updates

BZBGEAR Elevates Industry Standards with Comprehensive Warranty Updates

Feel confident in their unmatched support and award-winning pro AV and broadcasting products with their new warranty policy and 60-day risk-free demo program.




updates

Future Stars Expands with New Location and Exciting Program Updates

Future Stars Summer Camps, known for its sports, specialty, and STEAM education programs, will add a new location to its summer camp lineup in 2024




updates

Learn & Play Montessori Announces Updates to Daycare Information in Fremont, Danville, and Dublin

The program is Montessori-inspired but also works to inculcate STEM-oriented learning, that is learning that helps with science, technology, engineering, and math.




updates

Spotter Global, the Leader in Compact Surveillance Radar, Launches an unprecedented 4 New Radars & 3 Radar Updates at ISC West 2024

Spotter Global's largest ever product launch will premiere at ISC West.




updates

Casey Bloys on 'Hacks' Surprise Emmy Win & Updates on 'White Lotus,' 'The Last of Us,' and 'Harry Potter'

All's well that ends well.




updates

DWC Updates Hospital, ASC Fee Schedule

The California Division of Workers’ Compensation on Friday announced additional changes to the hospital outpatient department and ambulatory surgical centers section of the Official Medical Fee Schedule to align with…




updates

DWC Updates DMEPOS Fee Schedule

The California Division of Workers’ Compensation posted an order updating the fee schedule for durable medical equipment, prosthetics, orthotics and supplies for the fourth quarter. The division said it adopted Medicare’s…




updates

DWC Adopts Updates to MTUS Drug List

The California Division of Workers’ Compensation announced updates to the drug list in the Medical Treatment Utilization Schedule to align with national treatment guidelines. The division said the order updates the…




updates

Comp Commission Updates CEC Contact Information

The Oklahoma Workers’ Compensation Commission announced personnel updates and changes in contact information within the Court of Existing Claims. The commission said Katrina Stephenson, who will become judicial liaison and order…




updates

DOL Updates Hazard Communication Standard

The U.S. Department of Labor on Tuesday said it adopted a new rule updating its hazard communication standard that takes effect July 19. The revised rule requires labels on small packages…




updates

CMS Updates Set-Aside Reference Guide

The U.S. Centers for Medicare and Medicaid Services updated its work comp set-aside reference guide to add expand a section that addresses coordinating benefit payments with other health insurers. CMS on…




updates

TDI Posts Updates on Office Closures Due to Storm

The Texas Department of Insurance said it closed seven Division of Workers’ Compensation field offices along the Gulf Coast in response to Hurricane Beryl. The department said it closed both field…




updates

DWC Updates Employer Forms, Changes Rule Title

The Texas Division of Workers’ Compensation announced regulatory action to update employer forms and change the title of a rule. The division said it revised employer notice forms to conform to…




updates

Export Cuts for Audio/Video Editors and Filler Cutting Updates

For those of you who like to be in control of every applied cut, we are introducing an update for our Automatic Silence and Filler Word Cutting Algorithms today: The export of Cut Lists allows you to import cuts into your favorite audio/video editor to check and apply the cuts to your files manually.
Thanks to your great feedback, we were able to update our “Filler Word Cutting” algorithm as well.

Cut Lists Export

We now provide the export of various formats of “Cut Lists” in the Auphonic Web Service.
You can use these formats to modify and apply cuts in your post production audio or video editing program:

Screenshot of the Reaper DAW with imported “ReaperRegions.csv”: pale red regions display filler words and pale gray regions mark silence.

To generate the cut lists, choose “Cut List (Filler and Silence)” in the “Output Files” section. By selecting the correct “Ending” you can export the cut lists to a format that is suitable for your post production audio or video editor:

We support regions and EDL (edit decision list) formats:

  • Region formats (“AudacityRegions.txt”, “AuditionRegions.csv” and “ReaperRegions.csv”) list filler and silence cut regions with their respective start and end timestamps.
    You can import those cut region lists into your existing Audacity, Audition, or Reaper projects. There you can edit the cut positions to your liking by deleting, moving, or adding individual cut positions. After that, you may apply the cuts manually.
  • EDL (edit decision list) formats, “SamplitudeReaper.edl”, “FinalCutProLegacy.xml”, “FinalCutProX.xml” and “DaVinciResolve.edl” (also known as “cmx3600” format and compatible with various editors), can be imported in your software to automatically apply cuts from the EDL file. Depending on the software you use, you may also edit individual cuts manually before applying them. Be aware though that in some editors it may not be possible to add them to an existing project. If this is the case, simply open a new project with the EDL file instead.

Please just let us know if we do not yet provide a cut list format for your favorite audio or video editing program!

Export Uncut Audio

To only detect fillers/silence but NOT cut them, choose the “Export Uncut Audio” mode for “Automatic Cutting” in “Audio Algorithms”. Then you can query cutting times via our API or select your favorite Cut List format as “Output File” to only export cut times for later editing, but without applying cuts during the Auphonic audio post production.

Using the option “Export Uncut Audio”, it is also possible to use our cutting algorithms for video productions. In this case, we will just detect and report cuts, and you can import and apply them in your favorite video editing program afterwards.

Filler Word Cutting Updates

Thanks to your great feedback, we've been able to further optimize our Automatic Filler Word Cutting algorithm.
By now you probably know that our filler word cutter removes all types of “uhm”, “uh”, “mh”, “ähm”, “euh”, “eh” and similar sounds. If you haven't heard about it yet, our release blog post might be a good starting point.

  • Enhanced Fade Curves
    We noticed that due to reverb or background noise in input files, some filler cuts did not sound as smooth as they should have. To prevent such rough cuts, we trained our filler detection models with more diverse speech data and compared different fade curve approaches. Now the filler detection is much more robust against noise. Additionally, we developed an asymmetrical fade solution, which, in our opinion, makes the cuts almost inaudible.

    We nonetheless recommend, though, that you use filler cutting in combination with our Dynamic Denoising or Speech Isolation algorithms. These algorithms remove heavy reverb or noise and thus prevent noise artifacts during cutting.

  • Handling of Affirmative Sounds
    Some of you were bothered by the fact that affirmative sounds, like “mhm”, “aha”, and “yeah” were cut along with filler words. Driven by your feedback, we tweaked our filler detection algorithm in a way that will remove considerably fewer of these sounds.

  • Multitrack Filler Silencing
    We also received requests to optimize filler cutting for crosstalk in Multitrack productions.
    Let's assume that two speech tracks are simultaneously active and one of the two tracks contains a filler word. In this case, we can not cut the filler word in one track without destroying parts of the speech in the other track.
    Our original solution was to skip such a filler. Now, however, we replace it with silence instead. This removes the filler words while preserving all the speech content.

Feedback

If you want to provide us feedback on how you like the updated filler cutting algorithm or about any other features that are missing, you are very welcome to contact us. You can also leave a comment in the feedback section on the status page of your concrete production.







updates

FSF to be deposed in SFC v Vizio, updates relevant FAQ entry




updates

EXPERT INSIGHTS—Latest updates to Illinois personnel records review act

Elizabeth K. Hanford and Shanthi Gaur discuss amendments to Illinois’ Personnel Records Review Act, which impose new obligations on employers navigating personnel record requests.

Westlaw Today

View (Subscription required)




updates

Minimum Salaries and the Evolving Workforce: Why the DOL’s New Automatic Salary Updates Clash With Legal Precedent and Economic Facts

Alexander MacDonald says overtime exemptions are about to get more expensive as the salary necessary to qualify for the FLSA’s “white collar” exemptions will rise in July and again in January 2025.

The Federalist Society




updates

Washington State Legislative Updates

UPDATE: Since publication, we made a clarifying edit concerning the reasons an employee will be able to use paid sick leave under the amended law.

The Washington state legislature and certain localities recently passed several bills affecting employers, some of which have already been signed into law. These measures address non-compete agreements, mandatory employer-sponsored meetings, immigration reporting, paid leave, and the minimum wage. Each new bill or ordinance is discussed below. 

New Law Expands and Clarifies Non-Compete Statute




updates

IRS Updates FAQs on 1099-Ks Used for Gig Workers and Others

The IRS recently updated its guidance for completing Form 1099-K, used primarily by “gig” companies providing compensation using payment apps or online marketplaces and for individuals selling goods on online marketplaces such as Etsy. As background, in order to promote greater tax transparency and compliance, in 2008 Congress enacted Internal Revenue Code section 6050W to require that certain “third party network transactions” be reported on the then-new Form 1099-K.




updates

British Columbia Updates Rules for Investigations, Working Children

George Vassos explains new rules that broaden and clarify British Columbia’s ability to investigate employment compliance matters and tighten rules for hiring children younger than 16 years old.

SHRM Online

View (Subscription required.) 




updates

USCIS Updates Policy Guidance for International Students

The U.S. Citizenship and Immigration Services (USCIS) recently updated guidance in its policy manual regarding international students within F and M student classifications. This new guidance consolidates and provides greater clarity on existing policy for international students.




updates

USCIS Updates Guidance for F-1 Students on OPT and STEM OPT Eligibility

The F-1 nonimmigrant visa status allows noncitizens to study in the United States at U.S. colleges and universities. F-1 students may be eligible for off-campus employment under the following programs: Curricular Practical Training; Optional Practical Training (OPT); and Science, Technology, Engineering, and Mathematics Optional Practical Training Extension (STEM OPT). General eligibility requirements for off-campus F-1 employment include that the training be related to the student’s area of study and be authorized by the Designated School Official and U.S.




updates

No April Foolin’ – OSHA Updates its Worker Walkaround Representative Regulation

On April 1, 2024, the U.S. Occupational Safety and Health Administration (OSHA) published its final rule clarifying that employees may designate a non-employee third party as their representative during an OSHA inspection.




updates

OSHA 101: Practical Inspection Guidance and Regulatory Updates




updates

Cybersecurity Snapshot: New Guides Offer Best Practices for Preventing Shadow AI and for Deploying Secure Software Updates

Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer valuable tips. Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards.

Dive into six things that are top of mind for the week ending Oct. 25.

1 - CSA: How to prevent “shadow AI” 

As organizations scale up their AI adoption, they must closely track their AI assets to secure them and mitigate their cyber risk. This includes monitoring the usage of unapproved AI tools by employees — an issue known as “shadow AI.”

So how do you identify, manage and prevent shadow AI? You may find useful ideas in the Cloud Security Alliance’s new “AI Organizational Responsibilities: Governance, Risk Management, Compliance and Cultural Aspects” white paper.

The white paper covers shadow AI topics including:

  • Creating a comprehensive inventory of AI systems
  • Conducting gap analyses to spot discrepancies between approved and actual AI usage
  • Implementing ways to detect unauthorized AI wares
  • Establishing effective access controls
  • Deploying monitoring techniques

 

 

“By focusing on these key areas, organizations can significantly reduce the risks associated with shadow AI, ensuring that all AI systems align with organizational policies, security standards, and regulatory requirements,” the white paper reads.

For example, to create an inventory that offers the required visibility into AI assets, the document explains different elements each record should have, such as:

  • The asset’s description
  • Information about its AI models
  • Information about its data sets and data sources
  • Information about the tools used for its development and deployment
  • Detailed documentation about its lifecycle, regulatory compliance, ethical considerations and adherence to industry standards
  • Records of its access control mechanisms

Shadow AI is one of four topics covered in the publication, which also unpacks risk management; governance and compliance; and safety culture and training.

To get more details, read:

For more information about AI security issues, including shadow AI, check out these Tenable blogs:

2 - Best practices for secure software updates

The security and reliability of software updates took center stage in July when an errant update caused massive and unprecedented tech outages globally.

To help prevent such episodes, U.S. and Australian cyber agencies have published “Safe Software Deployment: How Software Manufacturers Can Ensure Reliability for Customers.

“It is critical for all software manufacturers to implement a safe software deployment program supported by verified processes, including robust testing and measurements,” reads the 12-page document.

Although the guide is aimed primarily at commercial software vendors, its recommendations can be useful for any organization with software development teams that deploy updates internally.

 

 

The guide outlines key steps for a secure software development process, including planning; development and testing; internal rollout; and controlled rollout. It also addresses errors and emergency protocols.

“A safe software deployment process should be integrated with the organization’s SDLC, quality program, risk tolerance, and understanding of the customer’s environment and operations,” reads the guide, authored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the FBI and the Australian Cyber Security Centre.

To get more details, read:

For more information about secure software updates:

3 - Report: GenAI, attack variety, data security drive cyber strategies

What issues act as catalysts for organizations’ cybersecurity actions today? Hint: They’re fairly recent concerns. The promise and peril of generative AI ranks first. It’s closely followed by the ever growing variety of cyberattacks; and by the intensifying urgency to protect data.

That’s according to CompTIA’s “State of Cybersecurity 2025” report, based on a survey of almost 1,200 business and IT pros in North America and in parts of Europe and Asia. 

These three key factors, along with others like the scale of attacks, play a critical role in how organizations currently outline their cybersecurity game plans.

“Understanding these drivers is essential for organizations to develop proactive and adaptive cybersecurity strategies that address the evolving threat landscape and safeguard their digital assets,” reads a CompTIA blog about the report.

Organizations are eagerly trying to understand both how generative AI can help their cybersecurity programs and how this technology is being used by malicious actors to make cyberattacks harder to detect and prevent.

Meanwhile, concern about data protection has ballooned in the past couple of years. “As organizations become more data-driven, the need to protect sensitive information has never been more crucial,” reads the blog.

Not only are organizations focused on securing data at rest, in transit and in use, but they’re also creating foundational data-management practices, according to the report.

“The rise of AI has accelerated the need for robust data practices in order to properly train AI algorithms, and the demand for data science continues to be strong as businesses seek competitive differentiation,” the report reads.

To get more details, read:

For more information about data security posture management (DSPM) and preventing AI-powered attacks, check out these Tenable resources:

4 - CISA lists software dev practices most harmful for security

Recommended best practices abound in the cybersecurity world. However, CISA and the FBI are taking the opposite tack in their quest to improve the security of software products: They just released a list of the worst security practices that software manufacturers ought to avoid.

Titled “Product Security Bad Practices,” the document groups the “no-nos” into three main categories: product properties; security features; and organizational processes and policies.

“It’s 2024, and basic, preventable software defects continue to enable crippling attacks against hospitals, schools, and other critical infrastructure. This has to stop,” CISA Director Jen Easterly said in a statement.

“These product security bad practices pose unacceptable risks in this day and age, and yet are all too common,” she added.

 

 

Here are some of the worst practices detailed in the document, which is part of CISA’s “Secure by Design” effort:

  • Using programming languages considered “memory unsafe”
  • Including user-provided input in SQL query strings
  • Releasing a product with default passwords
  • Releasing a product with known and exploited vulnerabilities
  • Not using multi-factor authentication
  • Failing to disclose vulnerabilities in a timely manner

Although the guidance is aimed primarily at software makers whose products are used by critical infrastructure organizations, the recommendations apply to all software manufacturers.

If you’re interested in sharing your feedback with CISA and the FBI, you can submit comments about the document until December 16, 2024 on the Federal Register.

To get more details, check out:

For more information about how to develop secure software:

5 - New EU law focuses on cybersecurity of connected digital products

Makers of digital products — both software and hardware — that directly or indirectly connect to networks and to other devices will have to comply with specific cybersecurity safeguards in the European Union.

A newly adopted law known as the “Cyber Resilience Act” outlines cybersecurity requirements for the design, development, production and lifecycle maintenance of these types of products, including IoT wares such as connected cars.

 

 

For example, it specifies a number of “essential cybersecurity requirements” for these products, including that they:

  • Aren’t shipped with known exploitable vulnerabilities
  • Feature a “secure by default” configuration
  • Can fix their vulnerabilities via automatic software updates
  • Offer access protection via control mechanisms, such as authentication and identity management
  • Protect the data they store, transmit and process using, for example, at-rest and in-transit encryption

“The new regulation aims to fill the gaps, clarify the links, and make the existing cybersecurity legislative framework more coherent, ensuring that products with digital components (...) are made secure throughout the supply chain and throughout their lifecycle,” reads a statement from the EU’s European Council.

The law will “enter into force” after its publication in the EU’s official journal and will apply and be enforceable 36 months later, so most likely in October 2027 or November 2027. However, some of its provisions will be enforceable a year prior.

For more information and analysis about the EU’s Cyber Resilience Act:

VIDEO

The EU Cyber Resilience Act: A New Era for Business Engagement in Open Source Software (Linux Foundation) 

6 - UK cyber agency: CISOs must communicate better with boards

CISOs and boards of directors are struggling to understand each other, and this is increasing their organizations’ cyber risk, new research from the U.K.’s cyber agency has found.

For example, in one alarming finding, 80% of respondents, which included board members, CISOs and other cyber leaders in medium and large enterprises, confessed to being unsure of who is ultimately accountable for cybersecurity in their organizations.

“We found that in many organisations, the CISO (or equivalent role) thought that the Board was accountable, whilst the Board thought it was the CISO,” reads a blog about the research titled “How to talk to board members about cyber.

As a result, the U.K. National Cyber Security Centre (NCSC) has released new guidance aimed at helping CISOs better communicate with their organizations’ boards titled “Engaging with Boards to improve the management of cyber security risk.

“Cyber security is a strategic issue, which means you must engage with Boards on their terms and in their language to ensure the cyber risk is understood, managed and mitigated,” the document reads.

Here’s a small sampling of the advice:

  • Understand your audience, including who are the board’s members and their areas of expertise; and how the board works, such as its meeting formats and its committees.
  • Talk about cybersecurity in terms of risks, and outline these risks concretely and precisely, presenting them in a matter-of-fact way.
  • Don’t limit your communication with board members to formal board meetings. Look for opportunities to talk to them individually or in small groups outside of these board meetings.
  • Elevate the discussions so that you link cybersecurity with your organization’s business challenges, goals and context.
  • Aim to provide a holistic view, and avoid using technical jargon.
  • Aim to advise instead of to educate.






updates

Some Spiffy New Updates

The world around us may change quickly, but I've noticed that even the smallest website redesigns take a lot of time. These things are way more complicated than they appear - especially if you think about it way too much. So after a bit of work, today we made some changes to the site ...




updates

AMCA Updates Air-Control-Devices Rating Publication 511

Superseding AMCA Publication 511-21, AMCA Publication 511-21 (Rev. 12-22) outlines technical procedures and the proper presentation of data for the certification of air-control devices through the AMCA Certified Ratings Program (CRP).




updates

Green Link Updates Knucklehead

The biggest competitor for Green Link Eco-Engineering’s KnuckleHead line of rooftop supports is wooden blocks.




updates

Grocers Not Happy With Refrigerant Updates

Food retailers shared their concerns and experiences with refrigeration systems that use alternative refrigerants at the Food Marketing Institute’s (FMI’s) 2023 Energy & Store Development Conference.




updates

Apple Releases Security Updates for Multiple Products

Posted by CISA on Mar 28

Cybersecurity and Infrastructure Security Agency (CISA) - Defend Today, Secure Tomorrow

You are subscribed to Cybersecurity Advisories for Cybersecurity and Infrastructure Security Agency. This information
has recently been updated and is now available.

Apple Releases Security Updates for Multiple Products [
https://www.cisa.gov/news-events/alerts/2023/03/28/apple-releases-security-updates-multiple-products ] 03/28/2023 01:00
PM EDT

Apple...




updates

Epson Updates EF Series Portable Offerings with Two New Projectors

Epson has upgraded its EqiqVision Mini portable lifestyle projector series with the EF22 and EF21, two new laser models featuring advanced setup features and the Google TV streaming platform.



  • Home Theater Projectors

updates

AGU Updates Critical Position Statements on Climate, Communications and Data

We are pleased to announce the approval of three updated position statements that will help shape the future of climate action, science communication and data sharing. AGU position statements—created, revised and approved by members with feedback and support from experts in related fields—are what enable AGU to take adaptive stances on significant policy issues ranging from climate change to national security. These statements, which are updated in a recurring four-year …

The post AGU Updates Critical Position Statements on Climate, Communications and Data appeared first on AGU Blogosphere.




updates

U.S. Plastics Pact Updates PCR Toolkit to Help Businesses Cut Plastic Waste

The update emphasizes collaboration among cross-functional stakeholders—such as procurement, R&D, and corporate sustainability—who often have competing priorities like sustainability commitments and cost control. 




updates

NAB Show Provides Updates on Health and Safety Protocols

Washington, D.C. -- National Association of Broadcasters (NAB) Executive Vice President of Global Connections and Events Chris Brown today issued the following letter to the NAB Show community regarding health and safety plans for the 2021 NAB Show:




updates

[ E.802 (2007) Amendment 2 (06/18) ] - Updates and additional information on the degree of variability function in support of E.802

Updates and additional information on the degree of variability function in support of E.802




updates

[ TD 2564-PLEN ] - English - Word 2003 document - Updates to the Network Forensic and Vulnerability Organizations web page

Updates to the Network Forensic and Vulnerability Organizations web page
Source: Rapporteur Q4/17
Study Questions: Q4/17




updates

[ TD 2118-PLEN ] - English - Word 2003 document - Updates to the Network Forensic and Vulnerability Organizations web page

Updates to the Network Forensic and Vulnerability Organizations web page
Source: Rapporteur Q4/17 (Cybersecurity)
Study Questions: Q4/17




updates

[ TD 1160-PLEN ] - English - MS Word Document 2007 - Updates to NFVO web page

Updates to NFVO web page
Source: Rapporteur Q4/17
Study Questions: Q4/17




updates

Free Roofing Resource DORA Updates Language for Ease of Use

With the changes, DORA underscores its role as a critical resource for accessing complete roofing systems tested in accordance with Chapter 15 of the International Building Code.




updates

Steel Deck Institute Publishes Updates to Roof Deck Design Manual

The new editions have been updated to comply with the 2018 International Building Code and are based on the standards referenced in the code.




updates

New Service Provides Company-Specific Compliance Updates from Regulatory Experts

J.J. Keller & Associates, Inc. introduces the 'Live Regulatory Update Service,' offering customized virtual presentations by subject matter experts in areas including FMCSA, DOT, OSHA, EPA, and more.




updates

New Labor Dept. Rule Updates Hazard Communication Standard

The Labor Department announced OSHA's updated Hazard Communication Standard to align with the Globally Harmonized System, improving hazard classification and labeling for better safety.




updates

XL8 Updates EventCAT

XL8's EventCAT subscription packages support multilingual translations in real time. (Featured on DestinationCRM.com.)





updates

Lenovo updates its Thinkpad notebooks with local pricing and availability details

Do any of these new Lenovo AI-powered notebooks make you want to spend your dollars? #lenovo #copilot+ #ai




updates

BRG to Share .Brand TLD Updates and Insights for Applicants at ICANN81 in Istanbul

The Brand Registry Group (BRG) is the global association of companies and organizations working together to champion the use of .brand top-level domains and includes some of the world's most recognized consumer and B2B brands. In advance of the ICANN81 meeting in Istanbul Türkiye next week, the BRG is providing an update on ICANN's new gTLD program in several sessions that may be of interest to prospective .brand applicants.





updates

Quarterly updates newsletter 2004/3

A quarterly update to all registered members. This newsletter covers the new addition of body stockings and garter, change in homepage design, help on cleaning browser hijacker as well as additional of medical informational articles.