ics In Their Words | Using Analytics and AI in Legal Practice By www.littler.com Published On :: Fri, 23 Mar 2018 15:08:55 +0000 Lee Schreter discusses the impact of artificial intelligence and data analytics on the practice of law. Georgia State News View Article Full Article
ics How CEOs Can Address Politics In The Workplace Ahead Of The 2024 Election By www.littler.com Published On :: Thu, 08 Aug 2024 14:28:46 +0000 Bradford J. Kelley and Michael J. Lotito discuss key steps to consider when business leaders work with their teams and HR departments to develop political speech policies and enforcement strategies. Chief Executive View Full Article
ics Hot Topics and New Employment Laws: Everything Employers in the DMV Need to Know to Hit the Ground Running in 2023 By www.littler.com Published On :: Fri, 02 Dec 2022 18:03:37 +0000 Full Article
ics 2024 Summer Olympics Series: United States By www.littler.com Published On :: Thu, 25 Jul 2024 13:13:13 +0000 Full Article
ics 2024 Summer Olympics Series: Japan By www.littler.com Published On :: Mon, 29 Jul 2024 17:31:27 +0000 Full Article
ics Hot Topics in Minnesota Labor & Employment Law By www.littler.com Published On :: Wed, 22 May 2024 22:00:26 +0000 Full Article
ics 2015 Hot Topics for Multinational Companies By www.littler.com Published On :: Mon, 22 Dec 2014 16:10:55 +0000 As we enter the New Year, Littler's international practice has identified a number of key employment and labor law issues for multinational companies (MNCs). The past year has brought to the fore some challenging issues likely to grow in importance in 2015, among them the increasing strength of global unions as well as the ever-growing importance of corporate compliance. While some of these topics are certainly familiar—data privacy and whistleblower protection, for example—the continuing importance and expansion of these issues highlight their increased complexity and correspondingly in Full Article
ics Employment Law And Geopolitics: Key Considerations For The C-Suite By www.littler.com Published On :: Wed, 24 Apr 2024 20:30:28 +0000 Stephan Swinkels and Michael Lotito discuss the intersection of employment and geopolitics and offer key considerations for the C-suite of global companies. Chief Executive View Full Article
ics How Union Tactics Sideline Businesses and Workers By www.littler.com Published On :: Tue, 17 Sep 2024 14:18:49 +0000 Alex MacDonald discusses how a new study reveals how some union practices prioritize maintaining their political influence over delivering benefits. U.S. Chamber of Commerce View Full Article
ics A Regression to Politics? Recent Court Decisions Could Give Partisanship Even More Influence at the NLRB By www.littler.com Published On :: Mon, 19 Aug 2024 21:14:27 +0000 Alex MacDonald discusses recent court decisions that criticized the way the NLRB operates and that could transform American labor law. Washington Legal Foundation View Full Article
ics Hot Topics in Labor Law By www.littler.com Published On :: Thu, 01 Feb 2024 21:58:11 +0000 Full Article
ics Psychedelics and Marijuana on the Ballot: How Should Employers Prepare for Potential Legalization? By www.littler.com Published On :: Mon, 28 Oct 2024 14:28:19 +0000 Voters in several states will decide whether marijuana or, in one case, psychedelic substances should be legal in the upcoming November 5, 2024 general election. Employers should keep their eyes on these ballot measures and prepare for questions regarding changes to workplace policies if some or all of them pass. A rundown of the ballot measures in these jurisdictions follows. Full Article
ics Workforce Reductions and Statistics: A Primer and Recommendations By www.littler.com Published On :: Tue, 15 Dec 2020 19:32:22 +0000 Workforce reductions, whether in the form of hours reductions, furloughs, or layoffs, are often a last resort for employers experiencing financial pressures. Nevertheless, when these actions are necessary, time typically is of the essence, because when shedding payroll is the objective, the more drawn out the process, the smaller will be any financial savings. But quick decisions need not be careless decisions. The key is to thoroughly understand the risks before making decisions that later may result in potential liability. Full Article
ics Third Circuit's 'Johnson v. NCAA' Opinion: What It Means for College Athletics and Beyond By www.littler.com Published On :: Thu, 24 Oct 2024 15:14:05 +0000 Andrea M. Kirshenbaum discusses how Johnson v. NCAA is noteworthy beyond the realm of college athletics for its expansive discussion of the FLSA. The Legal Intelligencer View (Subscription required) Full Article
ics Politics in a California Workplace By www.littler.com Published On :: Mon, 30 Sep 2024 15:49:46 +0000 California law provides robust protections for employees’ political activity, including anti-discrimination and retaliation protections. California law also provides employees broad protections for lawful off-duty conduct. California employers are required to provide employees with time off to vote and post a notice explaining those rights. For the upcoming election, this notice must be posted by October 26, 2024. Full Article
ics Politics In California Workplaces: What Employers Must Know By www.littler.com Published On :: Tue, 08 Oct 2024 21:27:28 +0000 Bradford Kelley and Britney Torres predict politics in the workplace will remain an issue beyond the election and so California employers need a long-term plan measures for issues that include voter intimidation and discrimination and employees taking time off to vote. Law360 View (Subscription required) Full Article
ics 2024 Summer Olympics Series: Spain By www.littler.com Published On :: Mon, 29 Jul 2024 13:54:49 +0000 Full Article
ics Election Season: Navigating Politics in an Inclusive Work Environment By www.littler.com Published On :: Wed, 02 Oct 2024 16:05:50 +0000 Full Article
ics Politics in the Workplace: What Employers Need to Know By www.littler.com Published On :: Mon, 07 Oct 2024 17:47:43 +0000 Full Article
ics Politics in the Office: Infinitely Spookier than Halloween By www.littler.com Published On :: Thu, 10 Oct 2024 15:53:02 +0000 Full Article
ics Employment Law: Trends, Threats, and Tactics in 2014 By www.littler.com Published On :: Fri, 31 Jan 2014 19:49:54 +0000 Full Article
ics Employment Law: Trends, Threats, and Tactics in 2014 By www.littler.com Published On :: Fri, 31 Jan 2014 20:14:23 +0000 Full Article
ics Employment Law: Trends, Threats, and Tactics in 2014 By www.littler.com Published On :: Fri, 31 Jan 2014 20:17:00 +0000 Full Article
ics Employment Law: Trends, Threats, and Tactics in 2014 By www.littler.com Published On :: Fri, 31 Jan 2014 20:19:01 +0000 Full Article
ics Politics in the Workplace: What Employers Need to Know By www.littler.com Published On :: Tue, 04 Jun 2024 14:56:27 +0000 How employers deal with politics in the workplace involves a wide range of issues, including an organization’s brand, reputation, and values. Full Article
ics Politics In The Workplace: What Employers Need To Know By www.littler.com Published On :: Fri, 14 Jun 2024 18:01:50 +0000 Bradford Kelley, Kellen Shearin and Michael Lotito say employers must consider employees' rights — and limits on those rights — related to political speech and activities in the workplace. Law360 View (Subscription required.) Full Article
ics Implications for Employers of Colorado’s New Biometrics Law By www.littler.com Published On :: Thu, 27 Jun 2024 20:45:27 +0000 Effective July 1, 2025, an amendment to the Colorado Privacy Act will impose new requirements on companies that collect and use biometric information. Full Article
ics Implications for Employers of Colorado’s New Biometrics Law By www.littler.com Published On :: Fri, 19 Jul 2024 13:42:19 +0000 Zoe M. Argento, Philip L. Gordon, Kwabena A. Appenteng, Orly Henry and Alyssa Daniels discuss the Biometric Amendment, an amendment to the Colorado Privacy Act that requires employers to obtain consent before collecting and using biometric information. SHRM Online View (Subscription required) Full Article
ics Politics in the Workplace and the Risks of Social Media By www.littler.com Published On :: Tue, 10 Sep 2024 22:26:49 +0000 How employers address employees’ use of social media as a forum to engage on political issues entails a range of considerations. Social media’s potential to reach an outsized audience compared to traditional venues for political discourse may increase the negative effects of controversial political speech in the workplace. Full Article
ics Private employers should consider this when navigating politics in the workplace By www.littler.com Published On :: Fri, 04 Oct 2024 21:47:14 +0000 Joycelyn Stevenson shares four key points employers should consider when it comes to politics at work. Nashville Business Journal View (Subscription required) Full Article
ics Geopolitics, AI adoption, climate risk worrying European firms By www.littler.com Published On :: Wed, 16 Oct 2024 14:23:50 +0000 Stephan Swinkels, Jan-Ove Becker and Deborah Margolis discuss findings from Littler’s 2024 European Employer Survey Report. International Employment Lawyer View (Subscription required) Full Article
ics AI and Geopolitics Top Concerns for Employers In 2024 By www.littler.com Published On :: Wed, 16 Oct 2024 14:30:29 +0000 Stephan Swinkels discusses key findings in Littler’s 2024 European Employer Survey Report, including AI use and politically charged issues in the workplace. Law360 View (Subscription required) Full Article
ics ETSI IoT Week: semantics, experiences and security By www.etsi.org Published On :: Thu, 28 Apr 2022 06:12:48 GMT ETSI IoT Week: semantics, experiences and security Sophia Antipolis, 28 October 2019 ETSI IoT Week 2019 (21-25 October) drew more than 200 attendees to ETSI’s headquarters for what has become a must attend event for anyone who wants to understand the importance of standard-enabled technologies for IoT service deployments, in many different sectors. Read More... Full Article
ics The Agricultural Industry Electronics Foundation signs MoU with ETSI By www.etsi.org Published On :: Wed, 20 Jan 2021 10:29:19 GMT The Agricultural Industry Electronics Foundation signs MoU with ETSI Sophia Antipolis, 20 January 2021 On 7 January, the Agricultural Industry Electronics Foundation (AEF) signed a Memorandum for Understanding (MoU) with ETSI. Read More... Full Article
ics A Galaxy Within: Single-Cell Genomics Open a New Frontier to Understanding the Brain By www.alumni.mcgill.ca Published On :: Wed, 31 Dec 1969 19:00:00 -0500 Starts: Thu, 14 Nov 2024 20:00:00 -050011/14/2024 06:00:00PMLocation: montreal, Canada Full Article
ics Cybersecurity Snapshot: Apply Zero Trust to Critical Infrastructure’s OT/ICS, CSA Advises, as Five Eyes Spotlight Tech Startups’ Security By www.tenable.com Published On :: Fri, 01 Nov 2024 09:00:00 -0400 Should critical infrastructure orgs boost OT/ICS systems’ security with zero trust? Absolutely, the CSA says. Meanwhile, the Five Eyes countries offer cyber advice to tech startups. Plus, a survey finds “shadow AI” weakening data governance. And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy.Dive into six things that are top of mind for the week ending Nov. 1.1 - Securing OT/ICS in critical infrastructure with zero trustAs their operational technology (OT) computing environments become more digitized, converged with IT systems and cloud-based, critical infrastructure organizations should beef up their cybersecurity by adopting zero trust principles.That’s the key message of the Cloud Security Alliance’s “Zero Trust Guidance for Critical Infrastructure,” which focuses on applying zero trust methods to OT and industrial control system (ICS) systems.While OT/ICS environments were historically air gapped, that’s rarely the case anymore. “Modern systems are often interconnected via embedded wireless access, cloud and other internet-connected services, and software-as-a-service (SaaS) applications,” reads the 64-page white paper, which was published this week.The CSA hopes the document will help cybersecurity teams and OT/ICS operators enhance the way they communicate and collaborate. Among the topics covered are:Critical infrastructure’s unique threat vectorsThe convergence of IT/OT with digital transformationArchitecture and technology differences between OT and ITThe guide also outlines this five-step process for implementing zero trust in OT/ICS environments:Define the surface to be protectedMap operational flowsBuild a zero trust architectureDraft a zero trust policyMonitor and maintain the environmentA zero trust strategy boosts the security of critical OT/ICS systems by helping teams “keep pace with rapid technological advancements and the evolving threat landscape,” Jennifer Minella, the paper’s lead author, said in a statement.To get more details, read:The report’s announcement “New Paper from Cloud Security Alliance Examines Considerations and Application of Zero Trust Principles for Critical Infrastructure”The full report “Zero Trust Guidance for Critical Infrastructure”A complementary slide presentationFor more information about OT systems cybersecurity, check out these Tenable resources: “What is operational technology (OT)?” (guide)“Discover, Measure, and Minimize the Risk Posed by Your Interconnected IT/OT/IoT Environments” (on-demand webinar)“How To Secure All of Your Assets - IT, OT and IoT - With an Exposure Management Platform” (blog)“Blackbox to blueprint: The security leader’s guidebook to managing OT and IT risk” (white paper)“Tenable Cloud Risk Report 2024” (white paper)2 - Five Eyes publish cyber guidance for tech startupsStartup tech companies can be attractive targets for hackers, especially if they have weak cybersecurity and valuable intellectual property (IP).To help startups prevent cyberattacks, the Five Eyes countries this week published cybersecurity guides tailored for these companies and their investors.“This guidance is designed to help tech startups protect their innovation, reputation, and growth, while also helping tech investors fortify their portfolio companies against security risks," Mike Casey, U.S. National Counterintelligence and Security Center Director, said in a statement.These are the top five cybersecurity recommendations from Australia, Canada, New Zealand, the U.S. and the U.K. for tech startups:Be aware of threat vectors, including malicious insiders, insecure IT and supply chain risk.Identify your most critical assets and conduct a risk assessment to pinpoint vulnerabilities.Build security into your products by managing intellectual assets and IP; monitoring who has access to sensitive information; and ensuring this information’s protection.Conduct due diligence when choosing partners and make sure they’re equipped to protect the data you share with them.Before you expand abroad, prepare and become informed about these new markets by, for example, understanding local laws in areas such as IP protection and data protection. “Sophisticated nation-state adversaries, like China, are working hard to steal the intellectual property held by some of our countries’ most innovative and exciting startups,” Ken McCallum, Director General of the U.K.’s MI5, said in a statement.To get more details, check out these Five Eyes’ cybersecurity resources for tech startups:The announcement “Five Eyes Launch Shared Security Advice Campaign for Tech Startups”The main guides: “Secure Innovation: Security Advice for Emerging Technology Companies”“Secure Innovation: Security Advice for Emerging Technology Investors”These complementary documents:“Secure Innovation: Scenarios and Mitigations”“Secure Innovation: Travel Security Guidance”“Secure Innovation: Due Diligence Guidance”“Secure Innovation: Companies Summary”3 - Survey: Unapproved AI use impacting data governanceEmployees’ use of unauthorized AI tools is creating compliance issues in a majority of organizations. Specifically, it makes it harder to control data governance and compliance, according to almost 60% of organizations surveyed by market researcher Vanson Bourne.“Amid all the investment and adoption enthusiasm, many organisations are struggling for control and visibility over its use,” reads the firm’s “AI Barometer: October 2024” publication. Vanson Bourne polls 100 IT and business executives each month about their AI investment plans.To what extent do you think the unsanctioned use of AI tools is impacting your organisation's ability to maintain control over data governance and compliance?(Source: Vanson Bourne’s “AI Barometer: October 2024”)Close to half of organizations surveyed (44%) believe that at least 10% of their employees are using unapproved AI tools.On a related front, organizations are also grappling with the issue of software vendors that unilaterally and silently add AI features to their products, especially to their SaaS applications.While surveyed organizations say they’re reaping advantages from their AI usage, “such benefits are dependent on IT teams having the tools to address the control and visibility challenges they face,” the publication reads.For more information about the use of unapproved AI tools, an issue also known as “shadow AI,” check out:“Do You Think You Have No AI Exposures? Think Again” (Tenable)“Shadow AI poses new generation of threats to enterprise IT” (TechTarget)“10 ways to prevent shadow AI disaster” (CIO)“Never Trust User Inputs -- And AI Isn't an Exception: A Security-First Approach” (Tenable)“Shadow AI in the ‘dark corners’ of work is becoming a big problem for companies” (CNBC)VIDEOShadow AI Risks in Your Company 4 - NCSC explains nuances of multi-factor authenticationMulti-factor authentication (MFA) comes in a variety of flavors, and understanding the differences is critical for choosing the right option for each use case in your organization.To help cybersecurity teams better understand the different MFA types and their pluses and minuses, the U.K. National Cyber Security Centre (NCSC) has updated its MFA guidance.“The new guidance explains the benefits that come with strong authentication, while also minimising the friction that some users associate with MFA,” reads an NCSC blog. In other words, what type of MFA method to use depends on people’s roles, how they work, the devices they use, the applications or services they’re accessing and so on.Topics covered include:Recommended types of MFA, such as FIDO2 credentials, app-based and hardware-based code generators and message-based methodsThe importance of using strong MFA to secure users’ access to sensitive dataThe role of trusted devices in boosting and simplifying MFABad practices that weaken MFA’s effectiveness, such as:Retaining weaker, password-only authentication protocols for legacy servicesExcluding certain accounts from MFA requirements because their users, usually high-ranking officials, find MFA inconvenientTo get more details, read:The NCSC blog “Not all types of MFA are created equal”The NCSC guide “Multi-factor authentication for your corporate online services”For more information about MFA:“Multifactor Authentication Cheat Sheet” (OWASP)“Deploying Multi Factor Authentication – The What, How, and Why” (SANS Institute)“How MFA gets hacked — and strategies to prevent it” (CSO)“How Multifactor Authentication Supports Growth for Businesses Focused on Zero Trust” (BizTech)“What is multi-factor authentication?” (TechTarget)5 - U.S. gov’t outlines AI strategy, ties it to national security The White House has laid out its expectations for how the federal government ought to promote the development of AI in order to safeguard U.S. national security.In the country’s first-ever National Security Memorandum (NSM) on AI, the Biden administration said the federal government must accomplish the following:Ensure the U.S. is the leader in the development of safe, secure and trustworthy AILeverage advanced AI technologies to boost national securityAdvance global AI consensus and governance“The NSM’s fundamental premise is that advances at the frontier of AI will have significant implications for national security and foreign policy in the near future,” reads a White House statement. The NSM’s directives to federal agencies include:Help improve the security of chips and support the development of powerful supercomputers to be used by AI systems.Help AI developers protect their work against foreign spies by providing them with cybersecurity and counterintelligence information.Collaborate with international partners to create a governance framework for using AI in a way that is ethical, responsible and respects human rights. The White House also published a complementary document titled “Framework To Advance AI Governance and Risk Management in National Security,” which adds implementation details and guidance for the NSM.6 - State CISOs on the frontlines of AI securityAs the cybersecurity risks and benefits of AI multiply, most U.S. state CISOs find themselves at the center of their governments' efforts to craft AI security strategies and policies.That’s according to the “2024 Deloitte-NASCIO Cybersecurity Study,” which surveyed CISOs from all 50 states and the District of Columbia.Specifically, 88% of state CISOs reported being involved in the development of a generative AI strategy, while 96% are involved with creating a generative AI security policy.However, their involvement in AI cybersecurity matters isn’t necessarily making them optimistic about their states’ ability to fend off AI-boosted attacks.None said they feel “extremely confident” that their state can prevent AI-boosted attacks, while only 10% reported feeling “very confident.” The majority (43%) said they feel “somewhat confident” while the rest said they are either “not very confident” or “not confident at all.” Naturally, most state CISOs see AI-enabled cyberthreats as significant, with 71% categorizing them as either “very high threat” (18%) or “somewhat high threat” (53%).At the same time, state CISOs see the potential for AI to help their cybersecurity efforts, as 41% are already using generative AI for cybersecurity, and another 43% have plans to do so by mid-2025.Other findings from the "2024 Deloitte-NASCIO Cybersecurity Study" include:4 in 10 state CISOs feel their budget is insufficient.Almost half of respondents rank cybersecurity staffing as one of the top challenges.In the past two years, 23 states have hired new CISOs, as the median tenure of a state CISO has dropped to 23 months, down from 30 months in 2022.More state CISOs are taking on privacy protection duties — 86% are responsible for privacy protection, up from 60% two years ago.For more information about CISO trends:“What’s important to CISOs in 2024” (PwC)“The CISO’s Tightrope: Balancing Security, Business, and Legal Risks in 2024” (The National CIO Review)“State of CISO Leadership: 2024” (SC World)“4 Trends That Will Define the CISO's Role in 2024” (SANS Institute) Full Article
ics SpotOn London 2013: Altmetrics – The Opportunities and the Challenges By www.nature.com Published On :: Tue, 05 Nov 2013 13:52:42 +0000 Marie Boran is a PhD candidate at the INSIGHT Centre for Data Analytics, the National Full Article Featured Guest Posts Policy SpotOn London (#SoLo) #solo13alt
ics Bulletin on food price dynamics, inflation and the food security situation in Sudan: November-December 2022 [in Arabic] By www.ifpri.org Published On :: Tue, 07 Feb 2023 5:05:01 EST موجز: Full Article
ics Quarterly bulletin on food price dynamics, inflation, and the food security situation in Sudan: 2021Q1- 2022Q4 [in Arabic] By www.ifpri.org Published On :: Fri, 14 Apr 2023 12:29:04 EDT وجز : Full Article
ics Moana : the story of the movie in comics / manuscript adaptation, Alesandro Ferrari ; layouts, Alberto Zanon, Giada Perissinotto ; pencil/inking, Veronica Di Lorenzo, Luca Bertelè ; colors, Massimo Rocca [and four others]. By library.gcpl.lib.oh.us Published On :: "Sail the Pacific Islands in search of destiny and the demigod Maui in this retelling of Disney Moana. Moana is a spirited teenager who loves the ocean, yet she is forbidden to travel beyond the reef that surrounds her island home of Motunui. But she feels called to something more, and wants to discover who she was meant to be. When darkness begins to consume the island, and nature is out of balance, Moana knows the solution lies beyond the safety of the reef. Following the messages of her ancestors, and with encouragement from the ocean itself, Moana sails into the open sea to find the demigod Maui and right a wrong from his past. Together they face rough waters, monstrous creatures, and the unknown, in a mission to stop the darkness from spreading, and restore life to the islands! Become a master wayfinder in this action-packed story as Moana's love for the sea turns her into a hero among her people, the gods, and the ocean." -- Provided by publisher Full Article
ics Why irrational politics appeals : understanding the allure of Trump / Mari Fitzduff, editor. By library.gcpl.lib.oh.us Published On :: Full Article
ics Michigan Computer Graphics - General Meeting (November 13, 2024 6:00pm) By events.umich.edu Published On :: Tue, 03 Sep 2024 09:32:06 -0400 Event Begins: Wednesday, November 13, 2024 6:00pm Location: Electrical Engineering and Computer Science Building Organized By: Michigan Computer Graphics At Michigan Computer Graphics (MCG), our goal is to offer all interested campus members a unique platform to explore, learn, discuss, and engage with the various disciplines of computer graphics (CG). You'll have the opportunity to collaborate on exciting projects, develop creative skills, and expand your network within the industry and beyond. This is MCG's weekly general meeting. Join us for a variety of content and events, including introductory presentations, hands-on projects, and guest speakers! https://michigancg.org/ Full Article Workshop / Seminar
ics DCMB / CCMB Weekly Seminar featuring Karen Miga, PhD (UC Santa Cruz Genomics Institute) (November 13, 2024 4:00pm) By events.umich.edu Published On :: Mon, 04 Nov 2024 15:18:54 -0500 Event Begins: Wednesday, November 13, 2024 4:00pm Location: Palmer Commons Organized By: DCMB Seminar Series Abstract: The initial Human Genome Project was a landmark achievement, serving as an essential resource for basic and clinical science, as well as for understanding human history, for over two decades. However, it needs an upgrade due to missing data, inaccurately assembled regions, and its inability to fully represent and identify sequence variants equitably. A single reference map, regardless of its completeness, cannot encapsulate the variation across the human population, leading to biases and ultimately inequity in genomic studies. Recognizing this limitation, the new initiative known as the Human Pangenome Project aims to deliver hundreds of highly accurate and complete genomes. This effort intends to define all bases of each chromosome from telomere to telomere (T2T), ensuring a broader representation of common variants across the human species. Achieving these goals will require the rise of new tools and technology standards for complete genome assemblies and pangenomics, which will have broad and lasting impact on genomic research. Short bio: Throughout her career, she has developed innovative computational and experimental approaches to advance understanding of centromeric and pericentromeric DNAs. She works at the forefront of genome technologies as part of the T2T and Pangenome initiative to construct genetic and epigenetic maps to expand our understanding of their structure and function. As a group leader, she prioritizes fostering a creative and scientifically rigorous environment that supports inclusivity and diversity within our scientific team. She also prioritizes training that operates at the intersection of science, justice, and equity. Full Article Lecture / Discussion
ics Special Physics Department Event (November 13, 2024 3:00pm) By events.umich.edu Published On :: Fri, 08 Nov 2024 08:18:07 -0500 Event Begins: Wednesday, November 13, 2024 3:00pm Location: West Hall Organized By: Department of Physics TBA Full Article Presentation
ics Learning Seminar in Algebraic Combinatorics: Poincare duality algebras, the Kahler package, and volume polynomials (November 13, 2024 3:00pm) By events.umich.edu Published On :: Sun, 10 Nov 2024 23:52:11 -0500 Event Begins: Wednesday, November 13, 2024 3:00pm Location: East Hall Organized By: Learning Seminar in Algebraic Combinatorics - Department of Mathematics By what has been shown in previous talks, we have seen that we can show coefficients of the characteristic polynomial of a realizable matroid can be realized via specific computations in the Chow ring of its wonderful compactification. In this talk, we will introduce the notion of Poincare duality algebras, which are graded algebras with a degree function giving an isomorphism from the top degree to the base field that induces a non-degenerate pairing between complementary degrees of the algebra. Furthermore, we will introduce a notion of hard Lefschetz and Hodge-Riemann relations for such algebras. When a Poincare duality algebra satisfies a certain version of these properties, we can show that the log-concavity of its "volume polynomial" is equivalent to the eigenvalues of a symmetric form on the algebra arising from the Hodge-Riemann relations. Because the Hodge-Riemann relations in appropriate degree imply the log-concavity of the coefficients of the characteristic polynomial of the matroid, this framework gives us a program to establish the log-concavity result. Throughout this talk, I will attempt to provide intuition from the case of the Chow rings of smooth projective varieties. Full Article Workshop / Seminar
ics Metrics Matter: Assessing Progress towards Women’s Empowerment in Agriculture and Beyond By www.ifpri.org Published On :: Thu, 08 Aug 2024 16:33:42 +0000 Metrics Matter: Assessing Progress towards Women’s Empowerment in Agriculture and Beyond The Philippine Institute for Development Studies (PIDS), in partnership with the International Food Policy Research Institute (IFPRI), will hold a public seminar featuring three studies on women empowerment on August 14, 2024, 9:00 AM to 11:30 AM (Asia/Manila) / August 13, 2024, 9:00 PM to 11:30 PM (US/Eastern) at the PIDS Conference Hall and via Zoom. […] The post Metrics Matter: Assessing Progress towards Women’s Empowerment in Agriculture and Beyond appeared first on IFPRI. Full Article
ics Integrated Proteomics and Metabolomics Reveal Altered Metabolic Regulation of Xanthobacter autotrophicus under Electrochemical Water-Splitting Conditions - ACS Publications By news.google.com Published On :: Fri, 26 Jul 2024 07:00:00 GMT Integrated Proteomics and Metabolomics Reveal Altered Metabolic Regulation of Xanthobacter autotrophicus under Electrochemical Water-Splitting Conditions ACS Publications Full Article
ics Use of Proteomics for Dietary Reconstruction: A Case Study Using Animal Teeth from Ancient Mesopotamia - ACS Publications By news.google.com Published On :: Thu, 15 Aug 2024 07:00:00 GMT Use of Proteomics for Dietary Reconstruction: A Case Study Using Animal Teeth from Ancient Mesopotamia ACS Publications Full Article
ics Environmental proteomics as a useful methodology for early-stage detection of stress in anammox engineered systems - ScienceDirect.com By news.google.com Published On :: Tue, 20 Feb 2024 08:00:00 GMT Environmental proteomics as a useful methodology for early-stage detection of stress in anammox engineered systems ScienceDirect.com Full Article
ics Integrated transcriptomics and proteomics analysis reveals muscle metabolism effects of dietary Ulva lactuca and ulvan lyase supplementation in weaned piglets - Nature.com By news.google.com Published On :: Mon, 26 Feb 2024 08:00:00 GMT Integrated transcriptomics and proteomics analysis reveals muscle metabolism effects of dietary Ulva lactuca and ulvan lyase supplementation in weaned piglets Nature.com Full Article