25

2025 UBCM Electoral Area Directors' Forum

Organizer: Union of British Columbia Municipalities
Location: Richmond




25

2025 UBCM Electoral Area Directors' Forum

Organizer: Union of British Columbia Municipalities
Location: Richmond




25

steve cheryl test2 25NOV share to SHARE TO EVENTS.TUFTS.EDU calendar

Nov 25, 2024, 2pm EST

ENT-Event Type: Class/Seminar
Open to Public: Yes



  • 2024/11/25 (Mon)


25

Michigan Supreme Court Clarifies Minimum Wage & Tipped Rates and Schedule for 2025 and Future Years

On September 18, 2024, at the request of the State of Michigan and its attorney general, the Michigan Supreme Court clarified issues relating to future minimum wage rates and minimum cash wage rates for tip-credit employees stemming from an earlier opinion.




25

Employers Have Until July 25, 2023 to Implement New OFCCP Disability Self-Identification Form

On April 25, 2023, the Office of Management and Budget approved the Office of Federal Contract Compliance Programs’ (OFCCP) updated form prospective and current employees must use to voluntarily self-identify as an individual with a disability.  The form is applicable to federal contractors and subcontractors subject to Section 503 of the Rehabilitation Act, which requires contractors to invite applicants to self-identify as disabled at the pre-offer stage, and to invi




25

OFCCP Identifies 250 Federal and Federally Assisted Construction Contractors for Compliance Reviews

On June 5, 2023, the Office of Federal Contract Compliance Programs (OFCCP) published its FY 2023 Construction Corporate Scheduling Announcement List (CSAL). The CSAL includes 250 employers that OFCCP has identified as federal or federally assisted construction contractors.




25

New French Profit-Sharing Act Sets 2025 Deadline for Profitable Small Companies

In France, profit-sharing is the new black. After years of statutory value-sharing bonuses (starting in 2018) and the introduction of compulsory profit-sharing schemes in companies with at least 50 employees (since 2020), the government encouraged trade unions to finalize a national and intersectoral collective bargaining agreement (CBA) on the subject of profit-sharing. This led to a CBA signed in February 2023. The new Profit-Sharing Act of November 19, 2023 transposes this CBA into law and adds some new provisions.




25

The Massachusetts PFML: 2025 Contribution Rates and Benefit Amounts

The Massachusetts Department of Family and Medical Leave (Department) just announced the 2025 weekly benefit amount and contribution rates for both employers and employees under the state’s Paid Family and Medical Leave benefit program, which is funded through a payroll tax.




25

New Legislation and New PAGA in CA, New Administration in DC – How Can Employers Thrive in 2025?




25

Littler Attorneys in Four European Countries Recognized in the 2025 Editions of Best Lawyers™

(June 21, 2024) – Littler, the world’s largest employment and labor law practice representing management, and its attorneys have been featured in the 2025 editions of Best Lawyers® in France, Germany, Italy and the United Kingdom.

The individual attorneys that were listed include the following:




25

More Than 240 Littler Attorneys Recognized in 2025 Editions of Best Lawyers in America® and Best Lawyers: Ones To Watch® in America

(August 15, 2024) – More than 240 lawyers  from Littler, the world’s largest employment and labor law practice representing management, have been included in the 31st edition of The Best Lawyers in America® guide.




25

Littler Recognized in 2025 Chambers Latin America Guide

(August 22, 2024) – Littler, the world’s largest employment and labour law practice representing management, and its attorneys in several Latin American offices have once again been recognized by Chambers and Partners in the Chambers Latin America 2025 guide.

Littler’s Colombia and Costa Rica offices earned a Band 1 ranking for Labour & Employment and its Mexico, Puerto Rico and Venezuela offices received band rankings in the same practice area.

In addition, the following attorneys were named as leaders in the field for the Labour & Employment practice area:




25

Three Littler Partners Recognized in the 2025 Edition of the Best Lawyers in Canada™

TORONTO (August 29, 2024) – Littler, the world’s largest employment and labour law practice representing management, is pleased to announce that three of its attorneys have been featured in the 2025 edition of The Best Lawyers in Canada™ in Labour and Employment Law.

The attorneys included in this year’s edition were:




25

Labour and Employment Law in Canada – 2024 in Review & Trends for 2025




25

Littler Receives National Tier 1 Rankings in the 2025 Edition of Best Lawyers® “Best Law Firms®” List

(November 7, 2024) – For the 15th consecutive year Littler, the world’s largest employment and labor law practice representing management, has achieved “National Tier 1” rankings for the following practice areas in the 15th edition of Best Law Firms®, ranked by Best Lawyers®:




25

From Bugs to Breaches: 25 Significant CVEs As MITRE CVE Turns 25

Twenty five years after the launch of CVE, the Tenable Security Response Team has handpicked 25 vulnerabilities that stand out for their significance.

Background

In January 1999, David E. Mann and Steven M. Christey published the paper “Towards a Common Enumeration of Vulnerabilities” describing an effort to create interoperability between multiple vulnerability databases. To achieve a common taxonomy for vulnerabilities and exposures, they proposed Common Vulnerabilities and Exposures (CVE). In September 1999, the MITRE Corporation finalized the first CVE list, which included 321 records. CVE was revealed to the world the following month.

As of October 2024, there are over 240,000 CVEs. including many that have significantly impacted consumers, businesses and governments. The Tenable Security Response Team has chosen to highlight the following 25 significant vulnerabilities, followed by links to product coverage for Tenable customers to utilize.

25 Significant CVEs

CVE-1999-0211: SunOS Arbitrary Read/Write Vulnerability

Arbitrary ReadArbitrary WriteLocalCritical1999Why it’s significant: To our knowledge, there is no formally recognized “first CVE.” However, the GitHub repository for CVE.org shows that the first CVE submitted was CVE-1999-0211 on September 29, 1999 at 12:00AM. Because it was the first one, we’ve chosen to highlight it. The vulnerability was first identified in 1991 and a revised patch was issued in 1994.

CVE-2010-2568: Windows Shell Remote Code Execution Vulnerability

Remote Code ExecutionExploitedZero-DayLocalStuxnetHigh2010Why it’s significant: Regarded as one of the most sophisticated cyberespionage tools ever created, Stuxnet was designed to target SCADA systems in industrial environments to reportedly sabotage Iran's nuclear program. Stuxnet exploited CVE-2010-2568 as one of its initial infection vectors, spreading via removable drives. Once a compromised USB drive was inserted into a system, Stuxnet was executed automatically via the vulnerability, infecting the host machine, propagating to other systems through network shares and additional USB drives.

CVE-2014-0160: OpenSSL Information Disclosure Vulnerability

HeartbleedInformation DisclosureExploitedZero-DayNetworkCybercriminalsHigh2014Why it’s significant: Dubbed “Heartbleed” because it was found in the Heartbeat extension of OpenSSL, this vulnerability allows an attacker, without prior authentication, to send a malicious heartbeat request with a false length field, claiming the packet contains more data than it does. The receiving system would then return data from its memory extending beyond the legitimate request, which may include sensitive private data, such as server keys and user credentials. OpenSSL is used by millions of websites, cloud services, and even VPN software, for encryption, making Heartbleed one of the most widespread vulnerabilities at the time.

CVE-2014-6271: GNU Bash Shellshock Remote Code Execution Vulnerability

Shellshock Bash Bug Remote Code ExecutionExploitedZero-DayNetworkCybercriminalsCritical2014Why it’s significant: An attacker could craft an environment variable that contained both a function definition and additional malicious code. When Bash, a command interpreter used by Unix-based systems including Linux and macOS, processed this variable, it would execute the function, but also run the arbitrary commands appended after the function definition. “Shellshock” quickly became one of the most severe vulnerabilities discovered, comparable to Heartbleed’s potential impact. Attackers could exploit Shellshock to gain full control of vulnerable systems, leading to data breaches, service interruptions and malware deployment. The impact extended far beyond local systems. Bash is used by numerous services, particularly web servers, via CGI scripts to handle HTTP requests.

CVE-2015-5119: Adobe Flash Player Use After Free

Remote Code Execution Denial-of-ServiceExploitedZero-DayCybercriminalsAPT GroupsCritical2015Why it’s significant: Discovered during the Hacking Team data breach, it was quickly weaponized, appearing in multiple exploit kits. CVE-2015-5119 is a use-after-free flaw in Flash’s ActionScript ByteArray class, allowing attackers to execute arbitrary code by tricking users into visiting a compromised website. It was quickly integrated into attack frameworks used by Advanced Persistent Threat (APT) groups like APT3, APT18, and Fancy Bear (APT28). These groups, with ties to China and Russia, used the vulnerability to spy on and steal data from governments and corporations. Fancy Bear has been associated with nation-state cyber warfare, exploiting Flash vulnerabilities for political and military intelligence information gathering​. This flaw, along with several other Flash vulnerabilities, highlighted Flash’s risks, accelerating its eventual phase-out.

CVE-2017-11882: Microsoft Office Equation Editor Remote Code Execution Vulnerability

Remote Code ExecutionExploitedNetworkCybercriminalsAPT GroupsHigh2017Why it’s significant: The vulnerability existed for 17 years in Equation Editor (EQNEDT32.EXE), a Microsoft Office legacy component used to insert and edit complex mathematical equations within documents. Once CVE-2017-11882 became public, cybercriminals and APT groups included it in maliciously crafted Office files. It became one of 2018’s most exploited vulnerabilities and continues to be utilized by various threat actors including SideWinder.

CVE-2017-0144: Windows SMB Remote Code Execution Vulnerability

EternalBlueRemote Code ExecutionExploitedNetworkWannaCry NotPetyaHigh2017Why it’s significant: CVE-2017-0144 was discovered by the National Security Agency (NSA) and leaked by a hacker group known as Shadow Brokers, making it widely accessible. Dubbed “EternalBlue,” its capacity to propagate laterally through networks, often infecting unpatched machines without human interaction, made it highly dangerous. It was weaponized in the WannaCry ransomware attack in May 2017 and spread globally. It was reused by NotPetya, a data-destroying wiper originally disguised as ransomware. NotPetya targeted companies in Ukraine before spreading worldwide. This made it one of history’s costliest cyberattacks.

CVE-2017-5638: Apache Struts 2 Jakarta Multipart Parser Remote Code Execution Vulnerability

Remote Code ExecutionExploitedNetworkEquifax BreachCritical2017Why it’s significant: This vulnerability affects the Jakarta Multipart Parser in Apache Struts 2, a popular framework for building Java web applications. An attacker can exploit it by injecting malicious code into HTTP headers during file uploads, resulting in remote code execution (RCE), giving attackers control of the web server. CVE-2017-5638 was used in the Equifax breach, where personal and financial data of 147 million people was stolen, emphasizing the importance of patching widely-used frameworks, particularly in enterprise environments, to prevent catastrophic data breaches.

CVE-2019-0708: Remote Desktop Services Remote Code Execution Vulnerability

BlueKeep DejaBlue Remote Code ExecutionExploitedNetworkRansomware GroupsCybercriminalsCritical2019Why it’s significant: Dubbed "BlueKeep," this vulnerability in Windows Remote Desktop Services (RDS) was significant for its potential for widespread, self-propagating attacks, similar to the infamous WannaCry ransomware. An attacker could exploit this flaw to execute arbitrary code and take full control of a machine through Remote Desktop Protocol (RDP), a common method for remote administration. BlueKeep was featured in the Top Routinely Exploited Vulnerabilities list in 2022 and was exploited by affiliates of the LockBit ransomware group.

CVE-2020-0796: Windows SMBv3 Client/Server Remote Code Execution Vulnerability

SMBGhost EternalDarknessRemote Code ExecutionExploited NetworkCybercriminalsRansomware GroupsCritical2020Why it’s significant: Its discovery evoked memories of EternalBlue because of the potential for it to be wormable, which is what led to it becoming a named vulnerability. Researchers found it trivial to identify the flaw and develop proof-of-concept (PoC) exploits for it. It was exploited in the wild by cybercriminals, including the Conti ransomware group and its affiliates.

CVE-2019-19781: Citrix ADC and Gateway Remote Code Execution Vulnerability

Path TraversalExploitedNetworkAPT GroupsRansomware GroupsCybercriminalsCritical2019Why it’s significant: This vulnerability in Citrix Application Delivery Controller (ADC) and Citrix Gateway is significant due to its rapid exploitation by multiple threat actors, including state-sponsored groups and ransomware affiliates. By sending crafted HTTP requests, attackers could gain RCE and take full control of affected devices to install malware or steal data. The vulnerability remained unpatched for a month after its disclosure, leading to widespread exploitation. Unpatched systems are still being targeted today, highlighting the risk of ignoring known vulnerabilities.

CVE-2019-10149: Exim Remote Command Execution Vulnerability

Remote Command ExecutionExploitedNetworkAPT GroupsCybercriminalsCritical2019Why it’s significant: This vulnerability in Exim, a popular Mail Transfer Agent, allows attackers to execute arbitrary commands with root privileges simply by sending a specially crafted email. The availability of public exploits led to widespread scanning and exploitation of vulnerable Exim servers, with attackers using compromised systems to install cryptocurrency miners (cryptominers), launch internal attacks or establish persistent backdoors. The NSA warned that state-sponsored actors were actively exploiting this flaw to compromise email servers and gather sensitive information.

CVE-2020-1472: Netlogon Elevation of Privilege Vulnerability

ZerologonElevation of PrivilegeExploitedLocalRansomware GroupsAPT GroupsCybercriminalsCritical2020Why it’s significant: This vulnerability in the Netlogon Remote Protocol (MS-NRPC) allows attackers with network access to a Windows domain controller to reset its password, enabling them to impersonate the domain controller and potentially take over the entire domain. Its severity was underscored when Microsoft reported active exploitation less than two months after disclosure and the Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive to patch the flaw. Despite available patches, it continues to be exploited by ransomware groups, APT groups, and others, highlighting its broad and ongoing impact on network security.

CVE-2017-5753: CPU Speculative Execution Bounds Check Bypass Vulnerability

SpectreSpeculative Execution Bounds Check BypassLocalMedium2018Why it’s significant: In a speculative execution process, an idle microprocessor waiting to receive data speculates what the next instruction might be. Although meant to enhance performance, this process became a fundamental design flaw affecting the security of numerous modern processors. In Spectre’s case, an attacker-controlled process could read arbitrary memory belonging to another process. Since its discovery in January 2018, Spectre has affected nearly all modern processors from Intel, AMD and ARM. While it’s difficult to execute a successful Spectre attack, fully remediating the root cause is hard and requires microcode as well as operating system updates to mitigate the risk.

CVE-2017-5754: CPU Speculative Execution Rogue Data Cache Load Vulnerability

MeltdownSpeculative Execution Rogue Data Cache LoadLocalHigh2018Why it’s significant: Meltdown, another speculative execution vulnerability released alongside Spectre, can allow a userspace program to read privileged kernel memory. It exploits a race condition between the memory access and privilege checking while speculatively executing instructions. Meltdown impacts desktop, laptop and cloud systems and, according to researchers, may affect nearly every Intel processor released since 1995. With a wide reaching impact, both Spectre and Meltdown sparked major interest in a largely unexplored security area. The result: a slew of research and vulnerability discoveries, many of which were also given names and logos. While there’s no evidence of a successful Meltdown exploit, the discovery showcased the risk of security boundaries enforced by hardware.

CVE-2021-36942: Windows LSA Spoofing Vulnerability

PetitPotamSpoofingExploitedZero-DayNetworkRansomware GroupsHigh2021Why it’s significant: This vulnerability can force domain controllers to authenticate to an attacker-controlled destination. Shortly after a PoC was disclosed, it was adopted by ransomware groups like LockFile, which have chained Microsoft Exchange vulnerabilities with PetitPotam to take over domain controllers. Patched in the August 2021 Patch Tuesday release, the initial patch for CVE-2021-36942 only partially mitigated the issue, with Microsoft pushing general mitigation guidance for defending against NTLM Relay Attacks.

CVE-2022-30190: Microsoft Windows Support Diagnostic Tool Remote Code Execution

FollinaRemote Code ExecutionExploitedZero-DayLocalQakbot RemcosHigh2022Why it’s significant: Follina, a zero-day RCE vulnerability in MSDT impacting several versions of Microsoft Office, was later designated CVE-2022-30190. After public disclosure in May 2022, Microsoft patched Follina in the June 2022 Patch Tuesday. After disclosure, reports suggested that Microsoft dismissed the flaw’s initial disclosure as early as April 2022. Follina has been widely adopted by threat actors and was associated with some of 2021’s top malware strains in a joint cybersecurity advisory from CISA and the Australian Cyber Security Centre (ACSC), operating under the Australian Signals Directorate (ASD).

CVE-2021-44228: Apache Log4j Remote Code Execution Vulnerability

Log4ShellRemote Code ExecutionExploitedNetworkCybercriminalsAPT GroupsCritical2021Why it’s significant: Log4j, a Java logging library widely used across many products and services, created a large attack surface. The discovery of CVE-2021-44228, dubbed “Log4Shell,” caused great concern, as exploitation simply requires sending a specially crafted request to a server running a vulnerable version of Log4j. After its disclosure, Log4Shell was exploited in attacks by cryptominers, DDoS botnets, ransomware groups and APT groups including those affiliated with the Iranian Islamic Revolutionary Guard Corps (IRGC).

CVE-2021-26855: Microsoft Exchange Server Server-Side Request Forgery Vulnerability

ProxyLogonServer-Side Request Forgery (SSRF)ExploitedZero-DayNetworkAPT Groups Ransomware GroupsCybercriminalsCritical2021Why it’s significant: CVE-2021-26855 was discovered as a zero-day along with four other vulnerabilities in Microsoft Exchange Server. It was exploited by a nation-state threat actor dubbed HAFNIUM. By sending a specially crafted HTTP request to a vulnerable Exchange Server, an attacker could steal the contents of user mailboxes using ProxyLogon. Outside of HAFNIUM, ProxyLogon has been used by ransomware groups and other cybercriminals. Its discovery created a domino effect, as other Exchange Server flaws, including ProxyShell and ProxyNotShell, were discovered, disclosed and subsequently exploited by attackers.

CVE-2021-34527: Microsoft Windows Print Spooler Remote Code Execution Vulnerability

PrintNightmareRemote Code ExecutionExploitedLocalAPT GroupsRansomware GroupsCybercriminalsHigh2021Why it’s significant: This RCE in the ubiquitous Windows Print Spooler could grant authenticated attackers arbitrary code execution privileges as SYSTEM. There was confusion surrounding the disclosure of this flaw, identified as CVE-2021-34527 and dubbed “PrintNightmare.” Originally, CVE-2021-1675, disclosed in June 2021, was believed to be the real PrintNightmare. However, Microsoft noted CVE-2021-1675 is “similar but distinct” from PrintNightmare. Since its disclosure, several Print Spooler vulnerabilities were disclosed, while a variety of attackers, including the Magniber and Vice Society ransomware groups exploited PrintNightmare.

CVE-2021-27101: Accellion File Transfer Appliance (FTA) SQL Injection Vulnerability

SQL InjectionExploitedZero-DayNetworkRansomware GroupCritical2021Why it’s significant: The file transfer appliance from Accellion (now known as Kiteworks) was exploited as a zero-day by the CLOP ransomware group between December 2020 and early 2021. Mandiant, hired by Kiteworks to investigate, determined that CLOP (aka UNC2546) exploited several flaws in FTA including CVE-2021-27101. This was CLOP’s first foray into targeting file transfer solutions, as they provide an easy avenue for the exfiltration of sensitive data that can be used to facilitate extortion.

CVE-2023-34362: Progress Software MOVEit Transfer SQL Injection Vulnerability

SQL InjectionExploitedZero-DayNetworkRansomware GroupCritical2023Why it’s significant: CLOP’s targeting of file transfer solutions culminated in the discovery of CVE-2023-34362, a zero-day in Progress Software’s MOVEit Transfer, a secure managed file transfer software. CLOP targeted MOVEit in May 2023 and the ramifications are still felt today. According to research conducted by Emsisoft, 2,773 organizations have been impacted and information on over 95 million individuals has been exposed as of October 2024. This attack underscored the value in targeting file transfer solutions.

CVE-2023-4966: Citrix NetScaler and ADC Gateway Sensitive Information Disclosure Vulnerability

CitrixBleedInformation DisclosureExploitedZero-DayNetworkRansomware GroupsAPT GroupsCritical2023Why it’s significant: CVE-2023-4966, also known as “CitrixBleed,” is very simple to exploit. An unauthenticated attacker could send a specially crafted request to a vulnerable NetScaler ADC or Gateway endpoint and obtain valid session tokens from the device’s memory. These session tokens could be replayed back to bypass authentication, and would persist even after the available patches had been applied. CitrixBleed saw mass exploitation after its disclosure, and ransomware groups like LockBit 3.0 and Medusa adopted it.

CVE-2023-2868: Barracuda Email Security Gateway (ESG) Remote Command Injection Vulnerability

Remote Command InjectionExploitedZero-DayNetworkAPT GroupsCritical2023Why it’s significant: Researchers found evidence of zero-day exploitation of CVE-2023-2868 in October 2022 by the APT group UNC4841. While Barracuda released patches in May 2023, the FBI issued a flash alert in August 2023 declaring them “ineffective,” stating that “active intrusions” were being observed on patched systems. This led to Barracuda making an unprecedented recommendation for the “immediate replacement of compromised ESG appliances, regardless of patch level.”

CVE-2024-3094: XZ Utils Embedded Malicious Code Vulnerability

Embedded Malicious CodeZero-DayUnknown Threat Actor (Jia Tan)Critical2024Why it’s significant: CVE-2024-3094 is not a traditional vulnerability. It is a CVE assigned for a supply-chain backdoor discovered in XZ Utils, a compression library found in various Linux distributions. Developer Andres Freund discovered the backdoor while investigating SSH performance issues. CVE-2024-3094 highlighted a coordinated supply chain attack by an unknown individual that contributed to the XZ GitHub project for two and a half years, gaining the trust of the developer before introducing the backdoor. The outcome of this supply chain attack could have been worse were it not for Freund’s discovery.

Identifying affected systems

A list of Tenable plugins for these vulnerabilities can be found on the individual CVE pages:




25

You look like death : tales from the Umbrella Academy / story, Gerard Way and Shaun Simon ; art & colors, I.N.J. Culbard ; letters, Nate Piekos of Blambot ; cover and chapter breaks by Gabriel Bá.

"When 18-year-old Klaus gets himself kicked out of the Umbrella Academy and his allowance discontinued, he heads to a place where his ghoulish talents will be appreciated— Hollywood. But after a magical high on a stash stolen from a vampire drug lord, Klaus needs help, and doesn't have his siblings there to save him." -- Provided by publisher.




25

1225 Christmas Tree Lane Debbie Macomber.

Welcome to Christmas Town! The people of Cedar Cove know how to celebrate Christmas. Like Grace and Olivia and everyone else, Beth Morehouse expects this Christmas to be one of her best. Her small Christmas tree farm is prospering, her daughters and her dogs are happy and well, and her new relationship with local vet Ted Reynolds is showing plenty of romantic promise. But...someone recently left a basket filled with puppies on her doorstep, puppies she's determined to place in good homes. That's complication number one. And number two is that her daughters, Bailey and Sophie, have invited their dad, Beth's long-divorced husband, Kent, to Cedar Cove for Christmas. The girls have visions of a mom-and-dad reunion dancing in their heads. As always in life-and in Cedar Cove-there are surprises, too. More than one family's going to have a puppy under the tree. More than one scheme will go awry. And more than one romance will have a happy ending!




25

Estudio sobre el COVID-19 en el área rural de Guatemala: Efectos de largo plazo sobre la seguridad alimentaria y nutricional de los hogares en el Altiplano Occidental

Desde el inicio de la pandemia del COVID-19, los productores agrícolas de Guatemala han afrontado múltiples restricciones de movimiento tanto locales como nacionales, así como también disrupciones en las cadenas de valor agrícolas. Asimismo, los productores han estado expuestos a varios choques externos como las tormentas tropicales de ETA e IOTA hacia finales de 2020 y el reciente conflicto bélico en Europa del Este y crisis de precios.




25

Mapeo de intervenciones en seguridad alimentaria y nutrición en Guatemala: Análisis a nivel municipal

La desnutrición y la deficiencia de micronutrientes es un problema grave en Guatemala. Los resultados de la IV Encuesta Nacional de Salud Materno-Infantil 2014-15 (MSPAS, INE, ICF, 2017) indican que el 46.5% de los niños menores de cinco años padecen de desnutrición crónica. Según el portal de datos del Banco Mundial, Guatemala es el país con mayor prevalencia de desnutrición crónica de América Latina y el Caribe y sexto en el mundo.




25

Factores que impulsan la migración de la sierra a la selva en el Perú – Nota conceptual del estudio

En el Perú, se estima que hay aproximadamente 6 millones de personas que migraron internamente en algún momento de su vida. Esto equivale al 20.3% de la población, siendo su mayoría originaria de la serranía peruana. Aunque Lima es el principal polo de atracción, en los últimos años, se ha observado un aumento en la migración hacia las regiones de Madre de Dios, Tacna, Arequipa y Moquegua (INEI, 2022). Entre el 2002 y 2007, Madre de Dios fue el departamento que tuvo la mayor cantidad de migrantes con un saldo migratorio neto de 14,8% (Yamada, 2012).




25

El Louvre pone el foco en el enigmático “Pierrot” de Watteau

El Louvre pone el foco en el enigmático “Pierrot” de Watteau Del 16 de octubre...




25

Landnutzung, natürliche ressourcen und welternährung




25

Une analyse comparative des méthodes de mise á jour et de rééquilibrage des matrices de comptabilité sociale

Les modèles d’équilibre général calculable (MEGC), largement admis dans la littérature et utilisés comme outils d’analyse d’impacts potentiels de politiques économiques, sont alimentés par des données provenant de la Matrice de Comptabilité Sociale (MCS). Celle-ci appartient à la grande famille des comptes nationaux, représentant l’ensemble des interrelations entre les activités, les institutions d’une économie.




25

Síntesis de evidencia: Lineamientos para el diseño de programas crediticios agropecuarios condicionados para el fomento de prácticas agropecuarias sostenibles

Síntesis de evidencia: Lineamientos para el diseño de programas crediticios agropecuarios condicionados para el fomento de prácticas agropecuarias sostenibles

Enfoques para el desarrollo de políticas del sistema alimentario.

The post Síntesis de evidencia: Lineamientos para el diseño de programas crediticios agropecuarios condicionados para el fomento de prácticas agropecuarias sostenibles appeared first on IFPRI.




25

Eyewitness travel. Back roads Germany, [2017] / contributors, Jürgen Scheunemann, James Stewart, Neville Walker, Christian Williams.




25

Mosher-Jordan (2024-2025) (Housing) (November 13, 2024 7:30pm)

Event Begins: Wednesday, November 13, 2024 7:30pm
Location: WISE RP hub/ Mo Living Room
Organized By: Sessions @ Michigan





25

Bursley Hall (2024-2025) (Housing) (November 13, 2024 6:30pm)

Event Begins: Wednesday, November 13, 2024 6:30pm
Location: Douglas 6th Floor Lounge
Organized By: Sessions @ Michigan





25

Munger Graduate Residences (2024-2025) (Housing) (November 13, 2024 6:00pm)

Event Begins: Wednesday, November 13, 2024 6:00pm
Location: Munger Fellows Lounge
Organized By: Sessions @ Michigan


Come Join the Munger Community by attending events hosted by our RA's! Feel free to select and attend as many events as you would like!




25

Engendering Respectful Communities - AY24 - 25 Workshops (November 13, 2024 6:00pm)

Event Begins: Wednesday, November 13, 2024 6:00pm
Location: 2001 Literature Science and the Arts Building; 500 S State St, Ann Arbor, MI 48109
Organized By: Sessions @ Michigan


Engendering Respectful Communities (ERC) is a one session workshop that engages graduate students in meaningful dialogue about various forms of sexual misconduct they may encounter in both professional and social spaces, and provides resources for intervention or support in such circumstances.

The primary goal of the workshop is to address complexities experienced by graduate students as they engage in bystander intervention, so that participants gain an increase in awareness of barriers to action and familiarity with strategic planning to overcome them. The workshop also introduces participants to on-campus resources and provides knowledge on how sexual misconduct can unfold in graduate-specific settings.
The ERC workshop uses small-group circles intended to promote active reflection and space to build community. The procedure of circles is introduced at the beginning of the workshop in order to help participants get used to the process, which they do through a circle for introductions and value-sharing for the workshop space. These circles depict various, realistic scenarios related to sexual misconduct within the graduate community. The circle process allows circle members to process the monologues, reflect on complexities with identity and power dynamics within them, name potential barriers to intervention, and think of various ways in which they might respond if faced with similar situations. The circles provide a way to foster collective building of ideas, where participants learn from one another and all input is equally valued. Participants are encouraged to share but can always pass if desired, creating an environment where participation is open but not forced. Due to the participatory nature of the workshop, if you are to arrive more than 20 minutes late, we will ask you to re-register for another workshop session.If you have any questions about or concerns with taking this workshop, or are in need of an exemption, please contact jhippe@umich.edu or fill out this form. We know some students come to campus having already experienced harm. If you have circumstances that make completing this course challenging, please reach out to the GROPWE team. SAPAC GROWE provides exemptions to the ERC workshop (where requirements are set in place) on a case by case basis. The Program Manager will communicate with students requesting exemptions via email and/or meet with students via zoom meetings to discuss their need for exemptions and provide any relevant and necessary resources.




25

Baits II (2024-2025) (Housing) (November 13, 2024 5:00pm)

Event Begins: Wednesday, November 13, 2024 5:00pm
Location: Coman Lounge
Organized By: Sessions @ Michigan





25

2025 Possibilities Summit Alumni Panel - November 13th (November 13, 2024 5:00pm)

Event Begins: Wednesday, November 13, 2024 5:00pm
Location:
Organized By: University Career Center


This informative presentation will help you learn about therecruitment process for the Goldman Sachs 2025 Possibilities Summit program. Hear from our Campus Recruiting team as well as Possibilities Summit alumni at the firm about their unique career pathways to their current roles and lessons learned along the way. While our session is open to all students, we encourage current Freshmen & Sophomores to come learn about our 2026 and 2027 Summer Analyst opportunities. We ask that you register through our GS Events portal in order to track your attendance. The registration can be accessed by copying and pasting the following: https://recruiting360.avature.net/candidates?projectId=21470&source=Campus




25

West Quad (2024-2025) (Housing) (November 13, 2024 4:00pm)

Event Begins: Wednesday, November 13, 2024 4:00pm
Location: Davidson Wintergarden
Organized By: Sessions @ Michigan





25

Study Abroad Info Sessions: CGIS Spanish-language Programs - Spring/Summer 2025 (November 13, 2024 3:00pm)

Event Begins: Wednesday, November 13, 2024 3:00pm
Location: Off Campus Location
Organized By: Center for Global and Intercultural Study


Want to fulfill Spanish major/minor requirements abroad? Join CGIS Advisor Juliana Mesa to learn more about the CGIS Spanish-language program offerings in Spring/Summer 2025.

Note: CGIS Spring/Summer 2025 applications open in October 1st, 2024 and close on January 15th, 2025.




25

Puentes 2024 - 2025 (November 13, 2024 12:00pm)

Event Begins: Wednesday, November 13, 2024 12:00pm
Location: UMMA 525 S State St- Multipurpose Room
Organized By: Sessions @ Michigan





25

dije Office 2024-2025 (November 13, 2024 12:00pm)

Event Begins: Wednesday, November 13, 2024 12:00pm
Location: dije Office Lounge (Room 1001) Education Building
Organized By: Sessions @ Michigan


The dije Office in the Marsal Family School of Education is eager to host a multitude of events for our community. Use this Sessions track to register for our upcoming programs. We look forward to seeing you soon!




25

Program in Biology & Undergraduate Program in Neuroscience Events 2024 - 2025 (November 13, 2024 11:00am)

Event Begins: Wednesday, November 13, 2024 11:00am
Location: Biological Sciences Building Atrium (BSB)
Organized By: Sessions @ Michigan


Events in this track are open to all current and prospective PiB and UPiN students. We hope to see you!




25

Oxford Houses (2024-2025) (Housing) (November 13, 2024 10:00am)

Event Begins: Wednesday, November 13, 2024 10:00am
Location: Meet at the Community Center!
Organized By: Sessions @ Michigan





25

Work Truck Week 2025

Work Truck Week includes the Green Truck Summit, extensive education and training, exhibits, ride and drive, and multiple networking opportunities. Clean Cities and Communities will once again be exhibiting in the expo hall, as well as hosting a tour of the show floor.

Use promo code CLEANCITIES25 for discounts on:

  • Green Truck Summit (GTS) Conference Package at the NTEA member price ($489 through Feb. 7, 2025). New for 2025, the Opening Reception is included in the GTS Conference Package.
  • Free admission pass and online promo code for access to all three days of WTW25 exhibits, ride and drive, and one WTW Breakout Session.




25

Extended Partial Alley Closure. W. Foster Avenue to W. Berwyn Avenue, alley west of 5200 thru 5268 N. Winthrop Avenue and alley east of 5201thru 5259 N. Broadway

Extended Partial Alley Closure. W. Foster Avenue to W. Berwyn Avenue, alley west of 5200 thru 5268 N. Winthrop Avenue and alley east of 5201thru 5259 N. Broadway for station wall construction.




25

Daily Sidewalk and Parking Lane Closures at N. Clark Street between W. Roscoe Street and approx. 250ft south

Daily Sidewalk and Parking Lane Closures at N. Clark Street between W. Roscoe Street and approx. 250ft south for substation wall construction.




25

New Dates, Daily Sidewalk and Parking Lane Closures at N. Clark Street between W. Roscoe Street and approx. 250ft south

New Dates, Daily Sidewalk and Parking Lane Closures at N. Clark Street between W. Roscoe Street and approx. 250ft south for Substation Wall Construction.




25

CTA Proposes Balanced 2025 Operating Budget That Charts the Course for a Transit Riding Experience Better Than Pre-Pandemic/2019

The Chicago Transit Authority (CTA) today proposed a $2.16 billion operating budget that keeps fares at current levels, delivers more bus and rail service hours than provided in 2019, and fuels new and ongoing investments to either expand or modernize existing infrastructure, while also evolving current systems to meet modern transit riding needs.




25

Alley Impacts at the alley west of 5800 thru 5925 N. Winthrop Avenue and the alley east of 5843 thru 5921 N. Broadway (W. Ardmore Avenue to W. Thorndale Avenue)

Alley Impacts at the alley west of 5800 thru 5925 N. Winthrop Avenue and the alley east of 5843 thru 5921 N. Broadway (W. Ardmore Avenue to W. Thorndale Avenue) for wall repairs.




25

Daily Alley Closure at The alley east of 5239 thru 5259 N. Broadway (W. Foster Avenue to W. Berwyn Avenue)

Daily Alley Closure at The alley east of 5239 – 5259 N. Broadway (W. Foster Avenue to W. Berwyn Avenue) for concrete placement




25

#125 Temporary Northbound Reroute near Wacker/Franklin (Minor Delays / Reroute)

(Tue, Nov 12 2024 9:53 AM to TBD) Northbound 125 buses are temporarily rerouted via Wacker, LaSalle, and Illinois near Wacker/Franklin.




25

Summer School 6: Operations and 25,000 roses

"It's difficult to control everything," says our guest professor for this week, Santiago Gallino. "What is not difficult is to plan for everything." Today we venture into the sphere of business that masters the planning, and backup planning: operations management.

It's more than just predicting a bottleneck and imagining a solution, because there's always a bottleneck to clear. It's about modeling, and weighing the costs of messing up vs. missing out. For instance, take a newspaper vendor who has to decide how many newspapers to sell tomorrow morning. Do they buy fewer, knowing that they'll sell out–and then miss out on potential revenue from papers not sold? Or do they order more than they expect to sell, just in case–and eat the cost of a few unsold papers? This type of trade-off applies to all kinds of businesses, and Gallino talks us through how to choose.

The only certainty in this life is uncertainty. But we are certain you will come out of this episode feeling better prepared for your future business. And fortunately, there are no bottlenecks in podcasting.

The series is hosted by Robert Smith and produced by Max Freedman. Our project manager is Julia Carney. This episode was edited by Alex Goldmark and engineered by James Willetts. The show is fact-checked by Sierra Juarez.

Help support Planet Money and get bonus episodes by subscribing to Planet Money+ in Apple Podcasts or at plus.npr.org/planetmoney.


Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy




25

Summer School 5: 250 years of trade history in three chapters

Episodes each Wednesday through labor day. Find all the episodes from this season here. And past seasons here. And follow along on TikTok here for video Summer School.

Trade has come up in all of the episodes of Summer School so far. An early use of money was to make trade easier. Trade was responsible for the birth of companies and the stock market. And trade was the lifeblood of the early United States.

Today's episode covers 250 years of trade history in three chapters. We start with one of the founding texts of economics, Wealth of Nations, in which Adam Smith argues a country's true value is not measured in gold and silver, but by its people's ability to buy things that enhance their standard of living. Then we'll watch American politicians completely ignore that argument in favor of protecting domestic industries – until one congressman makes a passionate case for free trade as the means to world peace. And finally we'll follow the trade debate up to the modern day, where the tides of American politics have turned toward regulation.

This series is hosted by Robert Smith and produced by Audrey Dilling. Our project manager is Devin Mellor. This episode was edited by Planet Money Executive Producer Alex Goldmark and fact-checked by Sofia Shchukina.

Subscribe to Planet Money+ for sponsor-free episode listening
in Apple Podcasts or at plus.npr.org/planetmoney.

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy




25

2024-25 High School Course Description Guide

The following is a link to the high school course description guide for 2024-25. It contains all of the classes and graduation requirements for high school students. Students should see their high school counselor with any questions regarding graduation requirements. Click here to access the Google document of the high school course description guide for […]

The post 2024-25 High School Course Description Guide appeared first on Forest Hills Public Schools.



  • Central High News
  • Eastern High News
  • Northern High News