates interested in working with us on the future generations of compute.  

About Arm and Arm Research 

Arm plays a key role in our increasingly connected world. Every year, more than 20 billion products featuring Arm technology are shipped.  Our engineers design and develop CPUs, graphics processors, complex system technologies, supporting software development tools, and physical libraries. 

At Arm Research, we develop new technology that can grow into new business opportunities. We keep Arm up to speed with recent technological developments by pursuing blue-sky research programs, collaborating with academia, and integrating emerging technologies into the wider Arm ecosystem.  Our research activities cover a wide range of fields from mobile and personal computing to server, cloud, and HPC computing. Our work and our researchers span a diverse range from circuits to theoretical computer science. We all share a passion for learning and creating. 

About our group and our work 

The Arm Research Security Group works to "develop technology worthy of the trust that we place in it." We are not a "red team" identifying and publishing vulnerabilities in systems or suggesting point-fixes, but rather we seek to develop techniques and tools that eliminate large classes of vulnerabilities outright. To do this, we have projects broadly focussed on three research areas: 

Security. How can we implement systems that remain secure even in the face of well-organised and extraordinarily imaginative adversaries? In this area we are looking at, for example, designing "responsive hardware" that can spot and react to early signs of security threats. We are also looking into how an emerging set of post-quantum ciphers can be efficiently implemented on power-constrained Arm microcontrollers.  

Correctness. Can hardware and software systems be designed so that they are correct by construction? And what does "correct" even mean? We are currently trying to establish provable security properties for future extensions of the Arm architecture, and we recently started a collaboration with academics who are applying mathematical techniques to spot Spectre-like bugs in hardware designs.  

Privacy. How can emerging technologies increase the privacy of computations and data? We are investigating how trusted hardware and remote attestation protocols can be used to implement efficient secure-multiparty computations. We are collaborating with academic partners around the design and implementation of hardware acceleration for homomorphic encryption. Other ongoing projects look at using the high assurance seL4 Operating System to ensure security and privacy on untrustworthy Edge devices.  

 




sec

Enterprise Security Intern, Interns/Students, Cambridge, UK, Security

Are you passionate about technology and information/cyber security? Do you want to know what it feels like to be part of a growing team that is building the foundations of a world-class information security program? We have more work than we can handle.

We are offering an internship with opportunities to gain experience in Threat monitoring and investigation, Risk management and mitigation, Incident management, Architectural governance and consultation, Vulnerability Management, and Security awareness and user behaviors.

What will I be accountable for?

Key projects may include:

• Monitoring incident management queues
• Creating or implementing security tooling
• Automating monitoring of internal controls
• Roll-out and education of a new set of information security policies
• Working with business units to create “get well” plans
• Helping to research and analyse requests for changes to policies and standards
• Conducting security reviews of third parties
• Developing training programs for users




sec

Enterprise Security Intern, Interns/Students, Cambridge, UK, Security

We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, status as a veteran, and basis of disability or any other federal, state or local protected class.


About the role

Are you passionate about technology and information/cyber security? Do you want to know what it feels like to be part of a growing team that is building the foundations of a world-class information security program? We have more work than we can handle.

We are offering an internship with opportunities to gain experience in Threat monitoring and investigation, Risk management and mitigation, Incident management, Architectural governance and consultation, Vulnerability Management, and Security awareness and user behaviors.

What will I be accountable for?

Key projects may include:

• Monitoring incident management queues
• Creating or implementing security tooling
• Automating monitoring of internal controls
• Roll-out and education of a new set of information security policies
• Working with business units to create “get well” plans
• Helping to research and analyse requests for changes to policies and standards
• Conducting security reviews of third parties
• Developing training programs for users






sec

Secret Aardvark Drops Hot Nut News

The Portland-area hot sauce company celebrated 20 years of flavorful, spicy sauciness with a new snack. by Suzette Smith

Beloved local hot sauce makers Secret Aardvark celebrated 20 years of spiciness, in both seasoning and spirit, on Saturday at the Landmark Saloon, where—between sets by two of her favorite local groups, Silver Lake 66 and Ashleigh Flynn and the Riveters—Aardvark owner Stacy Moritz introduced a new product to the crowd, Aardvarks Nuts: Habanero Hazelnuts.

"Who doesn't like a hot nut?" she asked the crowd, wryly. 

Hazelnuts are the state nut of Oregon, but as it happens, Moritz told the Mercury she didn't enjoy them until her team made them hot. And that desire—to make the filbert something she likes—is the reasoning she gave for the snack experiment to be born.

To our taste buds, the Aardvarks Nuts are more flavor-forward than they are eye-watering hot, but the spice does sneak up, thanks to the folie à deux between the nut's oil and Aardvark's secret spices. It's a nice, unique mix that transforms the sweetness we'd generally expect from a hazelnut with the carrot and chili pepper profiles we love in Aardvark's original Habanero Hot Sauce.

Aardvark Nuts stay true to the company's local focus, starting out as Laurel Tree hazelnuts, which are grown in the Willamette Valley.

"We took the bougiest nut we could find, and made them Aardvark habanero spicy," Moritz said. "It's fun, it's hard, it's sweaty, it's hot." Much of that sentiment can also be found on the nut packaging, which stays true to Moritz's well-documented, saucy humor.

In a 2013 Mercury profile Moritz mused, "My dream is one day to have a guy in an Aardvark costume running down Hollywood Boulevard with his dick hanging out." Moritz remembered the profile and said that particular dream hasn't ever been realized, but if they were to do it now, she'd have to be the one wearing the costume.

Related: Secret Aardvark Could Become a National Sensation. (So Maybe You Should Stop Stealing It?)

Saturday's nut drop was a celebratory sneak peak. The company is still working to make the packaged snacks available for purchase, but they will be, at the very least, on the Secret Aardvark site by the new year. A representative from the company said they were just waiting on final approval of the product's non-GMO certification.

In the meanwhile, Aardvark fans can keep their eyes peeled for other upcoming sauces the company has in the works: Moritz said we could expect a serrano ranch sauce and a spicy mayo "that will actually be spicy."




sec

Basic Black Live: Looking Ahead to the Second Obama Administration


January 25, 2013

President Obama officially began his second term of office on January 20th. In his inaugural address to the nation the following day, his focus was on the strengths and promises of America. In this Basic Black conversation, we explore the challenges, the goals, and the demands for the second Obama administration.

Our panel this week:
- Callie Crossley, host and moderator, Boston Public Radio, WGBH
- Kim McLarin, assistant professor of writing, literature and publishing, Emerson College
- Phillip Martin, senior reporter, 89.7 WGBH Radio
- Peniel Joseph, professor of history, Tufts University
- Robert Fortes, Republican strategist and political consultant




Photo: Supreme Court Chief Justice John Roberts administers the oath of office to President Barack Obama during the inaugural swearing-in ceremony at the U.S. Capitol in Washington, D.C., Jan. 21, 2013. (Official White House Photo by Sonya N. Hebert)




sec

The Secret History of White Power

In Q&A, Asst. Prof. Kathleen Belew discusses research on white power movements




sec

Country superstar Garth Brooks announces second show at U.S. Bank Stadium

Tickets for the May 3 show go on sale at 10 a.m. Thursday.




sec

President-elect Trump is expected to nominate Marco Rubio for Secretary of State

If confirmed, the Florida senator would become the first Latino to ever serve as the nation's top diplomat.




sec

Trump nominates Fox News host and Minnesotan Pete Hegseth for defense secretary

Hegseth, 44, is a co-host of Fox News Channel’s “Fox & Friends Weekend” and unsuccessfully ran for the Senate in Minnesota in 2012.




sec

What to know about Kristi Noem, Trump's pick for Homeland Security secretary

Donald Trump has selected South Dakota Gov. Kristi Noem to head the Department of Homeland Security. It's one of the biggest government agencies that will be integral to his vow to secure the border and carry out a massive deportation operation.




sec

IDOP issues call for prayers as global tensions heighten persecution of Christians

This year’s International Day of Prayer for the persecuted Church comes as worldwide tensions have turned up pressure on Christians, challenging the global Body of Christ to keep pace in aid and supplication.




sec

'Spiritual battle': Watchdog group urges Christians to help persecuted believers, calls for prayer

One of the challenges to supporting persecuted Christians abroad is that many in the West don't realize just how much their brothers and sisters in Christ suffer for their faith, according to the head of a leading advocacy group.




sec

N.H.'s Clean Energy Sector Hopes For Post-Covid Stimulus Support To Restore Jobs, Lower Emissions

COVID-19 has been hard on just about every industry in New Hampshire, and renewable energy is no exception. People worried about money are putting off investing in solar panels, and health concerns have made home energy efficiency visits more complicated. But scientists say investments like these can lower energy costs, and remain a critical way to combat the other big crisis we’re facing – climate change. As part of NHPR’s new climate change reporting project, By Degrees , NHPR’s Annie Ropeik has been trying to find out what might be ahead for the renewable energy industry in the state. Morning Edition Host Rick Ganley spoke with her about what’s next.




sec

Ohio State Ready For Second Game Against Golden Hurricanes

Ohio State prepares for its second game this week against Tulsa.




sec

Baijiahao: Russia makes brilliant move by exchanging US securities for gold

In 2023, central banks around the world purchased significant amounts of gold. China's activity in this area was particularly noticeable as the nation's gold reserves increased by 225 tons over the year. An article published on Chinese Internet platform Baijiahao says that Russia actively participated in the gold rush to increase its precious metals reserves. As a result, Russia's gold reserves reached a record 2.36 thousand tons. Russia is thus ranked fifth following the USA, Germany, Italy and France.




sec

Prosecutors seek 9.5 years for US basketball player Griner

The prosecutor on Thursday requested 9.5 years in prison for American basketball player Brittney Griner, accused of smuggling hash oil, RIA Novosti correspondent reports from the Khimki courtroom. “By partial addition, I finally ask you to appoint nine years and six months in prison with a sentence to be served in a general regime colony with a fine of one million rubles,” the state prosecutor said in his speech. Griner pleaded guilty in court, but stressed that she had no intent to commit a crime, and she "collected the bag in a hurry." During the consideration of the case, it became known that a doctor from the state of Arizona prescribed marijuana to her instead of traditional painkillers due to the side effects of the latter.




sec

Energy (In)-Security: The Implications of the Middle East Crisis

The recent flare-up of conflict in the Middle East, particularly triggered by the assassination of Hamas leader Ismail Haniyeh in Iran by a suspected Israeli airstrike, represents not only a humanitarian and political crisis but also a looming energy crisis ahead. As tensions between Israel, backed by the United States, and Iran, along with its allies like Hezbollah and other Middle Eastern states, intensify, the risks to energy resources and supply routes, both on land and at sea, are becoming increasingly evident. The region's significant oil and gas reserves, crucial to global markets, are now under threat, and any disruption of these supplies could have far-reaching consequences for energy security worldwide. The assassination of Haniyeh, a central figure in Hamas, has ignited a dangerous new phase in the already volatile Middle East. Iran, a key supporter of Hamas and Hezbollah, has found itself at the heart of a growing coalition of Middle Eastern countries rallying against Israel. This development risks drawing the entire region into a broader confrontation, with profound implications not just for regional stability but also for global energy markets.




sec

ACDS’ cybersecurity portfolio gains competitive edge from AI-powered thoughtworks application managed services

Thoughtworks, the global technology consultancy that integrates strategy, design and engineering to drive digital innovation, has started a strategic partnership with UK-based cybersecurity startup Advanced Cyber Defence Systems (ACDS) by providing Thoughtworks DAMO AI-powered application managed services.




sec

Global survey of security pros finds 87% of organisations impacted by cyber threats they couldn’t detect or neutralise last year

Red Canary, the managed detection and response (MDR) provider, has released a new report, Security Operations Trends Report, providing insight into critical challenges facing modern cybersecurity teams. Partnering with independent research company Coleman Parkes, Red Canary surveyed 700 security leaders from the US, UK, New Zealand, Australia and Nordics. 




sec

Retail Sector - Cyber Threat Intelligence Report 2024

NCC Group have just released a free CyberSecurity Threat Intelligence Report for the Retail sector as it enters its busiest spell, the "GoldenQuarter".It will help retailers manage an increasing surge in demand across their IT operations and supply chains.




sec

Dyslexia Awareness Week: Ensuring website inclusivity in the retail sector

As Dyslexia Awareness Week (07-13 October 2024) arrives this week, digital transformation specialists Sherwen Studios are advocating for retailers to reconsider how accessible their website is for users affected by dyslexia.




sec

Strengthening the MSP portfolio: Navigating modern cybersecurity

By Marc Malafronte, director of sales, VIPRE Security Group.

As cyberattacks increase in frequency and sophistication, businesses must prioritize cybersecurity as a critical investment area. Managed service providers (MSPs) are crucial in supporting organizations on their cybersecurity journey.