vis ETSI advisor at the Stakeholder Cybersecurity Certification Group launched by the EC By www.etsi.org Published On :: Thu, 28 Apr 2022 06:21:35 GMT ETSI advisor at the Stakeholder Cybersecurity Certification Group launched by the EC Sophia Antipolis, 24 June 2020 ETSI is pleased to announce that it has been invited to be part of the newly formed Stakeholder Cybersecurity Certification Group. The kick-off meeting took place today. Together with the European Cybersecurity Certification Group (ECCG), composed of Member States’ representatives, the newly established Stakeholder Cybersecurity Certification Group (SCCG) will advise the Commission on strategic issues regarding the European cybersecurity certification framework. It will also assist the Commission in the preparation of the Union rolling work programme, which sets the priorities for the definition of schemes within the EU cybersecurity certification framework. ETSI will bring in its long-standing experience in cybersecurity, with standards developed both for enterprises and consumers within several of its technical bodies, including the Technical Committee CYBER. Read More... Full Article
vis Designing tomorrow’s world: ETSI unveils strategy in line with its ambitious vision By www.etsi.org Published On :: Thu, 17 Dec 2020 13:13:55 GMT ‘Designing tomorrow’s world’: ETSI unveils strategy in line with its ambitious vision Sophia Antipolis, 3 December 2020 At the meeting of its General Assembly yesterday ETSI has validated a new strategy, the result of an intensive development process over the last months. Titled ‘Designing tomorrow’s world’, the strategy has been shaped by ETSI’s diverse global community, drawing on the expertise and experience of more than 900 member organizations that include multinational and smaller companies, start-ups, research organizations and governmental institutions. Read More... Full Article
vis Open Source MANO Release NINE fulfils ETSI's zero-touch automation vision, ready for MEC and O-RAN use cases By www.etsi.org Published On :: Thu, 28 Apr 2022 14:01:08 GMT Open Source MANO Release NINE fulfils ETSI's zero-touch automation vision, ready for MEC and O-RAN use cases Sophia Antipolis, 18 December 2020 ETSI is pleased to announce the launch of OSM Release NINE today. With an array of new features, this Release completes the alignment process with ETSI NFV specifications, culminating in native adoption of ETSI GS NFV-SOL006 for network functions and service modelling. Standardizing the onboarding process for VNFs into OSM fosters interoperability and boosts the growth of OSM’s VNF ecosystem. Release NINE coincides with the announcement of a new production deployment, confirming OSM as the most comprehensive open-source NFV orchestrator and a key enabler for zero-touch end-to-end network and service automation. Read More... Full Article
vis ‘Designing tomorrow’s world’: ETSI introduces its new strategy in line with its ambitious vision By www.etsi.org Published On :: Fri, 07 May 2021 12:23:36 GMT ‘Designing tomorrow’s world’: ETSI introduces its new strategy in line with its ambitious vision Sophia Antipolis, 5 May 2021 Today ETSI is pleased to introduce its new strategy, the result of an intensive development process over the last months, validated at the ETSI General Assembly in December 2020. Titled ‘Designing tomorrow’s world’, the strategy builds on a recognition of the global importance of Information and Communication Technology (ICT) for a sustainable development and to support the digital transformation of society. Read More... Full Article
vis Aiming high: ETSI Conference on Non-Terrestrial Networks underlines critical role of NTN in realizing tomorrow’s global 6G vision By www.etsi.org Published On :: Tue, 16 Apr 2024 08:12:24 GMT Sophia Antipolis, 15 April 2024 This year’s first ETSI Conference on Non-Terrestrial Networks has stressed the importance of technical standardization in delivering a fully connected planet via NTN, a key element of tomorrow’s global 6G networks. Held from 3-4 April 2024 at ETSI’s Sophia Antipolis headquarters, the event was co-organized with the European Space Agency (ESA), the 6G Smart Networks and Services Industry Association (6G-IA) and the Smart Networks and Services Joint Undertaking (SNS JU). Titled ‘Non-Terrestrial Networks, a Native Component of 6G’, the 2-day conference attracted over 200 participants from 25 countries, including experts in standardization and research as well as industrial representation from the mobile, satellite and wider space industries. Delegates shared perspectives on NTN use cases, candidate technology solutions, current research status and standardization roadmaps. Day one sessions focused on the opportunities and challenges of integrating terrestrial and non-terrestrial networks within tomorrow’s global communications landscape. The second day afforded a deep dive into numerous cutting-edge NTN and 6G research & development initiatives in Europe and around the world. Read More... Full Article
vis OSC Staff Notice 11-737 (Revised) – Securities Advisory Committee – Vacancies By www.osc.ca Published On :: Thu, 17 Oct 2024 13:10:29 GMT The Securities Advisory Committee (“SAC”) is a committee of industry experts established by the Commission to advise it and its staff on a variety of matters including policy initiatives and capital markets trends. Full Article
vis Cybersecurity Snapshot: Apply Zero Trust to Critical Infrastructure’s OT/ICS, CSA Advises, as Five Eyes Spotlight Tech Startups’ Security By www.tenable.com Published On :: Fri, 01 Nov 2024 09:00:00 -0400 Should critical infrastructure orgs boost OT/ICS systems’ security with zero trust? Absolutely, the CSA says. Meanwhile, the Five Eyes countries offer cyber advice to tech startups. Plus, a survey finds “shadow AI” weakening data governance. And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy.Dive into six things that are top of mind for the week ending Nov. 1.1 - Securing OT/ICS in critical infrastructure with zero trustAs their operational technology (OT) computing environments become more digitized, converged with IT systems and cloud-based, critical infrastructure organizations should beef up their cybersecurity by adopting zero trust principles.That’s the key message of the Cloud Security Alliance’s “Zero Trust Guidance for Critical Infrastructure,” which focuses on applying zero trust methods to OT and industrial control system (ICS) systems.While OT/ICS environments were historically air gapped, that’s rarely the case anymore. “Modern systems are often interconnected via embedded wireless access, cloud and other internet-connected services, and software-as-a-service (SaaS) applications,” reads the 64-page white paper, which was published this week.The CSA hopes the document will help cybersecurity teams and OT/ICS operators enhance the way they communicate and collaborate. Among the topics covered are:Critical infrastructure’s unique threat vectorsThe convergence of IT/OT with digital transformationArchitecture and technology differences between OT and ITThe guide also outlines this five-step process for implementing zero trust in OT/ICS environments:Define the surface to be protectedMap operational flowsBuild a zero trust architectureDraft a zero trust policyMonitor and maintain the environmentA zero trust strategy boosts the security of critical OT/ICS systems by helping teams “keep pace with rapid technological advancements and the evolving threat landscape,” Jennifer Minella, the paper’s lead author, said in a statement.To get more details, read:The report’s announcement “New Paper from Cloud Security Alliance Examines Considerations and Application of Zero Trust Principles for Critical Infrastructure”The full report “Zero Trust Guidance for Critical Infrastructure”A complementary slide presentationFor more information about OT systems cybersecurity, check out these Tenable resources: “What is operational technology (OT)?” (guide)“Discover, Measure, and Minimize the Risk Posed by Your Interconnected IT/OT/IoT Environments” (on-demand webinar)“How To Secure All of Your Assets - IT, OT and IoT - With an Exposure Management Platform” (blog)“Blackbox to blueprint: The security leader’s guidebook to managing OT and IT risk” (white paper)“Tenable Cloud Risk Report 2024” (white paper)2 - Five Eyes publish cyber guidance for tech startupsStartup tech companies can be attractive targets for hackers, especially if they have weak cybersecurity and valuable intellectual property (IP).To help startups prevent cyberattacks, the Five Eyes countries this week published cybersecurity guides tailored for these companies and their investors.“This guidance is designed to help tech startups protect their innovation, reputation, and growth, while also helping tech investors fortify their portfolio companies against security risks," Mike Casey, U.S. National Counterintelligence and Security Center Director, said in a statement.These are the top five cybersecurity recommendations from Australia, Canada, New Zealand, the U.S. and the U.K. for tech startups:Be aware of threat vectors, including malicious insiders, insecure IT and supply chain risk.Identify your most critical assets and conduct a risk assessment to pinpoint vulnerabilities.Build security into your products by managing intellectual assets and IP; monitoring who has access to sensitive information; and ensuring this information’s protection.Conduct due diligence when choosing partners and make sure they’re equipped to protect the data you share with them.Before you expand abroad, prepare and become informed about these new markets by, for example, understanding local laws in areas such as IP protection and data protection. “Sophisticated nation-state adversaries, like China, are working hard to steal the intellectual property held by some of our countries’ most innovative and exciting startups,” Ken McCallum, Director General of the U.K.’s MI5, said in a statement.To get more details, check out these Five Eyes’ cybersecurity resources for tech startups:The announcement “Five Eyes Launch Shared Security Advice Campaign for Tech Startups”The main guides: “Secure Innovation: Security Advice for Emerging Technology Companies”“Secure Innovation: Security Advice for Emerging Technology Investors”These complementary documents:“Secure Innovation: Scenarios and Mitigations”“Secure Innovation: Travel Security Guidance”“Secure Innovation: Due Diligence Guidance”“Secure Innovation: Companies Summary”3 - Survey: Unapproved AI use impacting data governanceEmployees’ use of unauthorized AI tools is creating compliance issues in a majority of organizations. Specifically, it makes it harder to control data governance and compliance, according to almost 60% of organizations surveyed by market researcher Vanson Bourne.“Amid all the investment and adoption enthusiasm, many organisations are struggling for control and visibility over its use,” reads the firm’s “AI Barometer: October 2024” publication. Vanson Bourne polls 100 IT and business executives each month about their AI investment plans.To what extent do you think the unsanctioned use of AI tools is impacting your organisation's ability to maintain control over data governance and compliance?(Source: Vanson Bourne’s “AI Barometer: October 2024”)Close to half of organizations surveyed (44%) believe that at least 10% of their employees are using unapproved AI tools.On a related front, organizations are also grappling with the issue of software vendors that unilaterally and silently add AI features to their products, especially to their SaaS applications.While surveyed organizations say they’re reaping advantages from their AI usage, “such benefits are dependent on IT teams having the tools to address the control and visibility challenges they face,” the publication reads.For more information about the use of unapproved AI tools, an issue also known as “shadow AI,” check out:“Do You Think You Have No AI Exposures? Think Again” (Tenable)“Shadow AI poses new generation of threats to enterprise IT” (TechTarget)“10 ways to prevent shadow AI disaster” (CIO)“Never Trust User Inputs -- And AI Isn't an Exception: A Security-First Approach” (Tenable)“Shadow AI in the ‘dark corners’ of work is becoming a big problem for companies” (CNBC)VIDEOShadow AI Risks in Your Company 4 - NCSC explains nuances of multi-factor authenticationMulti-factor authentication (MFA) comes in a variety of flavors, and understanding the differences is critical for choosing the right option for each use case in your organization.To help cybersecurity teams better understand the different MFA types and their pluses and minuses, the U.K. National Cyber Security Centre (NCSC) has updated its MFA guidance.“The new guidance explains the benefits that come with strong authentication, while also minimising the friction that some users associate with MFA,” reads an NCSC blog. In other words, what type of MFA method to use depends on people’s roles, how they work, the devices they use, the applications or services they’re accessing and so on.Topics covered include:Recommended types of MFA, such as FIDO2 credentials, app-based and hardware-based code generators and message-based methodsThe importance of using strong MFA to secure users’ access to sensitive dataThe role of trusted devices in boosting and simplifying MFABad practices that weaken MFA’s effectiveness, such as:Retaining weaker, password-only authentication protocols for legacy servicesExcluding certain accounts from MFA requirements because their users, usually high-ranking officials, find MFA inconvenientTo get more details, read:The NCSC blog “Not all types of MFA are created equal”The NCSC guide “Multi-factor authentication for your corporate online services”For more information about MFA:“Multifactor Authentication Cheat Sheet” (OWASP)“Deploying Multi Factor Authentication – The What, How, and Why” (SANS Institute)“How MFA gets hacked — and strategies to prevent it” (CSO)“How Multifactor Authentication Supports Growth for Businesses Focused on Zero Trust” (BizTech)“What is multi-factor authentication?” (TechTarget)5 - U.S. gov’t outlines AI strategy, ties it to national security The White House has laid out its expectations for how the federal government ought to promote the development of AI in order to safeguard U.S. national security.In the country’s first-ever National Security Memorandum (NSM) on AI, the Biden administration said the federal government must accomplish the following:Ensure the U.S. is the leader in the development of safe, secure and trustworthy AILeverage advanced AI technologies to boost national securityAdvance global AI consensus and governance“The NSM’s fundamental premise is that advances at the frontier of AI will have significant implications for national security and foreign policy in the near future,” reads a White House statement. The NSM’s directives to federal agencies include:Help improve the security of chips and support the development of powerful supercomputers to be used by AI systems.Help AI developers protect their work against foreign spies by providing them with cybersecurity and counterintelligence information.Collaborate with international partners to create a governance framework for using AI in a way that is ethical, responsible and respects human rights. The White House also published a complementary document titled “Framework To Advance AI Governance and Risk Management in National Security,” which adds implementation details and guidance for the NSM.6 - State CISOs on the frontlines of AI securityAs the cybersecurity risks and benefits of AI multiply, most U.S. state CISOs find themselves at the center of their governments' efforts to craft AI security strategies and policies.That’s according to the “2024 Deloitte-NASCIO Cybersecurity Study,” which surveyed CISOs from all 50 states and the District of Columbia.Specifically, 88% of state CISOs reported being involved in the development of a generative AI strategy, while 96% are involved with creating a generative AI security policy.However, their involvement in AI cybersecurity matters isn’t necessarily making them optimistic about their states’ ability to fend off AI-boosted attacks.None said they feel “extremely confident” that their state can prevent AI-boosted attacks, while only 10% reported feeling “very confident.” The majority (43%) said they feel “somewhat confident” while the rest said they are either “not very confident” or “not confident at all.” Naturally, most state CISOs see AI-enabled cyberthreats as significant, with 71% categorizing them as either “very high threat” (18%) or “somewhat high threat” (53%).At the same time, state CISOs see the potential for AI to help their cybersecurity efforts, as 41% are already using generative AI for cybersecurity, and another 43% have plans to do so by mid-2025.Other findings from the "2024 Deloitte-NASCIO Cybersecurity Study" include:4 in 10 state CISOs feel their budget is insufficient.Almost half of respondents rank cybersecurity staffing as one of the top challenges.In the past two years, 23 states have hired new CISOs, as the median tenure of a state CISO has dropped to 23 months, down from 30 months in 2022.More state CISOs are taking on privacy protection duties — 86% are responsible for privacy protection, up from 60% two years ago.For more information about CISO trends:“What’s important to CISOs in 2024” (PwC)“The CISO’s Tightrope: Balancing Security, Business, and Legal Risks in 2024” (The National CIO Review)“State of CISO Leadership: 2024” (SC World)“4 Trends That Will Define the CISO's Role in 2024” (SANS Institute) Full Article
vis OSC seeks applications for the Registrant Advisory Committee By www.osc.ca Published On :: Thu, 10 Oct 2024 15:29:30 GMT TORONTO – The Ontario Securities Commission (OSC) is inviting applications for membership on its Registrant Advisory Committee (RAC or the Committee). Full Article
vis Capital Markets Tribunal seeks applications for the Securities Proceedings Advisory Committee By www.osc.ca Published On :: Tue, 22 Oct 2024 13:28:40 GMT TORONTO – The Capital Markets Tribunal is seeking applications for membership to the Securities Proceedings Advisory Committee (SPAC). Full Article
vis SpotOn London 2012 Storify: Incentivising Open Access and Open Science: Carrot and Stick By www.nature.com Published On :: Tue, 20 Nov 2012 13:12:21 +0000 Here is a Storify round up of the SpotOn London session: Incentivising Open Access and Open Full Article Featured Policy SpotOn London (#SoLo) Storifys #solo12open
vis The Adventure zone : the crystal kingdom / based on the podcast by Griffin McElroy, Clint McElroy, Travis McElroy, Justin McElroy ; adaptation by Clint McElroy, Carey Pietsch ; art by Carey Pietsch. By library.gcpl.lib.oh.us Published On :: "A desperate call for help interrupts holiday celebrations at the Bureau of Balance, and sends Taako, Magnus and Merle on a high-stakes mission to find and reclaim a fourth deadly relic: a powerful transmutation stone, hidden somewhere in the depths of a floating arcane laboratory that's home to the Doctors Maureen and Lucas Miller. An unknown menace has seized control of the stone, and is using it to transform the lab into a virulent pink crystal that spreads to everything it touches. It's only a matter of time before this sparkling disaster crash-lands, but in order to find the stone and save the whole planet from being King Midased, our heroes will have to fight their way through a gauntlet of rowdy robots and crystal golems, decide whether they can trust the evasive Lucas Miller, and solve the mystery of what— or who— has put them all in peril, before there's no world left to save." -- Provided by publisher Full Article
vis Investor Alert: Advisor Impersonation Schemes By www.osc.ca Published On :: Wed, 24 May 2023 12:48:51 GMT TORONTO – New Self-Regulatory Organization of Canada (New SRO) and the Canadian Securities Administrators (CSA) are warning Canadian investors not to be fooled by fraudsters impersonating real investment advisors. Full Article
vis Spider-Woman. Vol. 2, King in black / writer, Karla Pacheco ; artist, Pere Pérez ; color artist, Frank D'Armata ; letterer, VC's Travis Lanham. By library.gcpl.lib.oh.us Published On :: "Collects Spider-Woman (2020) #6-10. Road trip— to space! After learning some startling secrets about her family, Jessica Drew goes on a mission to find the one person who might know more: the High Evolutionary! But she's going to need her BFF by her side— and that means it's Captain Marvel team-up time! Before long though, those closest to Spider-Woman will abandon her. Only one person will come to her aid: Octavia Vermis! Octavia has a cure for Jessica, and the prescription is crime! Is Jess willing to resort to theft to gather all the tools needed to fix what's wrong? In the shadow of Knull's invasion, Spider-Woman must put everything on the line— and then cross it! Even if Jess can find the cure for what ails her, will she still have a life worth saving?" -- Page [4] of cover. Full Article
vis Yo-kai watch. 17 / story and art by Noriyuki Konishi ; original concept and supervised by Level-5 Inc. ; translation, Tetsuichiro Miyaki ; English adaptation, Aubrey Sitterson ; lettering, John Hunt. By library.gcpl.lib.oh.us Published On :: "Nate Adams is just an average kid until the mysterious Whisper gives him the Yo-kai Watch. Now he can see what others cannot: Yo-kai of all shapes and forms! … A mysterious door opens, causing Nate to run into weird and wacky Yo-kai from the past, present and future. Watch as they participate in a battle royale to decide which Yo-kai is the strongest!" -- Provided by publisher. Full Article
vis Tenable Research Advisories: Urgent Action By www.tenable.com Published On :: Mon, 20 Nov 2023 09:00:00 -0500 Tenable Research delivers world class exposure intelligence, data science insights, zero day research and security advisories. Our Security Response Team (SRT) in Tenable Research tracks threat and vulnerability intelligence feeds to make sure our research teams can deliver sensor coverage to our products as quickly as possible. The SRT also works to dig into technical details and author white papers, blogs, and additional communications to ensure stakeholders are fully informed of the latest cyber risks and threats. The SRT provides breakdowns for the latest critical vulnerabilities on the Tenable blog.When security events rise to the level of taking immediate action, Tenable - leveraging SRT intelligence - notifies customers proactively to provide exposure information, current threat details and how to use Tenable products and capabilities to accelerate remediation.This dashboard contains indicator style components to highlight any vulnerabilities related to the Tenable Research Advisories where Tenable issues customer guidance that immediate remediation was of paramount importance to all affected organizations. Tenable recommends addressing missing patches as identified in the dashboard components. The dashboard and its components are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The dashboard can be easily located in the Tenable.sc Feed under the category Security Industry Trends.The dashboard requirements are: Tenable.sc 6.2.0Nessus 10.6.1The following components are included in this dashboard are: Research Advisories - Citrix NetScaler ADC and NetScaler Gateway: In August 2023, Mandiant identified a zero-day exploitation impacting NetScaler ADC and NetScaler Gateway appliances. When NetScaler ADC or NetScaler Gateway is configured as a gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or as an AAA virtual server, an unauthenticated attacker could exploit the device in order to hijack an existing authenticated session. Depending on the permissions of the account they have hijacked, this could allow the attacker to gain additional access within a target environment and collect other account credentials. Successful exploitation allows the attacker to bypass multi factor authentication (MFA) requirements.Research Advisories - curl Heap Overflow and Cookie Injection: On October 3, an open-source developer and maintainer of curl, took to X (formerly Twitter) to announce that a new high severity CVE would be fixed in curl 8.4.0. The developer noted that the release would be ahead of schedule and released on October 11, indicating in a reply to the twitter thread that this is 'the worst security problem found in curl in a long time.' Research Advisories - MOVEit: The CL0P Ransomware Group, also known as TA505, has exploited zero-day vulnerabilities across a series of file transfer solutions since December 2020. File transfer solutions often contain sensitive information from a variety of organizations. This stolen information is used to extort victims to pay ransom demands. In 2023, CL0P claimed credit for the exploitation of vulnerabilities in both Fortra’s GoAnywhere Managed File Transfer (MFT) and Progress Software’s MOVEit Transfer solutions. Research Advisories - log4shell: This matrix alerts organizations to potential concerns regarding the Log4j vulnerability. Displayed are the vulnerabilities that are directly associated with the log4shell CVEs (CVE-2021-44228, CVE-2021-44832, CVE-2021-45046, CVE-2021-4104, and CVE-2021-45105) and Log4j installations. Research Advisories - CISA Alerts AA22-011A and AA22-047A: On November 3rd, 2021, Cybersecurity and Infrastructure Security Agency (CISA) issued Binding Operational Directive (BOD) 22-01, and on Jan 11, 2022 CISA issued an alert (AA22-011A) warning of increased risk to U.S. critical infrastructure. A total of 18 CVEs can be associated with this alert. Hosts and Vulnerabilities identified and mitigated are displayed using the referenced CVE. Research Advisories - PrintNightmare: On July 1, Microsoft released an advisory for CVE-2021-34527. This advisory was released in response to public reports about a proof-of-concept (PoC) exploit for CVE-2021-1675, a similar vulnerability in the Windows Print Spooler. To help clear up confusion about the vulnerability, Microsoft updated its advisory for CVE-2021-1675 to clarify that it is similar but distinct from CVE-2021-34527. On July 6, Microsoft updated its advisory to announce the availability of out-of-band patches for CVE-2021-34527, a critical vulnerability in its Windows Print Spooler that researchers are calling PrintNightmare. This remote code execution (RCE) vulnerability affects all versions of Microsoft Windows. Research Advisories - MS Exchange ProxyLogon: On March 2, 2021 Microsoft released several critical security updates for zero-day Microsoft Exchange Server vulnerabilities, and reported that the exploits are actively being exploited by threat actors. Within a single week thousands of organizations world-wide have fallen victim. Tenable released several plugins for Exchange Server 2010, 2013, 2016 and 2019, which can be used to determine which Exchange Server systems are vulnerable in your environment. Full Article
vis RP Investment Advisors LP and The Funds By www.osc.ca Published On :: Thu, 07 Nov 2024 15:28:52 GMT HeadnoteNational Policy 11-203 Process for Exemptive Relief Applications in Multiple Jurisdictions -- relief granted revoking and replacing existing short selling, cash cover and custodial relief to extend existing relief beyond a "government security" as defined in NI 81-102 to also inc Full Article
vis There's a mystery there : the primal vision of Maurice Sendak / Jonathan Cott. By library.gcpl.lib.oh.us Published On :: "An extraordinary, path-breaking, and penetrating book on the life and work and creative inspirations of the great children's book genius Maurice Sendak, who since his death in 2012 has only grown in his stature and recognition as a major American artist, period. Polymath and master interviewer Jonathan Cott first interviewed Maurice Sendak in 1976 for Rolling Stone, just at the time when Outside Over There, the concluding and by far the strangest volume of a trilogy that began with Where The Wild Things Areand In the Night Kitchen, was gestating. Over the course of their wide-ranging and revelatory conversation about his life, work, and the fantasies and obsessions that drove his creative process, they focused on many of the themes and images that would appear in the new book five years later. Drawing on that interview, There's a Mystery There is a profound examination of the inner workings of a complicated genius's torments and inspirations that ranges over the entirety of his work and his formative life experiences, and uses Outside Over There, brilliantly and originally, as the key to understanding just what made this extravagantly talented man tick. To gain multiple perspectives on that intricate and multifaceted book, Cott also turns to four "companion guides": a Freudian analyst, a Jungian analyst, an art historian, and Sendak's great friend and admirer, the playwright Tony Kushner. The book is richly illustrated with examples from Sendak's work and other related images." -- Provided by publisher. Full Article
vis For Us, By Us: Envisioning a Kiki Methodology in Black Queer Storytelling (November 13, 2024 6:30pm) By events.umich.edu Published On :: Fri, 01 Nov 2024 17:15:24 -0400 Event Begins: Wednesday, November 13, 2024 6:30pm Location: Museum of Art Organized By: Spectrum Center Who are you? What is your story? How do you express yourself? The experiences of Black queer life are reflected in the ways we tell our stories. We will explore a kiki methodology grounded in ballroom culture and Black queer storytelling. Drawing from queer of color critique and narrative construction, kiki methodology engages in three components: Black queer meaning-making, Black queer storytelling, and Black queer artistic expression. Kiki methodology connects envisioning and centering words, feelings, and voices of the Black queer community in the form of storytelling in higher education. We will engage about what is needed to be in queer community and kinship through storytelling. ABOUT DR. HUTCHINGS Dr. Quortne R. Hutchings (they, them) is a first-generation college graduate, proud Ronald E. McNair scholar alum, and assistant professor of higher education at Northern Illinois University. Their research primarily focuses on Black gay, bisexual, queer, and non-binary undergraduate and graduate students’ academic and social experiences in higher education, minoritized student affairs professionals’ experiences in student and academic affairs, and supporting students, faculty, and staff navigating substance use and recovery. Their research has been published in the Journal of College Student Development, Departures in Critical Qualitative Research, Journal of Higher Education, and International Journal of Qualitative Studies in Education. TRANS AWARENESS MONTH Trans Awareness Month is presented by Spectrum Center, and events are presented by units across campus. Find more Trans Awareness Month events at spectrumcenter.umich.edu/trans-awareness-month Full Article Presentation
vis VIZ'D 2024: A Data Visualization Competition (November 13, 2024 6:00pm) By events.umich.edu Published On :: Wed, 13 Nov 2024 06:20:38 -0500 Event Begins: Wednesday, November 13, 2024 6:00pm Location: CCCB 3420 Organized By: Sessions @ Michigan Join the Quantitative Methods in the Social Sciences (QMSS) program for a night of making data fun and engaging! Sign up to compete on teams of 2-3 in 2 rounds of competition. Students in our audience will have an opportunity to vote on their favorite visuals from each round. We will have QMSS- and University of Michigan-themed prizes for participants and audience members as well as dinner on us! Full Article Workshop / Seminar
vis Visioning: Laying the Foundation for the Future (November 13, 2024 6:00pm) By events.umich.edu Published On :: Wed, 28 Aug 2024 10:12:08 -0400 Event Begins: Wednesday, November 13, 2024 6:00pm Location: Matthaei Botanical Gardens Organized By: Arts Initiative sara faraj will lead this workshop and guide participants in the process of setting intentions for the future through writing, painting, and planting. Participants will be given paper and writing utensils for the writing activity. Plants, pots, paint for pots, and soil will be provided for the planting activity. sara faraj (Master of Urban and Regional Planning (M.U.R.P.) '24) is one of three master’s degree-level residents chosen for the 2024 Creative Careers Residency at the Arts Initiative. She is interested in Photovoice as a participatory action research (PAR) methodology that empowers and activates positive change within us and, therefore, positive change in the world around us. RSVP needed: http://visioning.rsvpify.com Maximum number of participants: 15 Are you attending one of these workshops? You can submit your work for our Take Care Student Exhibition. More info and submission form here: https://artsinitiative.slideroom.com/#/login/program/79201 ••• The Arts Initiative, in partnership with Wolverine Wellness, is launching a series of free art-making workshops for the Take Care AY 2024-25 focus. These workshops are an opportunity to create art, brush up on dance techniques, and other artistic forms. No prior experience required. Led by local and regional artists, the workshops are open to the entire U-M and local community. All supplies necessary will be provided at the workshop. For questions or to request accessibility accommodations, please contact Félix Zamora-Gómez at felixzg@umich.edu. Full Article Workshop / Seminar
vis Residence Hall Pop-up Advising (November 13, 2024 5:00pm) By events.umich.edu Published On :: Fri, 08 Nov 2024 08:56:45 -0500 Event Begins: Wednesday, November 13, 2024 5:00pm Location: East Quadrangle Organized By: Newnan LSA Academic Advising Center Registration starts soon, and LSA Newnan advisors are coming to you! We'll be in residence halls discussing course planning for the winter term and answering any questions you may have. Join us from 5-8 on select nights. We're looking forward to seeing you! Full Article Other
vis Revisiting the Divide: A Dialogue Between Asian and Asian American Studies (November 13, 2024 12:00pm) By events.umich.edu Published On :: Mon, 11 Nov 2024 14:01:35 -0500 Event Begins: Wednesday, November 13, 2024 12:00pm Location: Rackham Graduate School (Horace H.) Organized By: Asian Languages and Cultures Upcoming DEI event, "Revisiting the Divide: A Dialogue Between Asian and Asian American Studies," this Wednesday, November 13th! This conversation will bring together scholars of Asian Studies and Asian American Studies to reflect on the academic divisions between these two fields. We kindly request that you RSVP at the QR code on the poster below or this link, as seating and food will be limited. Please join us for a light lunch and fruitful discussion from 12-1:30 PM in the Rackham West Conference Room. Full Article Lecture / Discussion
vis Pivotal: Confronting hunger and poverty in Nigeria (Africa Independence Television) By www.ifpri.org Published On :: Mon, 08 Jul 2024 16:23:56 +0000 Pivotal: Confronting hunger and poverty in Nigeria (Africa Independence Television) Nigeria’s current economic crisis continues to attract media attention. On 26 June 2024 Africa Independence Television (AIT) hosted a panel discussion on the television program “Pivotal” focused on confronting hunger and poverty. The panel, moderated by Nabila Usman, included Kwaw Andam, Country Program Leader, IFPRI-Nigeria, Andrew Mamudu, Country Director, Action Aid, and Abdullahi Mohammad, Associate, […] The post Pivotal: Confronting hunger and poverty in Nigeria (Africa Independence Television) appeared first on IFPRI. Full Article
vis Analysis and Visualization of Quantitative Proteomics Data Using FragPipe-Analyst - ACS Publications By news.google.com Published On :: Tue, 10 Sep 2024 07:00:00 GMT Analysis and Visualization of Quantitative Proteomics Data Using FragPipe-Analyst ACS Publications Full Article
vis Imputation of label-free quantitative mass spectrometry-based proteomics data using self-supervised deep learning - Nature.com By news.google.com Published On :: Wed, 26 Jun 2024 07:00:00 GMT Imputation of label-free quantitative mass spectrometry-based proteomics data using self-supervised deep learning Nature.com Full Article
vis CTA Seeking New Applications for ADA Advisory Committee By www.transitchicago.com Published On :: Tue, 08 Oct 2024 12:00:00 GMT In alignment with its ongoing commitment to bringing equity and inclusion to all aspects of its decision-making, the Chicago Transit Authority (CTA) announced today it will be seeking new applicants to join the agency’s Americans with Disabilities Act (ADA) Advisory Committee. Full Article
vis Elevator at Davis Temporarily Out-of-Service (Elevator Status) By www.transitchicago.com Published On :: (Sun, Nov 10 2024 8:53 AM to TBD) The Howard- and- Loop- bound platform elevator at Davis (Purple Line) is temporarily out-of-service. Full Article
vis Elevator at Davis Temporarily Out-of-Service (Elevator Status) By Published On :: Sun, 10 Nov 2024 08:53:02 GMT (Sun, Nov 10 2024 8:53 AM to TBD) The Howard- and- Loop- bound platform elevator at Davis (Purple Line) is temporarily out-of-service. Full Article
vis Financial advising while Black By www.npr.org Published On :: Fri, 28 Apr 2023 20:52:17 +0000 After a successful career in advertising, Erika Williams decided it was time for a change. She went back to school to get an MBA at the University of Chicago, and eventually, in 2012, she got a job at Wells Fargo as a financial advisor. It was the very job she wanted.Erika is Black–and being a Black financial advisor at a big bank is relatively uncommon. Banking was one of the last white collar industries to really hire Black employees. And when Erika gets to her office, she's barely situated before she starts to get a weird feeling. She feels like her coworkers are acting strangely around her."I was just met with a lot of stares. And then the stares just turned to just, I mean, they just pretty much ignored me. And that was my first day, and that was my second day. And it was really every day until I left."She wasn't sure whether to call her experience racism...until she learned that there were other Black employees at other Wells Fargo offices feeling the exact same way.On today's episode, Erika's journey through these halls of money and power. And why her story is not unique, but is just one piece of the larger puzzle.Help support Planet Money and get bonus episodes by subscribing to Planet Money+ in Apple Podcasts or at plus.npr.org/planetmoney.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article
vis 99 Percent Invisible: The White Castle System of Eating Houses By www.npr.org Published On :: Mon, 16 Sep 2024 07:00:00 +0000 Today we have a guest episode from 99 Percent Invisible.It is about White Castle, the burger chain. Even if you haven't visited, you have tasted its influence because, as we will learn in this episode, White Castle is really the proto-burger chain.Our friends at the excellent podcast 99 Percent Invisible bring us the origin story of White Castle and trace its influence on the business of fast food, and on American eating habits. The story is about one man who had an idea for a world where you could get a slider anywhere in the country and get the same tasty, onion-y quality each time. Think of this as a forebear of the modern global economy of sameness.This episode is hosted by Roman Mars and reported by Mackenzie Martin. It was produced by Jeyca Maldonado-Medina, and edited by Joe Rosenberg. Mix and sound design by Martín Gonzalez. Music by Swan Real with additional music by Jenny Conlee, Nate Query, and John Neufeld. Fact-checking by Graham Hacia. Kathy Tu is 99 Percent Invisible's executive producer. Kurt Kohlstedt is their digital director, and Delaney Hall is their senior editor.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article
vis For Elvis, Memphis was a wellspring of musical creation By www.npr.org Published On :: Tue, 03 Sep 2024 07:00:59 +0000 A new box set chronicles Elvis Presley's time in Grind City.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article
vis Short Wave: Big Bang Revisited By www.npr.org Published On :: Wed, 14 Aug 2024 07:00:00 +0000 We've got a special episode for you today from our friends at Short Wave. We all think about the Big Bang as the moment when our universe—everything in existence—began right? Turns out, it's not quite that simple. Today when scientists talk about the Big Bang, they mean a period of time, closer to an era rather than a specific moment.Short Wave host Regina Barber talks with two cosmologists about the cosmic microwave background, its implications for the universe's origins and the discovery that started it all.This episode is part of Short Wave's Space Camp series; you can find more here: https://www.npr.org/series/g-s1-3299/short-wave-space-campLearn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article
vis Approaches to life: Improvise, pivot or plan By www.npr.org Published On :: Fri, 18 Oct 2024 07:00:59 +0000 Big life decisions are never easy. Should you follow a plan? Make a hard pivot? Improvise as you go? This hour, TED speakers who've made extreme life choices and their advice for getting unstuck. Guests include comedian and musician Reggie Watts, biomedical researcher Sonia Vallabh and conservationist Kristine McDivitt Tompkins.TED Radio Hour+ subscribers now get access to bonus episodes, with more ideas from TED speakers and a behind the scenes look with our producers. A Plus subscription also lets you listen to regular episodes (like this one!) without sponsors. Sign-up at: plus.npr.org/ted Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article
vis Meadow Brook Immersion Students Welcome Visitor By www.fhps.net Published On :: Thu, 12 Jan 2023 20:31:03 +0000 This morning Mandarin immersion students at Meadow Brook Elementary had the pleasure of meeting Consul General of China in Chicago, Mr. Zhao Jian! Mr. Jian visited every immersion classroom with his amazement growing as he moved from fourth to third all the way down to kindergarten. He noticed how happy and eager students were to […] The post Meadow Brook Immersion Students Welcome Visitor appeared first on Forest Hills Public Schools. Full Article FHPS District News Mandarin Immersion News Meadow Brook Elementary News
vis Referendum experts from University of Edinburgh visiting Toronto in June By media.utoronto.ca Published On :: Thu, 29 May 2014 19:36:13 +0000 TORONTO, ON – The University of Edinburgh is bringing a number of high profile academic experts to Toronto from 17–21 June, as part of its General Council Meeting this year. Two academics in particular will be available to speak to reporters about the September 18th Independence Referendum in Scotland and how this event compares to […] Full Article Event Advisories International Affairs University of Toronto
vis Ontario Should Revise Discriminatory Policy Against Refugee Drivers - Allow experienced drivers from war-torn countries to skip driving-test waiting period similar to other newcomers in Ontario By media.utoronto.ca Published On :: Mon, 11 Dec 2017 15:22:22 +0000 Allow experienced drivers from war-torn countries to skip driving-test waiting period similar to other newcomers in OntarioToronto, ON – Ontario’s Ministry of Transportation should revise its policy and allow experienced drivers from war-torn countries to skip the one-year waiting period before their final driving tests — an exemption available to other newcomers in Ontario as well […] Full Article Law Media Releases
vis Coming Soon: A Livestreamed Podcast Episode with Jarvis Gray By www.leanblog.org Published On :: Fri, 25 Oct 2024 14:07:05 +0000 I'm happy to announce a live-streamed recording of my Lean podcast with my guest Jarvis Gray. You can join us Live on Linkedin on Wednesday, October 30 at 1 pm ET. EVENT LINK The episode will also be released as a podcast via the normal feeds and my YouTube channel. But if you attend live, you can ask questions via LinkedIn Chat. We'll discuss his new book, MASTERING HEALTHCARE EXCELLENCE: A Leaders Guide to Getting […] The post Coming Soon: A Livestreamed Podcast Episode with Jarvis Gray by Mark Graban appeared first at Lean Blog. Full Article Blog Healthcare Leadership Podcast Quality
vis Achieving Healthcare Excellence: Insights from Jarvis Gray on Lean Six Sigma and Leadership By www.leanblog.org Published On :: Wed, 06 Nov 2024 09:52:00 +0000 Scroll down for how to subscribe, transcript, and more My guest for Episode #519 of the Lean Blog Interviews Podcast is Jarvis Gray, the Managing Director of The Quality Coaching Co. He offers more than 16 years of strategic planning, quality improvement, and operations leadership experience in the healthcare industry. Through his firm, The Quality Coaching Co., Jarvis and his associates help healthcare organizations foster cultures of system-wide quality improvement by offering customized Lean Six […] The post Achieving Healthcare Excellence: Insights from Jarvis Gray on Lean Six Sigma and Leadership by Mark Graban appeared first at Lean Blog. Full Article Blog Interviews Healthcare Podcast Podcast - Healthcare Quality
vis Remote Workforce Analytics: Top 5 Reasons Why More Visibility Helps Your Remote Teams By www.recruiter.com Published On :: Mon, 13 Jul 2020 15:06:46 EST Having visibility into a team's processes and projects is important to every manager. However, when you're managing a remote team, visibility becomes even more critical. How can you guide your staff on priorities and deadlines when you aren't sure what's actually going on behind the scenes? With remote workforces, simply getting work done isn't enough. Inefficient processes become more problematic as employees are no longer in the same room and communication becomes more difficult or delayed. Managers also need to see ... Full Article
vis Machine Vision for Battery Production 4.0 By www.qualitymag.com Published On :: Mon, 13 Nov 2023 00:00:00 -0500 For quality assurance purposes and to optimize the manufacturing workflow, machine vision is employed throughout the entire process to identify production errors, damage, or impurities early on. Full Article
vis Inside the Expanding Applications of Vision Measurement Systems in Automotive Manufacturing By www.qualitymag.com Published On :: Wed, 08 May 2024 00:00:00 -0400 Traditional measurement methods struggle with complex geometries and modern plastic parts. Advanced vision measuring systems offer advantages for automotive manufacturers, but traditional tools are still preferable in some areas. Full Article
vis AI-Based Vision System Inspects Cutting Tools By www.qualitymag.com Published On :: Wed, 07 Aug 2024 09:00:00 -0400 AI helps automated inspection system detect minute defects despite natural variation in the parts. Full Article
vis CyberMetrics Announces New Leadership of the Asset Management Division By www.qualitymag.com Published On :: Mon, 02 Sep 2013 00:00:00 -0400 Though FaciliWorks CMMS is already used by hundreds of Mexican companies, there is still an enormous number of potential clients who are in need of a system like FaciliWorks. Full Article
vis Systems integration for machine vision solutions – Driving application success with current and future technologies By www.qualitymag.com Published On :: Mon, 01 Apr 2024 00:00:00 -0400 System integration strategies vary by industry and project scale. Success relies on thorough planning and execution, especially in machine vision technology. Here are key integration elements for success with vision technologies. Full Article
vis Integrated, Centrally-Managed Machine Vision for Built-In Quality By www.qualitymag.com Published On :: Tue, 02 Apr 2024 00:00:00 -0400 Labor shortages continue to pressure manufacturers, with some dedicating up to 20% of their workforce to manual inspection. Embracing Quality 4.0 with automated in-line inspections and AI process analytics could provide significant value. Full Article
vis Key Considerations When Selecting a Machine Vision Lens By www.qualitymag.com Published On :: Thu, 25 Apr 2024 00:00:00 -0400 In this article we survey key considerations when making a lens selection. Of course, your lensing professional will be happy to advise – but they’ll ask you some of these questions anyway, so it’s helpful to make notes relative to your planned application. Full Article
vis Today’s GigE Vision Standard and a Look Ahead to GigE Vision 3.0 By www.qualitymag.com Published On :: Tue, 30 Apr 2024 01:05:00 -0400 GigE Vision® sets the standard for high-performance industrial cameras, leveraging Gigabit Ethernet for fast, cost-effective image transfer. Introduced in 2006, it enables the transmission of digital images and video over Ethernet networks up to 100 meters. With version 3.0 on the horizon, GigE Vision remains the top choice for long-distance camera setups, offering unmatched performance and affordability. Full Article
vis Machine Vision Technologies Adapt for Higher Speeds, Evolving Needs By www.qualitymag.com Published On :: Mon, 03 Jun 2024 00:00:00 -0400 The famous quote "Adapt or die" applies to businesses like Kodak and Blockbuster, which missed out on opportunities by not embracing new technologies. This concept also applies to industries like manufacturing and logistics today. Full Article
vis Podcast: Machine Vision — An Engineering Discipline By www.qualitymag.com Published On :: Tue, 04 Jun 2024 00:00:00 -0400 Quality spoke with David Dechow of Machine Vision Source following his recent presentation at The Quality Show South about vision solutions for quality applications and integration that drives application success with current and emerging technologies. Full Article
vis Revolutionizing Quality Control: How AI Vision Is Setting New Industry Standards By www.qualitymag.com Published On :: Tue, 04 Jun 2024 00:00:00 -0400 In a world where AI vision technology is setting new quality control standards across industries, machines can now detect even the smallest defects in car parts and ensure that every packaged product meets health standards. Full Article