ero ETSI launches remote Plugtests Programme for Mission Critical Services to accelerate adoption and interoperability By www.etsi.org Published On :: Thu, 28 Apr 2022 06:18:00 GMT ETSI launches remote PlugtestsTM Programme for Mission Critical Services to accelerate adoption and interoperability Sophia Antipolis, 28 April 2020 To accelerate Mission Critical Services (MCS) adoption and interoperability, a key enabler to MCS deployment, ETSI is running an innovative MCX PlugtestsTM Programme. Testing sessions will also benefit from the latest ETSI specification, ETSI TS 103 564, on Plugtests scenarios for Mission Critical Services. Read More... Full Article
ero Second ETSI C-V2X interoperability test event to connect vehicles in Europe and in the rest of the world By www.etsi.org Published On :: Thu, 28 Apr 2022 06:18:27 GMT Second ETSI C-V2X interoperability test event, remote, to connect vehicles in Europe and in the rest of the world Register now for this remote event! Sophia Antipolis, 5 May 2020 ETSI, in partnership with the 5GAA, is organizing the second “Cellular-Vehicle-to-Everything” (C-V2X) PlugtestsTM event. It will be held remotely, from 20 to 31 July 2020. ETSI has recently setup a remote lab for all participants, it leverages the ETSI Hub for Interoperability and Validation (HIVE) to interconnect participants’ labs and allow for multi-party interoperability testing. Read More... Full Article
ero ETSI’s new group on COVID-19 tracing apps interoperability moving fast: officials elected and work programme set up By www.etsi.org Published On :: Thu, 28 Apr 2022 09:21:59 GMT ETSI’s new group on COVID-19 tracing apps interoperability moving fast: officials elected and work programme set up Sophia Antipolis, 11 June 2020 The ETSI E4P group, “Europe for Privacy-Preserving Pandemic Protection”, launched a month ago has already held two meetings. The work of ISG E4P aims to facilitate the development of backward-compatible and interoperable proximity tracing applications to be used to combat pandemics by helping to break viral transmission chains. Read More... Full Article
ero ETSI C-V2X Plugtest achieves interoperability success rate of 94% By www.etsi.org Published On :: Wed, 15 Jun 2022 07:15:49 GMT ETSI C-V2X Plugtest achieves interoperability success rate of 94% Sophia Antipolis, 18 August 2020 ETSI has just released the report of its 2nd C-V2X Plugtests event organized remotely in partnership with the 5GAA the last week of July. The 81 remote participants benefited from ETSI’s remote lab to run their sessions in their own labs. Observers from different organizations witnessed the execution of 288 test sessions based on the ETSI test specification ETSI TS 103 600, and interoperability results were reported in the Test reporting tool. An overall interoperability success rate of 94% was achieved. Read More... Full Article
ero ETSI unveils NFV&MEC 2020 Interoperability Report: Strong focus on Containerized and 5G Network Services By www.etsi.org Published On :: Thu, 28 Apr 2022 13:58:50 GMT ETSI unveils NFV&MEC 2020 Interoperability Report: Strong focus on Containerized and 5G Network Services Sophia Antipolis, 22 September 2020 ETSI is pleased to release the report of its NFV&MEC PlugtestsTM event that took place remotely in June 2020. After several weeks of remote integration and pre-testing, the event offered NFV and MEC solution providers as well as open source communities an opportunity to discuss and solve interoperability challenges while validating their implementation of NFV and MEC specifications and APIs. Read More... Full Article
ero ETSI Mission Critical Plugtests event achieves a 95% interoperability success rate By www.etsi.org Published On :: Thu, 28 Apr 2022 06:26:09 GMT ETSI Mission Critical Plugtests event achieves a 95% interoperability success rate Sophia Antipolis, 2 November 2020 ETSI is pleased to announce it has now released the Report of its fifth MCX PlugtestsTM remote event that took place from 21 September to 2 October 2020. Results of the testing sessions outline an interoperability rate of 95%, giving industry a reliable set of standards for successful implementations. Highlights of this event included initial railway-oriented capabilities in 3GPP Release-15, such as functional aliases, multi-talker, helping Future Railway Mobile Communication System (FRMCS) move forward. 173 delegates from all over the world executed around 1350 test cases in 169 test sessions, interoperability results were reported in the ETSI Test reporting tool. Around fifty new test cases were developed for this event and will be added to ETSI TS 103 564. Read More... Full Article
ero Open Source MANO Release NINE fulfils ETSI's zero-touch automation vision, ready for MEC and O-RAN use cases By www.etsi.org Published On :: Thu, 28 Apr 2022 14:01:08 GMT Open Source MANO Release NINE fulfils ETSI's zero-touch automation vision, ready for MEC and O-RAN use cases Sophia Antipolis, 18 December 2020 ETSI is pleased to announce the launch of OSM Release NINE today. With an array of new features, this Release completes the alignment process with ETSI NFV specifications, culminating in native adoption of ETSI GS NFV-SOL006 for network functions and service modelling. Standardizing the onboarding process for VNFs into OSM fosters interoperability and boosts the growth of OSM’s VNF ecosystem. Release NINE coincides with the announcement of a new production deployment, confirming OSM as the most comprehensive open-source NFV orchestrator and a key enabler for zero-touch end-to-end network and service automation. Read More... Full Article
ero ETSI unveils its Report comparing worldwide COVID-19 contact-tracing systems – a first step toward interoperability By www.etsi.org Published On :: Tue, 28 Sep 2021 14:29:46 GMT ETSI unveils its Report comparing worldwide COVID-19 contact-tracing systems – a first step toward interoperability Sophia Antipolis, 2 February 2021 The COVID-19 pandemic has stretched the planet’s health systems to their limits and tested the measures adopted to alleviate difficulties. Contact tracking or tracing to identify infected people has been one such example. However, contact tracing based on interviews with identified or suspected patients presents known weaknesses from previous pandemics. Turning to digital means in a world where global mobility is the rule was therefore of the essence. Read More... Full Article
ero ETSI announces first interoperability event for future railway communication By www.etsi.org Published On :: Fri, 04 Jun 2021 15:51:52 GMT ETSI announces first interoperability event for future railway communication Sophia Antipolis, 19 April 2021 ETSI has announced that its Future Railway Mobile Communication System (FRMCS) Plugtests™ event will take place from 14 to 18 June 2021. Over 20 vendors and more than 80 participants will participate. Read More... Full Article
ero ETSI C-V2X Plugtests event achieves a 93% interoperability success rate By www.etsi.org Published On :: Thu, 21 Apr 2022 13:22:21 GMT ETSI C-V2X Plugtests event achieves a 93% interoperability success rate Sophia Antipolis, 21 April 2022 The 3rd ETSI C-V2X PlugtestsTM event, held in partnership with 5GAA and hosted by DEKRA from 28 March to 1st April, achieved a success rate of 93% of the executed tests, showing an extremely positive level of multi-vendor interoperability. 226 test scenarios were executed in a laboratory and outdoor environment for interoperability, with 80 people from 25 companies participating in onsite and remote testing. All results are available in the newly released Report. Read More... Full Article
ero ETSI holds successful SDN NETCONF Plugtests interoperability event By www.etsi.org Published On :: Wed, 08 Mar 2023 10:00:56 GMT Testing end-to-end service configuration of Millimetre Wave network devices in a Software Defined network using NETCONF Sophia Antipolis, 8 March 2023 ETSI has organized the fourth millimetre Wave Transmission (mWT) Software Defined Networking (SDN) Plugtests™ event from 20 to 24 February 2023. The event took place at the ETSI headquarters, in Sophia Antipolis, France. Read More... Full Article
ero ETSI Future Railway Mobile Communication System interoperability testing event starting today By www.etsi.org Published On :: Fri, 07 Jul 2023 07:51:58 GMT Sophia Antipolis, 3 July 2023 ETSI is starting today its 3rd FRMCS (Future Railway Mobile Communication System) Plugtests™ event. GSM-R is one of the main standards for railway telecommunication services. It is developed and maintained by the ETSI Technical Committee Railway Telecommunications. With the increased need for more throughput, higher capacity and flexible deployment options, FRMCS is being developed based on 3GPP Mission Critical Services. Read More... Full Article
ero ETSI interop event for future rail communication reports a success rate of 86% By www.etsi.org Published On :: Fri, 01 Sep 2023 08:14:11 GMT Sophia Antipolis, 1 September 2023 The Report of the 3rd interoperability Plugtests™ event for the Future Railway Mobile Communication System (FRMCS) is now available. All executed tests achieved an interoperability success rate of 86%. Read More... Full Article
ero ETSI’s Zero-touch network Service Management group renewed for two years By www.etsi.org Published On :: Thu, 05 Oct 2023 17:29:03 GMT Sophia Antipolis, 5 October 2023 ETSI is pleased to announce the extension of its Zero touch network and Service Management group (ISG ZSM) for an additional 2 year-period. Read More... Full Article
ero ETSI and 5GAA driving interoperability as C-V2X tests hit a 94% success rate By www.etsi.org Published On :: Mon, 30 Sep 2024 13:32:49 GMT Sophia Antipolis, 30 September 2024 Direct communications between vehicles, pedestrians and infrastructure based on 3GPP and ETSI TC ITS standards have been tested during the 4th C-V2X Plugtests™ interoperability event in Malaga, Spain, hosted by DEKRA (September 10- 13, 2024). In partnership with 5GAA, this Cellular Vehicle-to-Everything (C-V2X) and ITS technologies event attracted the participation of 24 companies and 82 experts – both onsite and via remote connections – with 94% of the planned tests, based on over 60 test scenarios, successfully completed. Read More... Full Article
ero CVE-2024-47575: Frequently Asked Questions About FortiJump Zero-Day in FortiManager and FortiManager Cloud By www.tenable.com Published On :: Wed, 23 Oct 2024 16:37:56 -0400 Frequently asked questions about a zero-day vulnerability in Fortinet’s FortiManager that has reportedly been exploited in the wild.BackgroundThe Tenable Security Response Team (SRT) has compiled this blog to answer Frequently Asked Questions (FAQ) regarding a zero-day vulnerability in Fortinet’s FortiManager.Update October 23: The blog has been updated with new information about in-the-wild exploitation and threat actor activity associated with this vulnerability.View Change LogFAQWhat is FortiJump?FortiJump is a name given to a zero-day vulnerability in the FortiGate-FortiManager (FGFM) protocol in Fortinet’s FortiManager and FortiManager Cloud. It was named by security researcher Kevin Beaumont in a blog post on October 22. Beaumont also created a logo for FortiJump.What are the vulnerabilities associated with FortiJump?On October 23, Fortinet published an advisory (FG-IR-24-423) for FortiJump, assigning a CVE identifier for the flaw.CVEDescriptionCVSSv3CVE-2024-47575FortiManager Missing authentication in fgfmsd Vulnerability9.8What is CVE-2024-47575?CVE-2024-47575 is a missing authentication vulnerability in the FortiGate to FortiManager (FGFM) daemon (fgfmsd) in FortiManager and FortiManager Cloud.How severe is CVE-2024-47575?Exploitation of FortiJump could allow an unauthenticated, remote attacker using a valid FortiGate certificate to register unauthorized devices in FortiManager. Successful exploitation would grant the attacker the ability to view and modify files, such as configuration files, to obtain sensitive information, as well as the ability to manage other devices.Obtaining a certificate from a FortiGate device is relatively easy:Commentby from discussioninfortinet According to results from Shodan, there are nearly 60,000 FortiManager devices that are internet-facing, including over 13,000 in the United States, over 5,800 in China, nearly 3,000 in Brazil and 2,300 in India:When was FortiJump first disclosed?There were reports on Reddit that Fortinet proactively notified customers using FortiManager about the flaw ahead of the release of patches, though some customers say they never received any notifications. Beaumont posted a warning to Mastodon on October 13:Post by @GossiTheDog@cyberplace.socialView on Mastodon Was this exploited as a zero-day?Yes, according to both Beaumont and Fortinet, FortiJump has been exploited in the wild as a zero-day. Additionally, Google Mandiant published a blog post on October 23 highlighting its collaborative investigation with Fortinet into the “mass exploitation” of this zero-day vulnerability. According to Google Mandiant, they’ve discovered over 50 plus “potentially compromised FortiManager devices in various industries.”Which threat actors are exploiting FortiJump?Google Mandiant attributed exploitation activity to a new threat cluster called UNC5820, adding that the cluster has been observed exploiting the flaw since “as early as June 27, 2024.”Is there a proof-of-concept (PoC) available for this vulnerability/these vulnerabilities?As of October 23, there are no public proof-of-concept exploits available for FortiJump.Are patches or mitigations available for FortiJump?The following table contains a list of affected products, versions and fixed versions.Affected ProductAffected VersionsFixed VersionFortiManager 6.26.2.0 through 6.2.12Upgrade to 6.2.13 or aboveFortiManager 6.46.4.0 through 6.4.14Upgrade to 6.4.15 or aboveFortiManager 7.07.0.0 through 7.0.12Upgrade to 7.0.13 or aboveFortiManager 7.27.2.0 through 7.2.7Upgrade to 7.2.8 or aboveFortiManager 7.47.4.0 through 7.4.4Upgrade to 7.4.5 or aboveFortiManager 7.67.6.0Upgrade to 7.6.1 or aboveFortiManager Cloud 6.46.4 all versionsMigrate to a fixed releaseFortiManager Cloud 7.07.0.1 through 7.0.12Upgrade to 7.0.13 or aboveFortiManager Cloud 7.27.2.1 through 7.2.7Upgrade to 7.2.8 or aboveFortiManager Cloud 7.47.4.1 through 7.4.4Upgrade to 7.4.5 or aboveFortiManager Cloud 7.6Not affectedNot ApplicableFortinet’s advisory provides workarounds for specific impacted versions if patching is not feasible. These include blocking unknown devices from attempting to register to FortiManager, creating IP allow lists of approved FortiGate devices that can connect to FortiManager and the creation of custom certificates. Generally speaking, it is advised to ensure FGFM is not internet-facing.Has Tenable released any product coverage for these vulnerabilities?A list of Tenable plugins for this vulnerability can be found on the individual CVE page for CVE-2024-47575 as they’re released. This link will display all available plugins for this vulnerability, including upcoming plugins in our Plugins Pipeline.Get more informationBurning Zero Days: FortiJump FortiManager vulnerability used by nation state in espionage via MSPsFortiGuard Labs PSIRT FG-IR-24-423 AdvisoryChange LogUpdate October 23: The blog has been updated with new information about in-the-wild exploitation and threat actor activity associated with this vulnerability.Join Tenable's Security Response Team on the Tenable Community.Learn more about Tenable One, the Exposure Management Platform for the modern attack surface. Full Article
ero Cybersecurity Snapshot: Apply Zero Trust to Critical Infrastructure’s OT/ICS, CSA Advises, as Five Eyes Spotlight Tech Startups’ Security By www.tenable.com Published On :: Fri, 01 Nov 2024 09:00:00 -0400 Should critical infrastructure orgs boost OT/ICS systems’ security with zero trust? Absolutely, the CSA says. Meanwhile, the Five Eyes countries offer cyber advice to tech startups. Plus, a survey finds “shadow AI” weakening data governance. And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy.Dive into six things that are top of mind for the week ending Nov. 1.1 - Securing OT/ICS in critical infrastructure with zero trustAs their operational technology (OT) computing environments become more digitized, converged with IT systems and cloud-based, critical infrastructure organizations should beef up their cybersecurity by adopting zero trust principles.That’s the key message of the Cloud Security Alliance’s “Zero Trust Guidance for Critical Infrastructure,” which focuses on applying zero trust methods to OT and industrial control system (ICS) systems.While OT/ICS environments were historically air gapped, that’s rarely the case anymore. “Modern systems are often interconnected via embedded wireless access, cloud and other internet-connected services, and software-as-a-service (SaaS) applications,” reads the 64-page white paper, which was published this week.The CSA hopes the document will help cybersecurity teams and OT/ICS operators enhance the way they communicate and collaborate. Among the topics covered are:Critical infrastructure’s unique threat vectorsThe convergence of IT/OT with digital transformationArchitecture and technology differences between OT and ITThe guide also outlines this five-step process for implementing zero trust in OT/ICS environments:Define the surface to be protectedMap operational flowsBuild a zero trust architectureDraft a zero trust policyMonitor and maintain the environmentA zero trust strategy boosts the security of critical OT/ICS systems by helping teams “keep pace with rapid technological advancements and the evolving threat landscape,” Jennifer Minella, the paper’s lead author, said in a statement.To get more details, read:The report’s announcement “New Paper from Cloud Security Alliance Examines Considerations and Application of Zero Trust Principles for Critical Infrastructure”The full report “Zero Trust Guidance for Critical Infrastructure”A complementary slide presentationFor more information about OT systems cybersecurity, check out these Tenable resources: “What is operational technology (OT)?” (guide)“Discover, Measure, and Minimize the Risk Posed by Your Interconnected IT/OT/IoT Environments” (on-demand webinar)“How To Secure All of Your Assets - IT, OT and IoT - With an Exposure Management Platform” (blog)“Blackbox to blueprint: The security leader’s guidebook to managing OT and IT risk” (white paper)“Tenable Cloud Risk Report 2024” (white paper)2 - Five Eyes publish cyber guidance for tech startupsStartup tech companies can be attractive targets for hackers, especially if they have weak cybersecurity and valuable intellectual property (IP).To help startups prevent cyberattacks, the Five Eyes countries this week published cybersecurity guides tailored for these companies and their investors.“This guidance is designed to help tech startups protect their innovation, reputation, and growth, while also helping tech investors fortify their portfolio companies against security risks," Mike Casey, U.S. National Counterintelligence and Security Center Director, said in a statement.These are the top five cybersecurity recommendations from Australia, Canada, New Zealand, the U.S. and the U.K. for tech startups:Be aware of threat vectors, including malicious insiders, insecure IT and supply chain risk.Identify your most critical assets and conduct a risk assessment to pinpoint vulnerabilities.Build security into your products by managing intellectual assets and IP; monitoring who has access to sensitive information; and ensuring this information’s protection.Conduct due diligence when choosing partners and make sure they’re equipped to protect the data you share with them.Before you expand abroad, prepare and become informed about these new markets by, for example, understanding local laws in areas such as IP protection and data protection. “Sophisticated nation-state adversaries, like China, are working hard to steal the intellectual property held by some of our countries’ most innovative and exciting startups,” Ken McCallum, Director General of the U.K.’s MI5, said in a statement.To get more details, check out these Five Eyes’ cybersecurity resources for tech startups:The announcement “Five Eyes Launch Shared Security Advice Campaign for Tech Startups”The main guides: “Secure Innovation: Security Advice for Emerging Technology Companies”“Secure Innovation: Security Advice for Emerging Technology Investors”These complementary documents:“Secure Innovation: Scenarios and Mitigations”“Secure Innovation: Travel Security Guidance”“Secure Innovation: Due Diligence Guidance”“Secure Innovation: Companies Summary”3 - Survey: Unapproved AI use impacting data governanceEmployees’ use of unauthorized AI tools is creating compliance issues in a majority of organizations. Specifically, it makes it harder to control data governance and compliance, according to almost 60% of organizations surveyed by market researcher Vanson Bourne.“Amid all the investment and adoption enthusiasm, many organisations are struggling for control and visibility over its use,” reads the firm’s “AI Barometer: October 2024” publication. Vanson Bourne polls 100 IT and business executives each month about their AI investment plans.To what extent do you think the unsanctioned use of AI tools is impacting your organisation's ability to maintain control over data governance and compliance?(Source: Vanson Bourne’s “AI Barometer: October 2024”)Close to half of organizations surveyed (44%) believe that at least 10% of their employees are using unapproved AI tools.On a related front, organizations are also grappling with the issue of software vendors that unilaterally and silently add AI features to their products, especially to their SaaS applications.While surveyed organizations say they’re reaping advantages from their AI usage, “such benefits are dependent on IT teams having the tools to address the control and visibility challenges they face,” the publication reads.For more information about the use of unapproved AI tools, an issue also known as “shadow AI,” check out:“Do You Think You Have No AI Exposures? Think Again” (Tenable)“Shadow AI poses new generation of threats to enterprise IT” (TechTarget)“10 ways to prevent shadow AI disaster” (CIO)“Never Trust User Inputs -- And AI Isn't an Exception: A Security-First Approach” (Tenable)“Shadow AI in the ‘dark corners’ of work is becoming a big problem for companies” (CNBC)VIDEOShadow AI Risks in Your Company 4 - NCSC explains nuances of multi-factor authenticationMulti-factor authentication (MFA) comes in a variety of flavors, and understanding the differences is critical for choosing the right option for each use case in your organization.To help cybersecurity teams better understand the different MFA types and their pluses and minuses, the U.K. National Cyber Security Centre (NCSC) has updated its MFA guidance.“The new guidance explains the benefits that come with strong authentication, while also minimising the friction that some users associate with MFA,” reads an NCSC blog. In other words, what type of MFA method to use depends on people’s roles, how they work, the devices they use, the applications or services they’re accessing and so on.Topics covered include:Recommended types of MFA, such as FIDO2 credentials, app-based and hardware-based code generators and message-based methodsThe importance of using strong MFA to secure users’ access to sensitive dataThe role of trusted devices in boosting and simplifying MFABad practices that weaken MFA’s effectiveness, such as:Retaining weaker, password-only authentication protocols for legacy servicesExcluding certain accounts from MFA requirements because their users, usually high-ranking officials, find MFA inconvenientTo get more details, read:The NCSC blog “Not all types of MFA are created equal”The NCSC guide “Multi-factor authentication for your corporate online services”For more information about MFA:“Multifactor Authentication Cheat Sheet” (OWASP)“Deploying Multi Factor Authentication – The What, How, and Why” (SANS Institute)“How MFA gets hacked — and strategies to prevent it” (CSO)“How Multifactor Authentication Supports Growth for Businesses Focused on Zero Trust” (BizTech)“What is multi-factor authentication?” (TechTarget)5 - U.S. gov’t outlines AI strategy, ties it to national security The White House has laid out its expectations for how the federal government ought to promote the development of AI in order to safeguard U.S. national security.In the country’s first-ever National Security Memorandum (NSM) on AI, the Biden administration said the federal government must accomplish the following:Ensure the U.S. is the leader in the development of safe, secure and trustworthy AILeverage advanced AI technologies to boost national securityAdvance global AI consensus and governance“The NSM’s fundamental premise is that advances at the frontier of AI will have significant implications for national security and foreign policy in the near future,” reads a White House statement. The NSM’s directives to federal agencies include:Help improve the security of chips and support the development of powerful supercomputers to be used by AI systems.Help AI developers protect their work against foreign spies by providing them with cybersecurity and counterintelligence information.Collaborate with international partners to create a governance framework for using AI in a way that is ethical, responsible and respects human rights. The White House also published a complementary document titled “Framework To Advance AI Governance and Risk Management in National Security,” which adds implementation details and guidance for the NSM.6 - State CISOs on the frontlines of AI securityAs the cybersecurity risks and benefits of AI multiply, most U.S. state CISOs find themselves at the center of their governments' efforts to craft AI security strategies and policies.That’s according to the “2024 Deloitte-NASCIO Cybersecurity Study,” which surveyed CISOs from all 50 states and the District of Columbia.Specifically, 88% of state CISOs reported being involved in the development of a generative AI strategy, while 96% are involved with creating a generative AI security policy.However, their involvement in AI cybersecurity matters isn’t necessarily making them optimistic about their states’ ability to fend off AI-boosted attacks.None said they feel “extremely confident” that their state can prevent AI-boosted attacks, while only 10% reported feeling “very confident.” The majority (43%) said they feel “somewhat confident” while the rest said they are either “not very confident” or “not confident at all.” Naturally, most state CISOs see AI-enabled cyberthreats as significant, with 71% categorizing them as either “very high threat” (18%) or “somewhat high threat” (53%).At the same time, state CISOs see the potential for AI to help their cybersecurity efforts, as 41% are already using generative AI for cybersecurity, and another 43% have plans to do so by mid-2025.Other findings from the "2024 Deloitte-NASCIO Cybersecurity Study" include:4 in 10 state CISOs feel their budget is insufficient.Almost half of respondents rank cybersecurity staffing as one of the top challenges.In the past two years, 23 states have hired new CISOs, as the median tenure of a state CISO has dropped to 23 months, down from 30 months in 2022.More state CISOs are taking on privacy protection duties — 86% are responsible for privacy protection, up from 60% two years ago.For more information about CISO trends:“What’s important to CISOs in 2024” (PwC)“The CISO’s Tightrope: Balancing Security, Business, and Legal Risks in 2024” (The National CIO Review)“State of CISO Leadership: 2024” (SC World)“4 Trends That Will Define the CISO's Role in 2024” (SANS Institute) Full Article
ero SpotOn London 2012 Storify: Crowdfunded science – new opportunities or dangerous echo chamber? By www.nature.com Published On :: Wed, 14 Nov 2012 14:55:52 +0000 Finding sources for funding research can be a demanding task, and one that's not always successful. A new trend that's emerging out of the necessity to fund projects that have no traditional means of support is "crowdfunding." A panel at SpotOnLondon weighs the resulting apprehensions and benefits. Full Article Featured Policy SpotOn London (#SoLo) Storifys #solo12funding
ero Moana : the story of the movie in comics / manuscript adaptation, Alesandro Ferrari ; layouts, Alberto Zanon, Giada Perissinotto ; pencil/inking, Veronica Di Lorenzo, Luca Bertelè ; colors, Massimo Rocca [and four others]. By library.gcpl.lib.oh.us Published On :: "Sail the Pacific Islands in search of destiny and the demigod Maui in this retelling of Disney Moana. Moana is a spirited teenager who loves the ocean, yet she is forbidden to travel beyond the reef that surrounds her island home of Motunui. But she feels called to something more, and wants to discover who she was meant to be. When darkness begins to consume the island, and nature is out of balance, Moana knows the solution lies beyond the safety of the reef. Following the messages of her ancestors, and with encouragement from the ocean itself, Moana sails into the open sea to find the demigod Maui and right a wrong from his past. Together they face rough waters, monstrous creatures, and the unknown, in a mission to stop the darkness from spreading, and restore life to the islands! Become a master wayfinder in this action-packed story as Moana's love for the sea turns her into a hero among her people, the gods, and the ocean." -- Provided by publisher Full Article
ero Mr. littlejohn / Cameron Judd. By library.gcpl.lib.oh.us Published On :: Two-time Spur Award nominee Cameron Judd spins Westerns that lasso listeners' attention. In this inspiring story of self-sacrifice, menacing dangers spur 17-year-old Pennington Malone to grow up quickly. With his father in Leavenworth Prison, Penn travels to Dodge City packing his dad's loaded sixgun. He soon meets Jonah Littlejohn, a lanky man gifted with incredible strength and boxing prowess-and haunted by painful secrets. But when Penn learns that three shadowy riders are trailing him-and framing him for murders they commited-he needs all the help he can get. Full Article
ero Dear Juliet : letters from the lovestruck and lovelorn to Shakespeare's Juliet in Verona. By library.gcpl.lib.oh.us Published On :: Every year, over 10,000 letters addressed to Juliet Capulet arrive in Verona, Italy, the famous hometown of Shakespeare's Romeo & Juliet. These handwritten letters come from people all over the world, seeking guidance and support from Juliet herself. Capturing the pain, joy, humor, and confusion of love, the 60 letters in this book offers encouragement, comfort, hope-and a nod to the human condition. Including responses from Juliet herself, this romantic and relatable, and perfect as a Valentine's Day gift, Dear Juliet proves that love is the universal language. Full Article
ero Investir dans la formation professionnelle des jeunes: Programme de formation professionnelle des secteurs agropastoral et halieutique du Cameroun By www.ifpri.org Published On :: Thu, 31 Mar 2022 5:05:01 EDT L’investissement dans les agriculteurs, c’est-à-dire le capital humain de l’agriculture, est crucial pour relever les défis que posent nos systèmes agroalimentaires. Full Article
ero Cool career spotlight: a day in the life of an aerospace engineer (November 13, 2024 1:00pm) By events.umich.edu Published On :: Wed, 13 Nov 2024 00:32:34 -0500 Event Begins: Wednesday, November 13, 2024 1:00pm Location: Organized By: University Career Center Interested in gaining a first hand account of a career in aerospace engineering? Join Handshake and Pratt & Whitney Production Test Engineer, Anthony Bartolotta, for answers to questions on topics like: An average day in the life of an aerospace engineer Important hard and soft skills for aspiring engineers to know Tips for launching a career in engineering Sign up for free today! Full Article Careers / Jobs
ero Proteomic analysis of the combined effects of cannabigerol and 3- O -ethyl ascorbic acid on kinase-dependent signalling in UVB-irradiated human keratinocytes - Nature.com By news.google.com Published On :: Wed, 13 Nov 2024 08:23:51 GMT Proteomic analysis of the combined effects of cannabigerol and 3- O -ethyl ascorbic acid on kinase-dependent signalling in UVB-irradiated human keratinocytes Nature.com Full Article
ero Pink Line Rerouted to Connect to Racine Blue Line Station (Planned Work w/Reroute) By www.transitchicago.com Published On :: (Fri, Nov 15 2024 10:00 PM to Sat, Nov 16 2024 4:00 AM) Pink Line trains will operate between 54th/Cermak and Polk, then to Racine Blue Line for connecting Blue Line train service to/from downtown. Full Article
ero Pink Line Rerouted to Connect to Racine Blue Line Station (Planned Work w/Reroute) By www.transitchicago.com Published On :: (Thu, Nov 14 2024 10:00 PM to Fri, Nov 15 2024 4:00 AM) Pink Line trains will operate between 54th/Cermak and Polk, then to Racine Blue Line for connecting Blue Line train service to/from downtown. Full Article
ero Trains Rerouted Downtown (Planned Work w/Reroute) By www.transitchicago.com Published On :: (Wed, Nov 13 2024 10:00 PM to Thu, Nov 14 2024 3:45 AM) Orange Ln trns will operate counterclockwise on the Outer Loop. Board/exit Orange Ln trns on the Brown Line platform at all Loop stations. Full Article
ero Pink Line Rerouted to Connect to Racine Blue Line Station (Planned Work w/Reroute) By www.transitchicago.com Published On :: (Wed, Nov 13 2024 10:00 PM to Thu, Nov 14 2024 4:00 AM) Pink Line trains will operate between 54th/Cermak and Polk, then to Racine Blue Line for connecting Blue Line train service to/from downtown. Full Article
ero Boarding Change, Delays Between the Loop and Ashland (Planned Reroute) By www.transitchicago.com Published On :: (Fri, Nov 15 2024 10:00 PM to Sat, Nov 16 2024 4:00 AM) Green Line trains will operate on the same track between the Loop and Ashland, resulting in minor delays. Full Article
ero Boarding Change, Delays Between the Loop and Ashland (Planned Reroute) By www.transitchicago.com Published On :: (Thu, Nov 14 2024 10:00 PM to Fri, Nov 15 2024 4:00 AM) Green Line trains will operate on the same track between the Loop and Ashland, resulting in minor delays. Full Article
ero Boarding Change, Delays Between the Loop and Ashland (Planned Reroute) By www.transitchicago.com Published On :: (Wed, Nov 13 2024 10:00 PM to Thu, Nov 14 2024 4:00 AM) Green Line trains will operate on the same track between the Loop and Ashland, resulting in minor delays. Full Article
ero Temporary Reroute (Planned Reroute) By www.transitchicago.com Published On :: (Mon, Nov 18 2024 9:00 AM to 3:30 PM) #56 buses will operate in both directions via Milwaukee, Western, North Avenue and Milwaukee. Full Article
ero Temporary Reroute (Planned Reroute) By www.transitchicago.com Published On :: (Mon, Nov 11 2024 9:00 AM to Fri, Nov 22 2024 4:00 PM) NB #37 buses will operate via Franklin, Wacker, LaSalle and Grand, then resume their normal route on Orleans. Full Article
ero Temporary Reroute (Planned Reroute) By www.transitchicago.com Published On :: (Mon, Nov 11 2024 9:00 AM to Fri, Nov 22 2024 4:00 PM) NB #125 buses will operate via Wacker and LaSalle, then resume their normal route on Ohio. Full Article
ero Temporary Reroute (Planned Reroute) By www.transitchicago.com Published On :: (Wed, Oct 23 2024 12:00 PM to Fri, Nov 15 2024 5:00 PM) EB #31 buses will operate via 31st, Wallace, and 33rd, then resume their normal route on Wentworth. Full Article
ero Temporary Reroute (Planned Reroute) By www.transitchicago.com Published On :: (Mon, Oct 14 2024 8:00 AM to TBD) 8am to 3pm, daily: NB #146 and #148 buses will operate via State, Wacker, and Wabash, then resume their normal route on Lake. Full Article
ero Temporary Reroute (Planned Reroute) By www.transitchicago.com Published On :: (Mon, Nov 27 2023 2:00 PM to TBD) #106 buses will operate in both directions via 103rd, King Drive, 107th, Cottage Grove, and 103rd. Full Article
ero Temporary Reroute (Planned Reroute) By www.transitchicago.com Published On :: (Mon, Aug 7 2023 to TBD) NB #192 buses will operate via Roosevelt, Jefferson, Monroe, and Canal, then resume their normal route on Madison. SB buses are not affected. Full Article
ero Temporary Reroute (Planned Reroute) By www.transitchicago.com Published On :: (Mon, Aug 7 2023 to Sat, Dec 28 2024) EB #60 and NB #125 uses will operate via Harrison and Jefferson to Monroe. EB #60 via Monroe, Canal, then Washington. NB #125 via Monroe, Canal. Full Article
ero Temporary Reroute (Planned Reroute) By www.transitchicago.com Published On :: (Mon, Aug 7 2023 to TBD) WB #124 buses will operate Madison, Clinton, ending trips on Clinton between Adams and Quincy. EB via Clinton, Van Buren, Jefferson, and Monroe, then Canal. Full Article
ero Temporary Reroute (Planned Reroute) By www.transitchicago.com Published On :: (Mon, Aug 7 2023 to TBD) NB #157 buses will operate via Taylor, Jefferson, and Monroe, then resume their normal route on Canal. SB buses are not affected. Full Article
ero #125 Temporary Northbound Reroute near Wacker/Franklin (Minor Delays / Reroute) By www.transitchicago.com Published On :: (Tue, Nov 12 2024 9:53 AM to TBD) Northbound 125 buses are temporarily rerouted via Wacker, LaSalle, and Illinois near Wacker/Franklin. Full Article
ero #37 Sedgwick Temporary Northbound Reroute near Wacker/Franklin (Minor Delays / Reroute) By www.transitchicago.com Published On :: (Tue, Nov 12 2024 9:47 AM to TBD) Northbound #37 Sedgwick buses are temporarily rerouted via Wacker, LaSalle, Grand and Orleans due to street blockage near Wacker/Franklin. Full Article
ero Temporary Reroute (Bus Stop Note) By www.transitchicago.com Published On :: (Fri, Jun 28 2024 11:00 AM to TBD) The WB #77 stop on the NW corner at Racine/Belmont will be temporarily discontinued. For WB #77 svc, board/exit at Lakewood or Seminary. Full Article
ero Temporary Reroute (Planned Reroute) By www.transitchicago.com Published On :: (Wed, Nov 13 2024 8:00 AM to 5:00 PM) WB #87 buses will operate via 87th, Racine, 83rd, and Ashland, then resume their normal route on 87th. Full Article
ero Temporary Reroute (Planned Reroute) By www.transitchicago.com Published On :: (Sun, May 16 2021 to TBD) 81 Lawrence buses operates in both directions via Lawrence, Ashland, Wilson, Broadway and Lawrence. Full Article
ero Temporary Reroute (Planned Reroute) By www.transitchicago.com Published On :: (Mon, Aug 5 2024 9:00 AM to Mon, Dec 2 2024 5:00 PM) #75 buses will operate in both directions via 74th, Halsted, 76th, Vincennes and 75th. Full Article
ero Temporary Reroute (Planned Reroute) By www.transitchicago.com Published On :: (Wed, Nov 20 2024 7:00 PM to Thu, Nov 21 2024 12:01 AM) EB #20, #60, and #124 and SB #J14 and #56 buses will operate via Washington, Clark, Monroe and Dearborn, then resume their normal route on Washington. Full Article
ero Temporary Reroute (Planned Reroute) By www.transitchicago.com Published On :: (Tue, Nov 12 2024 7:30 AM to Tue, Nov 19 2024 5:00 PM) #J14 and #15 buses will operate in both directions via 100th, Yates, 95th, Colfax, 92nd, and Jeffery. Full Article
ero Temporary Reroute (Planned Reroute) By www.transitchicago.com Published On :: (Sat, Jul 29 2023 5:00 AM to TBD) EB 84 buses operate via Bryn Mawr, Sheridan & Thorndale to Red Line; WB buses begin trips at Thorndale Red Ln, operate via Thorndale, B'way, Hollywood & Ridge. Full Article