vis

ETSI advisor at the Stakeholder Cybersecurity Certification Group launched by the EC

ETSI advisor at the Stakeholder Cybersecurity Certification Group launched by the EC

Sophia Antipolis, 24 June 2020

ETSI is pleased to announce that it has been invited to be part of the newly formed Stakeholder Cybersecurity Certification Group. The kick-off meeting took place today. Together with the European Cybersecurity Certification Group (ECCG), composed of Member States’ representatives, the newly established Stakeholder Cybersecurity Certification Group (SCCG) will advise the Commission on strategic issues regarding the European cybersecurity certification framework. It will also assist the Commission in the preparation of the Union rolling work programme, which sets the priorities for the definition of schemes within the EU cybersecurity certification framework. ETSI will bring in its long-standing experience in cybersecurity, with standards developed both for enterprises and consumers within several of its technical bodies, including the Technical Committee CYBER.

Read More...




vis

Designing tomorrow’s world: ETSI unveils strategy in line with its ambitious vision

‘Designing tomorrow’s world’: ETSI unveils strategy in line with its ambitious vision

Sophia Antipolis, 3 December 2020

At the meeting of its General Assembly yesterday ETSI has validated a new strategy, the result of an intensive development process over the last months.

Titled ‘Designing tomorrow’s world’, the strategy has been shaped by ETSI’s diverse global community, drawing on the expertise and experience of more than 900 member organizations that include multinational and smaller companies, start-ups, research organizations and governmental institutions.

Read More...




vis

Open Source MANO Release NINE fulfils ETSI's zero-touch automation vision, ready for MEC and O-RAN use cases

Open Source MANO Release NINE fulfils ETSI's zero-touch automation vision, ready for MEC and O-RAN use cases

Sophia Antipolis, 18 December 2020

ETSI is pleased to announce the launch of OSM Release NINE today. With an array of new features, this Release completes the alignment process with ETSI NFV specifications, culminating in native adoption of ETSI GS NFV-SOL006 for network functions and service modelling. Standardizing the onboarding process for VNFs into OSM fosters interoperability and boosts the growth of OSM’s VNF ecosystem. Release NINE coincides with the announcement of a new production deployment, confirming OSM as the most comprehensive open-source NFV orchestrator and a key enabler for zero-touch end-to-end network and service automation.

Read More...




vis

‘Designing tomorrow’s world’: ETSI introduces its new strategy in line with its ambitious vision

‘Designing tomorrow’s world’: ETSI introduces its new strategy in line with its ambitious vision

Sophia Antipolis, 5 May 2021

Today ETSI is pleased to introduce its new strategy, the result of an intensive development process over the last months, validated at the ETSI General Assembly in December 2020.

Titled ‘Designing tomorrow’s world’, the strategy builds on a recognition of the global importance of Information and Communication Technology (ICT) for a sustainable development and to support the digital transformation of society.

Read More...




vis

Aiming high: ETSI Conference on Non-Terrestrial Networks underlines critical role of NTN in realizing tomorrow’s global 6G vision

Sophia Antipolis, 15 April 2024

This year’s first ETSI Conference on Non-Terrestrial Networks has stressed the importance of technical standardization in delivering a fully connected planet via NTN, a key element of tomorrow’s global 6G networks.

Held from 3-4 April 2024 at ETSI’s Sophia Antipolis headquarters, the event was co-organized with the European Space Agency (ESA), the 6G Smart Networks and Services Industry Association (6G-IA) and the Smart Networks and Services Joint Undertaking (SNS JU).

Titled ‘Non-Terrestrial Networks, a Native Component of 6G’, the 2-day conference attracted over 200 participants from 25 countries, including experts in standardization and research as well as industrial representation from the mobile, satellite and wider space industries. Delegates shared perspectives on NTN use cases, candidate technology solutions, current research status and standardization roadmaps. Day one sessions focused on the opportunities and challenges of integrating terrestrial and non-terrestrial networks within tomorrow’s global communications landscape. The second day afforded a deep dive into numerous cutting-edge NTN and 6G research & development initiatives in Europe and around the world.

Read More...




vis

OSC Staff Notice 11-737 (Revised) – Securities Advisory Committee – Vacancies

The Securities Advisory Committee (“SAC”) is a committee of industry experts established by the Commission to advise it and its staff on a variety of matters including policy initiatives and capital markets trends.




vis

Cybersecurity Snapshot: Apply Zero Trust to Critical Infrastructure’s OT/ICS, CSA Advises, as Five Eyes Spotlight Tech Startups’ Security

Should critical infrastructure orgs boost OT/ICS systems’ security with zero trust? Absolutely, the CSA says. Meanwhile, the Five Eyes countries offer cyber advice to tech startups. Plus, a survey finds “shadow AI” weakening data governance. And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy.

Dive into six things that are top of mind for the week ending Nov. 1.

1 - Securing OT/ICS in critical infrastructure with zero trust

As their operational technology (OT) computing environments become more digitized, converged with IT systems and cloud-based, critical infrastructure organizations should beef up their cybersecurity by adopting zero trust principles.

That’s the key message of the Cloud Security Alliance’s “Zero Trust Guidance for Critical Infrastructure,” which focuses on applying zero trust methods to OT and industrial control system (ICS) systems.

While OT/ICS environments were historically air gapped, that’s rarely the case anymore. “Modern systems are often interconnected via embedded wireless access, cloud and other internet-connected services, and software-as-a-service (SaaS) applications,” reads the 64-page white paper, which was published this week.

The CSA hopes the document will help cybersecurity teams and OT/ICS operators enhance the way they communicate and collaborate.

 

 

Among the topics covered are:

  • Critical infrastructure’s unique threat vectors
  • The convergence of IT/OT with digital transformation
  • Architecture and technology differences between OT and IT

The guide also outlines this five-step process for implementing zero trust in OT/ICS environments:

  • Define the surface to be protected
  • Map operational flows
  • Build a zero trust architecture
  • Draft a zero trust policy
  • Monitor and maintain the environment

A zero trust strategy boosts the security of critical OT/ICS systems by helping teams “keep pace with rapid technological advancements and the evolving threat landscape,” Jennifer Minella, the paper’s lead author, said in a statement.

To get more details, read:

For more information about OT systems cybersecurity, check out these Tenable resources: 

2 - Five Eyes publish cyber guidance for tech startups

Startup tech companies can be attractive targets for hackers, especially if they have weak cybersecurity and valuable intellectual property (IP).

To help startups prevent cyberattacks, the Five Eyes countries this week published cybersecurity guides tailored for these companies and their investors.

“This guidance is designed to help tech startups protect their innovation, reputation, and growth, while also helping tech investors fortify their portfolio companies against security risks," Mike Casey, U.S. National Counterintelligence and Security Center Director, said in a statement.

These are the top five cybersecurity recommendations from Australia, Canada, New Zealand, the U.S. and the U.K. for tech startups:

  • Be aware of threat vectors, including malicious insiders, insecure IT and supply chain risk.
  • Identify your most critical assets and conduct a risk assessment to pinpoint vulnerabilities.
  • Build security into your products by managing intellectual assets and IP; monitoring who has access to sensitive information; and ensuring this information’s protection.
  • Conduct due diligence when choosing partners and make sure they’re equipped to protect the data you share with them.
  • Before you expand abroad, prepare and become informed about these new markets by, for example, understanding local laws in areas such as IP protection and data protection.

 

 

“Sophisticated nation-state adversaries, like China, are working hard to steal the intellectual property held by some of our countries’ most innovative and exciting startups,” Ken McCallum, Director General of the U.K.’s MI5, said in a statement.

To get more details, check out these Five Eyes’ cybersecurity resources for tech startups:

3 - Survey: Unapproved AI use impacting data governance

Employees’ use of unauthorized AI tools is creating compliance issues in a majority of organizations. Specifically, it makes it harder to control data governance and compliance, according to almost 60% of organizations surveyed by market researcher Vanson Bourne.

“Amid all the investment and adoption enthusiasm, many organisations are struggling for control and visibility over its use,” reads the firm’s “AI Barometer: October 2024” publication. Vanson Bourne polls 100 IT and business executives each month about their AI investment plans.

To what extent do you think the unsanctioned use of AI tools is impacting your organisation's ability to maintain control over data governance and compliance?

(Source: Vanson Bourne’s “AI Barometer: October 2024”)

Close to half of organizations surveyed (44%) believe that at least 10% of their employees are using unapproved AI tools.

On a related front, organizations are also grappling with the issue of software vendors that unilaterally and silently add AI features to their products, especially to their SaaS applications.

While surveyed organizations say they’re reaping advantages from their AI usage, “such benefits are dependent on IT teams having the tools to address the control and visibility challenges they face,” the publication reads.

For more information about the use of unapproved AI tools, an issue also known as “shadow AI,” check out:

VIDEO

Shadow AI Risks in Your Company

 

4 - NCSC explains nuances of multi-factor authentication

Multi-factor authentication (MFA) comes in a variety of flavors, and understanding the differences is critical for choosing the right option for each use case in your organization.

To help cybersecurity teams better understand the different MFA types and their pluses and minuses, the U.K. National Cyber Security Centre (NCSC) has updated its MFA guidance.

“The new guidance explains the benefits that come with strong authentication, while also minimising the friction that some users associate with MFA,” reads an NCSC blog.

 

 

In other words, what type of MFA method to use depends on people’s roles, how they work, the devices they use, the applications or services they’re accessing and so on.

Topics covered include:

  • Recommended types of MFA, such as FIDO2 credentials, app-based and hardware-based code generators and message-based methods
  • The importance of using strong MFA to secure users’ access to sensitive data
  • The role of trusted devices in boosting and simplifying MFA
  • Bad practices that weaken MFA’s effectiveness, such as:
    • Retaining weaker, password-only authentication protocols for legacy services
    • Excluding certain accounts from MFA requirements because their users, usually high-ranking officials, find MFA inconvenient

To get more details, read:

For more information about MFA:

5 - U.S. gov’t outlines AI strategy, ties it to national security 

The White House has laid out its expectations for how the federal government ought to promote the development of AI in order to safeguard U.S. national security.

In the country’s first-ever National Security Memorandum (NSM) on AI, the Biden administration said the federal government must accomplish the following:

  • Ensure the U.S. is the leader in the development of safe, secure and trustworthy AI
  • Leverage advanced AI technologies to boost national security
  • Advance global AI consensus and governance

“The NSM’s fundamental premise is that advances at the frontier of AI will have significant implications for national security and foreign policy in the near future,” reads a White House statement.

 

 

The NSM’s directives to federal agencies include:

  • Help improve the security of chips and support the development of powerful supercomputers to be used by AI systems.
  • Help AI developers protect their work against foreign spies by providing them with cybersecurity and counterintelligence information.
  • Collaborate with international partners to create a governance framework for using AI in a way that is ethical, responsible and respects human rights. 

The White House also published a complementary document titled “Framework To Advance AI Governance and Risk Management in National Security,” which adds implementation details and guidance for the NSM.

6 - State CISOs on the frontlines of AI security

As the cybersecurity risks and benefits of AI multiply, most U.S. state CISOs find themselves at the center of their governments' efforts to craft AI security strategies and policies.

That’s according to the “2024 Deloitte-NASCIO Cybersecurity Study,” which surveyed CISOs from all 50 states and the District of Columbia.

Specifically, 88% of state CISOs reported being involved in the development of a generative AI strategy, while 96% are involved with creating a generative AI security policy.

However, their involvement in AI cybersecurity matters isn’t necessarily making them optimistic about their states’ ability to fend off AI-boosted attacks.

None said they feel “extremely confident” that their state can prevent AI-boosted attacks, while only 10% reported feeling “very confident.” The majority (43%) said they feel “somewhat confident” while the rest said they are either “not very confident” or “not confident at all.”

 

 

Naturally, most state CISOs see AI-enabled cyberthreats as significant, with 71% categorizing them as either “very high threat” (18%) or “somewhat high threat” (53%).

At the same time, state CISOs see the potential for AI to help their cybersecurity efforts, as 41% are already using generative AI for cybersecurity, and another 43% have plans to do so by mid-2025.

Other findings from the "2024 Deloitte-NASCIO Cybersecurity Study" include:

  • 4 in 10 state CISOs feel their budget is insufficient.
  • Almost half of respondents rank cybersecurity staffing as one of the top challenges.
  • In the past two years, 23 states have hired new CISOs, as the median tenure of a state CISO has dropped to 23 months, down from 30 months in 2022.
  • More state CISOs are taking on privacy protection duties — 86% are responsible for privacy protection, up from 60% two years ago.

For more information about CISO trends:




vis

OSC seeks applications for the Registrant Advisory Committee

TORONTO – The Ontario Securities Commission (OSC) is inviting applications for membership on its Registrant Advisory Committee (RAC or the Committee).




vis

Capital Markets Tribunal seeks applications for the Securities Proceedings Advisory Committee

TORONTO – The Capital Markets Tribunal is seeking applications for membership to the Securities Proceedings Advisory Committee (SPAC).




vis

SpotOn London 2012 Storify: Incentivising Open Access and Open Science: Carrot and Stick

Here is a Storify round up of the SpotOn London session: Incentivising Open Access and Open




vis

The Adventure zone : the crystal kingdom / based on the podcast by Griffin McElroy, Clint McElroy, Travis McElroy, Justin McElroy ; adaptation by Clint McElroy, Carey Pietsch ; art by Carey Pietsch.

"A desperate call for help interrupts holiday celebrations at the Bureau of Balance, and sends Taako, Magnus and Merle on a high-stakes mission to find and reclaim a fourth deadly relic: a powerful transmutation stone, hidden somewhere in the depths of a floating arcane laboratory that's home to the Doctors Maureen and Lucas Miller. An unknown menace has seized control of the stone, and is using it to transform the lab into a virulent pink crystal that spreads to everything it touches. It's only a matter of time before this sparkling disaster crash-lands, but in order to find the stone and save the whole planet from being King Midased, our heroes will have to fight their way through a gauntlet of rowdy robots and crystal golems, decide whether they can trust the evasive Lucas Miller, and solve the mystery of what— or who— has put them all in peril, before there's no world left to save." -- Provided by publisher




vis

Investor Alert: Advisor Impersonation Schemes

TORONTO – New Self-Regulatory Organization of Canada (New SRO) and the Canadian Securities Administrators (CSA) are warning Canadian investors not to be fooled by fraudsters impersonating real investment advisors.




vis

Spider-Woman. Vol. 2, King in black / writer, Karla Pacheco ; artist, Pere Pérez ; color artist, Frank D'Armata ; letterer, VC's Travis Lanham.

"Collects Spider-Woman (2020) #6-10. Road trip— to space! After learning some startling secrets about her family, Jessica Drew goes on a mission to find the one person who might know more: the High Evolutionary! But she's going to need her BFF by her side— and that means it's Captain Marvel team-up time! Before long though, those closest to Spider-Woman will abandon her. Only one person will come to her aid: Octavia Vermis! Octavia has a cure for Jessica, and the prescription is crime! Is Jess willing to resort to theft to gather all the tools needed to fix what's wrong? In the shadow of Knull's invasion, Spider-Woman must put everything on the line— and then cross it! Even if Jess can find the cure for what ails her, will she still have a life worth saving?" -- Page [4] of cover.




vis

Yo-kai watch. 17 / story and art by Noriyuki Konishi ; original concept and supervised by Level-5 Inc. ; translation, Tetsuichiro Miyaki ; English adaptation, Aubrey Sitterson ; lettering, John Hunt.

"Nate Adams is just an average kid until the mysterious Whisper gives him the Yo-kai Watch. Now he can see what others cannot: Yo-kai of all shapes and forms! … A mysterious door opens, causing Nate to run into weird and wacky Yo-kai from the past, present and future. Watch as they participate in a battle royale to decide which Yo-kai is the strongest!" -- Provided by publisher.




vis

Tenable Research Advisories: Urgent Action

Tenable Research delivers world class exposure intelligence, data science insights, zero day research and security advisories. Our Security Response Team (SRT) in Tenable Research tracks threat and vulnerability intelligence feeds to make sure our research teams can deliver sensor coverage to our products as quickly as possible. The SRT also works to dig into technical details and author white papers, blogs, and additional communications to ensure stakeholders are fully informed of the latest cyber risks and threats. The SRT provides breakdowns for the latest critical vulnerabilities on the Tenable blog.

When security events rise to the level of taking immediate action, Tenable - leveraging SRT intelligence -  notifies customers proactively to provide exposure information, current threat details and how to use Tenable products and capabilities to accelerate remediation.

This dashboard contains indicator style components to highlight any vulnerabilities related to the Tenable Research Advisories where Tenable issues customer guidance that immediate remediation was of paramount importance to all affected organizations. Tenable recommends addressing missing patches as identified in the dashboard components. 

The dashboard and its components are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The dashboard can be easily located in the Tenable.sc Feed under the category Security Industry Trends.

The dashboard requirements are: 

  • Tenable.sc 6.2.0
  • Nessus 10.6.1

The following components are included in this dashboard are:

 

Research Advisories - Citrix NetScaler ADC and NetScaler Gateway: In August 2023, Mandiant identified a zero-day exploitation impacting NetScaler ADC and NetScaler Gateway appliances. When NetScaler ADC or NetScaler Gateway is configured as a gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or as an AAA virtual server, an unauthenticated attacker could exploit the device in order to hijack an existing authenticated session. Depending on the permissions of the account they have hijacked, this could allow the attacker to gain additional access within a target environment and collect other account credentials. Successful exploitation allows the attacker to bypass multi factor authentication (MFA) requirements.

Research Advisories - curl Heap Overflow and Cookie Injection: On October 3, an open-source developer and maintainer of curl, took to X (formerly Twitter) to announce that a new high severity CVE would be fixed in curl 8.4.0. The developer noted that the release would be ahead of schedule and released on October 11, indicating in a reply to the twitter thread that this is 'the worst security problem found in curl in a long time.' 

Research Advisories - MOVEit: The CL0P Ransomware Group, also known as TA505, has exploited zero-day vulnerabilities across a series of file transfer solutions since December 2020. File transfer solutions often contain sensitive information from a variety of organizations. This stolen information is used to extort victims to pay ransom demands. In 2023, CL0P claimed credit for the exploitation of vulnerabilities in both Fortra’s GoAnywhere Managed File Transfer (MFT) and Progress Software’s MOVEit Transfer solutions. 

Research Advisories - log4shell: This matrix alerts organizations to potential concerns regarding the Log4j vulnerability. Displayed are the vulnerabilities that are directly associated with the log4shell CVEs (CVE-2021-44228, CVE-2021-44832, CVE-2021-45046, CVE-2021-4104, and CVE-2021-45105) and Log4j installations. 

Research Advisories - CISA Alerts AA22-011A and AA22-047A: On November 3rd, 2021, Cybersecurity and Infrastructure Security Agency (CISA) issued Binding Operational Directive (BOD) 22-01, and on Jan 11, 2022 CISA issued an alert (AA22-011A) warning of increased risk to U.S. critical infrastructure.  A total of 18 CVEs can be associated with this alert.  Hosts and Vulnerabilities identified and mitigated are displayed using the referenced CVE. 

Research Advisories - PrintNightmare: On July 1, Microsoft released an advisory for CVE-2021-34527. This advisory was released in response to public reports about a proof-of-concept (PoC) exploit for CVE-2021-1675, a similar vulnerability in the Windows Print Spooler. To help clear up confusion about the vulnerability, Microsoft updated its advisory for CVE-2021-1675 to clarify that it is similar but distinct from CVE-2021-34527. On July 6, Microsoft updated its advisory to announce the availability of out-of-band patches for CVE-2021-34527, a critical vulnerability in its Windows Print Spooler that researchers are calling PrintNightmare. This remote code execution (RCE) vulnerability affects all versions of Microsoft Windows. 

Research Advisories - MS Exchange ProxyLogon: On March 2, 2021 Microsoft released several critical security updates for zero-day Microsoft Exchange Server vulnerabilities, and reported that the exploits are actively being exploited by threat actors. Within a single week thousands of organizations world-wide have fallen victim. Tenable released several plugins for Exchange Server 2010, 2013, 2016 and 2019, which can be used to determine which Exchange Server systems are vulnerable in your environment.




vis

RP Investment Advisors LP and The Funds

HeadnoteNational Policy 11-203 Process for Exemptive Relief Applications in Multiple Jurisdictions -- relief granted revoking and replacing existing short selling, cash cover and custodial relief to extend existing relief beyond a "government security" as defined in NI 81-102 to also inc




vis

There's a mystery there : the primal vision of Maurice Sendak / Jonathan Cott.

"An extraordinary, path-breaking, and penetrating book on the life and work and creative inspirations of the great children's book genius Maurice Sendak, who since his death in 2012 has only grown in his stature and recognition as a major American artist, period. Polymath and master interviewer Jonathan Cott first interviewed Maurice Sendak in 1976 for Rolling Stone, just at the time when Outside Over There, the concluding and by far the strangest volume of a trilogy that began with Where The Wild Things Areand In the Night Kitchen, was gestating. Over the course of their wide-ranging and revelatory conversation about his life, work, and the fantasies and obsessions that drove his creative process, they focused on many of the themes and images that would appear in the new book five years later. Drawing on that interview, There's a Mystery There is a profound examination of the inner workings of a complicated genius's torments and inspirations that ranges over the entirety of his work and his formative life experiences, and uses Outside Over There, brilliantly and originally, as the key to understanding just what made this extravagantly talented man tick. To gain multiple perspectives on that intricate and multifaceted book, Cott also turns to four "companion guides": a Freudian analyst, a Jungian analyst, an art historian, and Sendak's great friend and admirer, the playwright Tony Kushner. The book is richly illustrated with examples from Sendak's work and other related images." -- Provided by publisher.




vis

For Us, By Us: Envisioning a Kiki Methodology in Black Queer Storytelling (November 13, 2024 6:30pm)

Event Begins: Wednesday, November 13, 2024 6:30pm
Location: Museum of Art
Organized By: Spectrum Center


Who are you? What is your story? How do you express yourself? The experiences of Black queer life are reflected in the ways we tell our stories. We will explore a kiki methodology grounded in ballroom culture and Black queer storytelling. Drawing from queer of color critique and narrative construction, kiki methodology engages in three components: Black queer meaning-making, Black queer storytelling, and Black queer artistic expression. Kiki methodology connects envisioning and centering words, feelings, and voices of the Black queer community in the form of storytelling in higher education. We will engage about what is needed to be in queer community and kinship through storytelling.

ABOUT DR. HUTCHINGS
Dr. Quortne R. Hutchings (they, them) is a first-generation college graduate, proud Ronald E. McNair scholar alum, and assistant professor of higher education at Northern Illinois University. Their research primarily focuses on Black gay, bisexual, queer, and non-binary undergraduate and graduate students’ academic and social experiences in higher education, minoritized student affairs professionals’ experiences in student and academic affairs, and supporting students, faculty, and staff navigating substance use and recovery. Their research has been published in the Journal of College Student Development, Departures in Critical Qualitative Research, Journal of Higher Education, and International Journal of Qualitative Studies in Education.

TRANS AWARENESS MONTH
Trans Awareness Month is presented by Spectrum Center, and events are presented by units across campus. Find more Trans Awareness Month events at spectrumcenter.umich.edu/trans-awareness-month




vis

VIZ'D 2024: A Data Visualization Competition (November 13, 2024 6:00pm)

Event Begins: Wednesday, November 13, 2024 6:00pm
Location: CCCB 3420
Organized By: Sessions @ Michigan


Join the Quantitative Methods in the Social Sciences (QMSS) program for a night of making data fun and engaging! Sign up to compete on teams of 2-3 in 2 rounds of competition. Students in our audience will have an opportunity to vote on their favorite visuals from each round. We will have QMSS- and University of Michigan-themed prizes for participants and audience members as well as dinner on us!




vis

Visioning: Laying the Foundation for the Future (November 13, 2024 6:00pm)

Event Begins: Wednesday, November 13, 2024 6:00pm
Location: Matthaei Botanical Gardens
Organized By: Arts Initiative


sara faraj will lead this workshop and guide participants in the process of setting intentions for the future through writing, painting, and planting. Participants will be given paper and writing utensils for the writing activity. Plants, pots, paint for pots, and soil will be provided for the planting activity.

sara faraj (Master of Urban and Regional Planning (M.U.R.P.) '24) is one of three master’s degree-level residents chosen for the 2024 Creative Careers Residency at the Arts Initiative. She is interested in Photovoice as a participatory action research (PAR) methodology that empowers and activates positive change within us and, therefore, positive change in the world around us.

RSVP needed: http://visioning.rsvpify.com
Maximum number of participants: 15

Are you attending one of these workshops? You can submit your work for our Take Care Student Exhibition.
More info and submission form here: https://artsinitiative.slideroom.com/#/login/program/79201

•••

The Arts Initiative, in partnership with Wolverine Wellness, is launching a series of free art-making workshops for the Take Care AY 2024-25 focus. These workshops are an opportunity to create art, brush up on dance techniques, and other artistic forms. No prior experience required. Led by local and regional artists, the workshops are open to the entire U-M and local community. All supplies necessary will be provided at the workshop.

For questions or to request accessibility accommodations, please contact Félix Zamora-Gómez at felixzg@umich.edu.




vis

Residence Hall Pop-up Advising (November 13, 2024 5:00pm)

Event Begins: Wednesday, November 13, 2024 5:00pm
Location: East Quadrangle
Organized By: Newnan LSA Academic Advising Center


Registration starts soon, and LSA Newnan advisors are coming to you! We'll be in residence halls discussing course planning for the winter term and answering any questions you may have.

Join us from 5-8 on select nights. We're looking forward to seeing you!




vis

Revisiting the Divide: A Dialogue Between Asian and Asian American Studies (November 13, 2024 12:00pm)

Event Begins: Wednesday, November 13, 2024 12:00pm
Location: Rackham Graduate School (Horace H.)
Organized By: Asian Languages and Cultures


Upcoming DEI event, "Revisiting the Divide: A Dialogue Between Asian and Asian American Studies," this Wednesday, November 13th!

This conversation will bring together scholars of Asian Studies and Asian American Studies to reflect on the academic divisions between these two fields. We kindly request that you RSVP at the QR code on the poster below or this link, as seating and food will be limited.

Please join us for a light lunch and fruitful discussion from 12-1:30 PM in the Rackham West Conference Room.




vis

Pivotal: Confronting hunger and poverty in Nigeria (Africa Independence Television)

Pivotal: Confronting hunger and poverty in Nigeria (Africa Independence Television)

Nigeria’s current economic crisis continues to attract media attention. On 26 June 2024 Africa Independence Television (AIT) hosted a panel discussion on the television program “Pivotal” focused on confronting hunger and poverty. The panel, moderated by Nabila Usman, included Kwaw Andam, Country Program Leader, IFPRI-Nigeria, Andrew Mamudu, Country Director, Action Aid, and Abdullahi Mohammad, Associate, […]

The post Pivotal: Confronting hunger and poverty in Nigeria (Africa Independence Television) appeared first on IFPRI.






vis

CTA Seeking New Applications for ADA Advisory Committee

In alignment with its ongoing commitment to bringing equity and inclusion to all aspects of its decision-making, the Chicago Transit Authority (CTA) announced today it will be seeking new applicants to join the agency’s Americans with Disabilities Act (ADA) Advisory Committee.




vis

Elevator at Davis Temporarily Out-of-Service (Elevator Status)

(Sun, Nov 10 2024 8:53 AM to TBD) The Howard- and- Loop- bound platform elevator at Davis (Purple Line) is temporarily out-of-service.




vis

Elevator at Davis Temporarily Out-of-Service (Elevator Status)

(Sun, Nov 10 2024 8:53 AM to TBD) The Howard- and- Loop- bound platform elevator at Davis (Purple Line) is temporarily out-of-service.




vis

Financial advising while Black

After a successful career in advertising, Erika Williams decided it was time for a change. She went back to school to get an MBA at the University of Chicago, and eventually, in 2012, she got a job at Wells Fargo as a financial advisor. It was the very job she wanted.

Erika is Black–and being a Black financial advisor at a big bank is relatively uncommon. Banking was one of the last white collar industries to really hire Black employees. And when Erika gets to her office, she's barely situated before she starts to get a weird feeling. She feels like her coworkers are acting strangely around her.

"I was just met with a lot of stares. And then the stares just turned to just, I mean, they just pretty much ignored me. And that was my first day, and that was my second day. And it was really every day until I left."

She wasn't sure whether to call her experience racism...until she learned that there were other Black employees at other Wells Fargo offices feeling the exact same way.On today's episode, Erika's journey through these halls of money and power. And why her story is not unique, but is just one piece of the larger puzzle.

Help support Planet Money and get bonus episodes by subscribing to Planet Money+ in
Apple Podcasts or at plus.npr.org/planetmoney.

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy




vis

99 Percent Invisible: The White Castle System of Eating Houses

Today we have a guest episode from 99 Percent Invisible.

It is about White Castle, the burger chain. Even if you haven't visited, you have tasted its influence because, as we will learn in this episode, White Castle is really the proto-burger chain.

Our friends at the excellent podcast 99 Percent Invisible bring us the origin story of White Castle and trace its influence on the business of fast food, and on American eating habits. The story is about one man who had an idea for a world where you could get a slider anywhere in the country and get the same tasty, onion-y quality each time. Think of this as a forebear of the modern global economy of sameness.

This episode is hosted by Roman Mars and reported by Mackenzie Martin. It was produced by Jeyca Maldonado-Medina, and edited by Joe Rosenberg. Mix and sound design by Martín Gonzalez. Music by Swan Real with additional music by Jenny Conlee, Nate Query, and John Neufeld. Fact-checking by Graham Hacia. Kathy Tu is 99 Percent Invisible's executive producer. Kurt Kohlstedt is their digital director, and Delaney Hall is their senior editor.

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy





vis

Short Wave: Big Bang Revisited

We've got a special episode for you today from our friends at Short Wave. We all think about the Big Bang as the moment when our universe—everything in existence—began right? Turns out, it's not quite that simple. Today when scientists talk about the Big Bang, they mean a period of time, closer to an era rather than a specific moment.

Short Wave host Regina Barber talks with two cosmologists about the cosmic microwave background, its implications for the universe's origins and the discovery that started it all.

This episode is part of Short Wave's Space Camp series; you can find more here: https://www.npr.org/series/g-s1-3299/short-wave-space-camp

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy




vis

Approaches to life: Improvise, pivot or plan

Big life decisions are never easy. Should you follow a plan? Make a hard pivot? Improvise as you go? This hour, TED speakers who've made extreme life choices and their advice for getting unstuck. Guests include comedian and musician Reggie Watts, biomedical researcher Sonia Vallabh and conservationist Kristine McDivitt Tompkins.

TED Radio Hour+ subscribers now get access to bonus episodes, with more ideas from TED speakers and a behind the scenes look with our producers. A Plus subscription also lets you listen to regular episodes (like this one!) without sponsors. Sign-up at: plus.npr.org/ted

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy




vis

Meadow Brook Immersion Students Welcome Visitor

This morning Mandarin immersion students at Meadow Brook Elementary had the pleasure of meeting Consul General of China in Chicago, Mr. Zhao Jian! Mr. Jian visited every immersion classroom with his amazement growing as he moved from fourth to third all the way down to kindergarten. He noticed how happy and eager students were to […]

The post Meadow Brook Immersion Students Welcome Visitor appeared first on Forest Hills Public Schools.



  • FHPS District News
  • Mandarin Immersion News
  • Meadow Brook Elementary News

vis

Referendum experts from University of Edinburgh visiting Toronto in June

TORONTO, ON – The University of Edinburgh is bringing a number of high profile academic experts to Toronto from 17–21 June, as part of its General Council Meeting this year. Two academics in particular will be available to speak to reporters about the September 18th Independence Referendum in Scotland and how this event compares to […]




vis

Ontario Should Revise Discriminatory Policy Against Refugee Drivers - Allow experienced drivers from war-torn countries to skip driving-test waiting period similar to other newcomers in Ontario

Allow experienced drivers from war-torn countries to skip driving-test waiting period similar to other newcomers in OntarioToronto, ON – Ontario’s Ministry of Transportation should revise its policy and allow experienced drivers from war-torn countries to skip the one-year waiting period before their final driving tests — an exemption available to other newcomers in Ontario as well […]




vis

Coming Soon: A Livestreamed Podcast Episode with Jarvis Gray

I'm happy to announce a live-streamed recording of my Lean podcast with my guest Jarvis Gray. You can join us Live on Linkedin on Wednesday, October 30 at 1 pm ET. EVENT LINK The episode will also be released as a podcast via the normal feeds and my YouTube channel. But if you attend live, you can ask questions via LinkedIn Chat. We'll discuss his new book, MASTERING HEALTHCARE EXCELLENCE: A Leaders Guide to Getting […]

The post Coming Soon: A Livestreamed Podcast Episode with Jarvis Gray by Mark Graban appeared first at Lean Blog.




vis

Achieving Healthcare Excellence: Insights from Jarvis Gray on Lean Six Sigma and Leadership

Scroll down for how to subscribe, transcript, and more My guest for Episode #519 of the Lean Blog Interviews Podcast is Jarvis Gray, the Managing Director of The Quality Coaching Co. He offers more than 16 years of strategic planning, quality improvement, and operations leadership experience in the healthcare industry.  Through his firm, The Quality Coaching Co., Jarvis and his associates help healthcare organizations foster cultures of system-wide quality improvement by offering customized Lean Six […]

The post Achieving Healthcare Excellence: Insights from Jarvis Gray on Lean Six Sigma and Leadership by Mark Graban appeared first at Lean Blog.




vis

Remote Workforce Analytics: Top 5 Reasons Why More Visibility Helps Your Remote Teams

Having visibility into a team's processes and projects is important to every manager. However, when you're managing a remote team, visibility becomes even more critical. How can you guide your staff on priorities and deadlines when you aren't sure what's actually going on behind the scenes? With remote workforces, simply getting work done isn't enough. Inefficient processes become more problematic as employees are no longer in the same room and communication becomes more difficult or delayed. Managers also need to see ...




vis

Machine Vision for Battery Production 4.0

For quality assurance purposes and to optimize the manufacturing workflow, machine vision is employed throughout the entire process to identify production errors, damage, or impurities early on.




vis

Inside the Expanding Applications of Vision Measurement Systems in Automotive Manufacturing

Traditional measurement methods struggle with complex geometries and modern plastic parts. Advanced vision measuring systems offer advantages for automotive manufacturers, but traditional tools are still preferable in some areas.




vis

AI-Based Vision System Inspects Cutting Tools

AI helps automated inspection system detect minute defects despite natural variation in the parts.




vis

CyberMetrics Announces New Leadership of the Asset Management Division

Though FaciliWorks CMMS is already used by hundreds of Mexican companies, there is still an enormous number of potential clients who are in need of a system like FaciliWorks.




vis

Systems integration for machine vision solutions – Driving application success with current and future technologies

System integration strategies vary by industry and project scale. Success relies on thorough planning and execution, especially in machine vision technology. Here are key integration elements for success with vision technologies.




vis

Integrated, Centrally-Managed Machine Vision for Built-In Quality

Labor shortages continue to pressure manufacturers, with some dedicating up to 20% of their workforce to manual inspection. Embracing Quality 4.0 with automated in-line inspections and AI process analytics could provide significant value.




vis

Key Considerations When Selecting a Machine Vision Lens

In this article we survey key considerations when making a lens selection. Of course, your lensing professional will be happy to advise – but they’ll ask you some of these questions anyway, so it’s helpful to make notes relative to your planned application.




vis

Today’s GigE Vision Standard and a Look Ahead to GigE Vision 3.0

GigE Vision® sets the standard for high-performance industrial cameras, leveraging Gigabit Ethernet for fast, cost-effective image transfer. Introduced in 2006, it enables the transmission of digital images and video over Ethernet networks up to 100 meters. With version 3.0 on the horizon, GigE Vision remains the top choice for long-distance camera setups, offering unmatched performance and affordability.




vis

Machine Vision Technologies Adapt for Higher Speeds, Evolving Needs

The famous quote "Adapt or die" applies to businesses like Kodak and Blockbuster, which missed out on opportunities by not embracing new technologies. This concept also applies to industries like manufacturing and logistics today.




vis

Podcast: Machine Vision — An Engineering Discipline

Quality spoke with David Dechow of Machine Vision Source following his recent presentation at The Quality Show South about vision solutions for quality applications and integration that drives application success with current and emerging technologies.




vis

Revolutionizing Quality Control: How AI Vision Is Setting New Industry Standards

In a world where AI vision technology is setting new quality control standards across industries, machines can now detect even the smallest defects in car parts and ensure that every packaged product meets health standards.