sse

Businesses breathe sigh of relief after Dutch expat tax reversal

Stephan Swinkels discusses a major reversal in reforms to Dutch tax law that would have impacted the recruitment and mobility of highly skilled foreign talent.

Global Mobility Lawyer

View (Subscription required)




sse

Labor & Employment Firms Expect Demand Surge as Bosses Face Uncertainty Over Rules Changes

Amidst question marks with the NLRB and workplace regulations because of the new administration, Michael Lotito says employers should consult their counsel about preventative steps.

The American Lawyer

View (Subscription required)




sse

2019 ETSI Fellows unveiled at General Assembly award ceremony

2019 ETSI Fellows unveiled at General Assembly award ceremony

Sophia Antipolis, 3 April 2019

On 2 April during the 73rd General Assembly dinner, ETSI unveiled its three 2019 ETSI Fellows for their outstanding contribution to ETSI’s work. Awards were granted to Roberto Macchi, David Chater-Lea and Friedhelm Hillebrand.

The award ceremony took place in the beautiful Domaine de Barbossi, a resort comprising high class hotel and restaurants, a golf and tennis course and a country club, located in Mandelieu la Napoule on the Côte d’Azur.

Read More...




sse

World Standards Day 2020: STANDARDS ARE ESSENTIAL TO PROTECT THE PLANET

World Standards Day 2020: STANDARDS ARE ESSENTIAL TO PROTECT THE PLANET

On 14 October 2020, CEN, CENELEC and ETSI, the three official European Standardization Organizations, join the international standardization community in celebrating World Standards Day. By focusing on the environment, this year’s edition aims to raise awareness on the potential of standards to help tackle the climate crisis.

Read More...




sse

ETSI General Assembly elects new Chair and Vice Chair

ETSI General Assembly elects new Chair and Vice Chair

Sophia Antipolis, 1 December 2022

On 29 and 30 November, ETSI held its 80th General Assembly in Sophia-Antipolis, France. The agenda included the election of a new Chair and two Vice Chairs. The evening dinner, held at the prestigious Negresco hotel in Nice on the first night of the assembly, saw the celebration of the ETSI Fellowship Award Ceremony, honouring Members for their outstanding contributions to the Institute.

Read More...




sse

ETSI unveils 2023 Fellows at its 81th General Assembly

Sophia Antipolis, 31 March 2023

ETSI is pleased to unveil its 2023 ETSI Fellows who were announced at the 81th ETSI General Assembly on 29 March. The award ceremony took place in the Fernand Leger museum, in Biot, near ETSI facilities in the South of France where art, science and technology mixed beautifully. Scott Cadzow, Hans Johansson and Robert Sarfati were unanimously nominated as ETSI Fellows for their outstanding personal contributions to the organization by the Award committee, composed of the GA Chair and Vice-Chairs, the Board Chair and the ETSI Director-General.

Read More...




sse

First-Time Home Buyer's Essentials

Starts: Tue, 10 Dec 2024 19:00:00 -0500
12/10/2024 05:30:00PM
Location: Montreal, Canada




sse

Assessing social media impact – a workshop at ScienceOnline #scioimpact

Assessing social media impact was one of the workshop sessions at November’s SpotOn London conference,




sse

TV Interview | Purnima Menon at the UN General Assembly




sse

Microsoft’s November 2024 Patch Tuesday Addresses 87 CVEs (CVE-2024-43451, CVE-2024-49039)

  1. 4Critical
  2. 82Important
  3. 1Moderate
  4. 0Low

Microsoft addresses 87 CVEs and one advisory (ADV240001) in its November 2024 Patch Tuesday release, with four critical vulnerabilities and four zero-day vulnerabilities, including two that were exploited in the wild.

Microsoft patched 87 CVEs in its November 2024 Patch Tuesday release, with four rated critical, 82 rated important and one rated moderate.

This month’s update includes patches for:

  • .NET and Visual Studio
  • Airlift.microsoft.com
  • Azure CycleCloud
  • Azure Database for PostgreSQL
  • LightGBM
  • Microsoft Exchange Server
  • Microsoft Graphics Component
  • Microsoft Office Excel
  • Microsoft Office Word
  • Microsoft PC Manager
  • Microsoft Virtual Hard Drive
  • Microsoft Windows DNS
  • Role: Windows Hyper-V
  • SQL Server
  • TorchGeo
  • Visual Studio
  • Visual Studio Code
  • Windows Active Directory Certificate Services
  • Windows CSC Service
  • Windows DWM Core Library
  • Windows Defender Application Control (WDAC)
  • Windows Kerberos
  • Windows Kernel
  • Windows NT OS Kernel
  • Windows NTLM
  • Windows Package Library Manager
  • Windows Registry
  • Windows SMB
  • Windows SMBv3 Client/Server
  • Windows Secure Kernel Mode
  • Windows Task Scheduler
  • Windows Telephony Service
  • Windows USB Video Driver
  • Windows Update Stack
  • Windows VMSwitch
  • Windows Win32 Kernel Subsystem

Remote code execution (RCE) vulnerabilities accounted for 58.6% of the vulnerabilities patched this month, followed by elevation of privilege (EoP) vulnerabilities at 29.9%.

Important

CVE-2024-43451 | NTLM Hash Disclosure Spoofing Vulnerability

CVE-2024-43451 is a NTLM hash spoofing vulnerability in Microsoft Windows. It was assigned a CVSSv3 score of 6.5 and is rated as important. An attacker could exploit this flaw by convincing a user to open a specially crafted file. Successful exploitation would lead to the unauthorized disclosure of a user’s NTLMv2 hash, which an attacker could then use to authenticate to the system as the user. According to Microsoft, CVE-2024-43451 was exploited in the wild as a zero-day. No further details about this vulnerability were available at the time this blog post was published.

This is the second NTLM spoofing vulnerability disclosed in 2024. Microsoft patched CVE-2024-30081 in its July Patch Tuesday release.

Important

CVE-2024-49039 | Windows Task Scheduler Elevation of Privilege Vulnerability

CVE-2024-49039 is an EoP vulnerability in the Microsoft Windows Task Scheduler. It was assigned a CVSSv3 score of 8.8 and is rated as important. An attacker with local access to a vulnerable system could exploit this vulnerability by running a specially crafted application. Successful exploitation would allow an attacker to access resources that would otherwise be unavailable to them as well as execute code, such as remote procedure call (RPC) functions.

According to Microsoft, CVE-2024-49039 was exploited in the wild as a zero-day. It was disclosed to Microsoft by an anonymous researcher along with Vlad Stolyarov and Bahare Sabouri of Google's Threat Analysis Group. At the time this blog post was published, no further details about in-the-wild exploitation were available.

Important

CVE-2024-49019 | Active Directory Certificate Services Elevation of Privilege Vulnerability

CVE-2024-49019 is an EoP vulnerability affecting Active Directory Certificate Services. It was assigned a CVSSv3 score of 7.8 and is rated as important. It was publicly disclosed prior to a patch being made available. According to Microsoft, successful exploitation would allow an attacker to gain administrator privileges. The advisory notes that “certificates created using a version 1 certificate template with Source of subject name set to ‘Supplied in the request’” are potentially impacted if the template has not been secured according to best practices. This vulnerability is assessed as “Exploitation More Likely” according to Microsoft’s Exploitability Index. Microsoft’s advisory also includes several mitigation steps for securing certificate templates which we highly recommend reviewing.

Important

CVE-2024-49040 | Microsoft Exchange Server Spoofing Vulnerability

CVE-2024-49040 is a spoofing vulnerability affecting Microsoft Exchange Server 2016 and 2019. It was assigned a CVSSv3 score of 7.5 and rated as important. According to Microsoft, this vulnerability was publicly disclosed prior to a patch being made available. After applying the update, administrators should review the support article Exchange Server non-RFC compliant P2 FROM header detection. The supplemental guide notes that as part of a “secure by default” approach, the Exchange Server update for November will flag suspicious emails which may contain “malicious patterns in the P2 FROM header.” While this feature can be disabled, Microsoft strongly recommends leaving it enabled to provide further protection from phishing attempts and malicious emails.

Critical

CVE-2024-43639 | Windows Kerberos Remote Code Execution Vulnerability

CVE-2024-43639 is a critical RCE vulnerability affecting Windows Kerberos, an authentication protocol designed to verify user or host identities. It was assigned a CVSSv3 score of 9.8 and is rated as “Exploitation Less Likely.”

To exploit this vulnerability, an unauthenticated attacker needs to leverage a cryptographic protocol vulnerability in order to achieve RCE. No further details were provided by Microsoft about this vulnerability at the time this blog was published.

Important

29 CVEs | SQL Server Native Client Remote Code Execution Vulnerability

This month's release included 29 CVEs for RCEs affecting SQL Server Native Client. All of these CVEs received CVSSv3 scores of 8.8 and were rated as “Exploitation Less Likely.” Successful exploitation of these vulnerabilities can be achieved by convincing an authenticated user into connecting to a malicious SQL server database using an affected driver. A full list of the CVEs are included in the table below.

CVEDescriptionCVSSv3
CVE-2024-38255SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-43459SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-43462SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-48993SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-48994SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-48995SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-48996SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-48997SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-48998SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-48999SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49000SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49001SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49002SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49003SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49004SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49005SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49006SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49007SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49008SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49009SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49010SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49011SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49012SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49013SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49014SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49015SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49016SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49017SQL Server Native Client Remote Code Execution Vulnerability8.8
CVE-2024-49018SQL Server Native Client Remote Code Execution Vulnerability8.8
Important

CVE-2024-43602 | Azure CycleCloud Remote Code Execution Vulnerability

CVE-2024-43602 is a RCE vulnerability in Microsoft’s Azure CycleCloud, a tool that helps in managing and orchestrating High Performance Computing (HPC) environments in Azure. This flaw received the highest CVSSv3 score of the month, a 9.9 and was rated as important. A user with basic permissions could exploit CVE-2024-43602 by sending specially crafted requests to a vulnerable AzureCloud CycleCloud cluster to modify its configuration. Successful exploitation would result in the user gaining root permissions, which could then be used to execute commands on any cluster in the Azure CycleCloud as well as steal admin credentials.

Tenable Solutions

A list of all the plugins released for Microsoft’s November 2024 Patch Tuesday update can be found here. As always, we recommend patching systems as soon as possible and regularly scanning your environment to identify those systems yet to be patched.

For more specific guidance on best practices for vulnerability assessments, please refer to our blog post on How to Perform Efficient Vulnerability Assessments with Tenable.

Get more information

Join Tenable's Security Response Team on the Tenable Community.
Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.




sse

OSC consults on improving retail investor access to long-term asset investments

TORONTO – The Ontario Securities Commission (OSC) today




sse

Canadian roundtable on audit quality addresses current state and trends

Toronto ─ On October 21, the Canadian Securities Administrators (CSA), the Canadian Public Accountability Board (CPAB), and the Office of the Superintendent of Financial Institutions (OSFI) co-hosted the sixth annual Canadian Audit Quality Roundtable.




sse

Canadian securities regulators issue warning about fraudulent investment solicitations involving crypto assets

Montréal –The Canadian Securities Administrators (CSA) warns the public about investment schemes involving fraudulent websites that solicit investments in foreign exchange (often referred to as “forex”), binary options and/or crypto assets.




sse

OSC Consultation Paper 81-737 – Opportunity to Improve Retail Investor Access to Long-Term Assets through Investment Fund Product Structures

This document is only available in PDF format.




sse

Tenable Research Uncovers Thousands of Vulnerable Cyber Assets Amongst Southeast Asia’s Financial Sector

 New research conducted by Tenable®, Inc., the exposure management company, has uncovered more than 26,500 potential internet-facing assets among Southeast Asia’s top banking, financial services and insurance (BFSI) companies by market capitalisation across Indonesia, Malaysia, the Philippines, Singapore, Thailand and Vietnam.

On July 15, 2024, Tenable examined the external attack surface of over 90 BFSI organisations with the largest market capitalisations across the region. The findings revealed that the average organisation possesses nearly 300 internet-facing assets susceptible to potential exploitation, resulting in a total of more than 26,500 assets across the study group.

Singapore ranked the highest among the six countries assessed, with over 11,000 internet-facing assets identified across its top 16 BFSI companies. Over 6,000 of those assets are hosted in the United States. Next on the list is Thailand with over 5000 assets. The distribution of internet-accessible assets underscores the need for cybersecurity strategies that adapt to the rapidly evolving digital landscape.

CountryNumber of internet-facing assets amongst top 90 BFSI companies by market capitalisation
  1. Singapore
11,000
  1. Thailand
5,000
  1. Indonesia
4,600
  1. Malaysia
4,200
  1. Vietnam
3,600
  1. Philippines
2,600

“The results of our study reveal that many financial institutions are struggling to close the priority security gaps that put them at risk. Effective exposure management is key to closing these gaps,” said Nigel Ng, Senior Vice President, Tenable APJ. “By identifying and securing vulnerable assets before they can be exploited, organisations can better protect themselves against the growing tide of cyberattacks.” 


Cyber Hygiene Gaps 
The Tenable study revealed many potential vulnerabilities and exposed several cyber hygiene issues among the study group, including outdated software, weak encryption, and misconfigurations. These vulnerabilities provide cybercriminals with easily exploitable potential entry points, posing potential risk to the integrity and security of financial data. 

Weak SSL/TLS encryption 

A notable finding is that among the total assets, organisations had nearly 2,500 still supporting TLS 1.0—a 25-year old security protocol introduced in 1999 and disabled by Microsoft in September 2022. This highlights the significant challenge organisations with extensive internet footprints face in identifying and updating outdated technologies.

Misconfiguration increases external exposure

Another concerning discovery was that over 4,000 assets, originally intended for internal use, were inadvertently exposed and are now accessible externally. Failing to secure these internal assets poses a significant risk to organisations, as it creates an opportunity for malicious actors to target sensitive information and critical systems.

Lack of encryption 

There were over 900 assets with unencrypted final URLs, which can present a security weakness. When URLs are unencrypted, the data transmitted between the user's browser and the server is not protected by encryption, making it vulnerable to interception, eavesdropping, and manipulation by malicious actors. This lack of encryption can lead to the exposure of sensitive information, such as login credentials, personal data, or payment details, and can compromise the integrity of the communication.


API vulnerabilities amplify risk

The identification of over 2,000 API v3 out of the total number of assets among organisations' digital infrastructure poses a substantial risk to their security and operational integrity.

APIs serve as crucial connectors between software applications, facilitating seamless data exchange. However, inadequate authentication, insufficient input validation, weak access controls, and vulnerabilities in dependencies within API v3 implementations create a vulnerable attack surface.

Malicious actors can exploit such weaknesses to gain unauthorised access, compromise data integrity, and launch devastating cyber attacks.

“The cybersecurity landscape is evolving faster than ever, and financial institutions must evolve with it, so they can know where they are exposed and take action to close critical risk” Ng added. “By prioritising exposure management, these organisations can better protect their digital assets, safeguard customer trust, and ensure the resilience of their operations in an increasingly hostile digital environment.”

About Tenable
Tenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com

Notes to Editors:

  1. Tenable examined the top 12-16 BFSI companies discoverable based on market cap. 
  2. In the context of this alert:
  • An asset is a domain name, subdomain, or IP addresses and/or combination thereof of a device connected to the Internet or internal network. An asset may include, but not limited to web servers, name servers, IoT devices, network printers, etc. Example: foo.tld, bar.foo.tld, x.x.x.xs.
  • The Attack Surface is from the network perspective of an adversary, the complete asset inventory of an organisation including all actively listening services (open ports) on each asset.




sse

Moving on. Dump Your Relationship Baggage and Make Room for the Love of Your Life / Russell Friedman and John W. James.

In this groundbreaking book, authors Russell Friedman and John W. James show listeners how to move on from their unsuccessful past relationships and finally find the love of their lives. Demonstrating revolutionary ideas that have worked for thousands of their clients at the Grief Recovery Institute, Friedman and James give listeners the strategies they need to effectively mourn the loss of the relationship, while opening themselves up to love in the future. With compassionate guidance, Friedman and James help listeners to close a chapter of their romantic past so that they can be ready to begin again.




sse

Teuere Versäumnisse [In German]




sse

Afrique de l'Ouest : les tracasseries routières aggravent l'insécurité alimentaire

Créée notamment pour promouvoir le commerce intra-régional de biens dans la région, la Communauté économique des États d'Afrique de l'Ouest devait aussi permettre d'y réduire l'insécurité alimentaire. Mais les « points de sécurité », dressés le long des corridors de commerce par les autorités administratives qui prélèvent des pots-de-vin, sont venus limiter cette ambition. S’élevant jusqu’à 576 dollars aux 100 kms au Togo en 2017, cette corruption se mesure aussi en temps perdu, avec plus de trois heures aux 100 kms.





sse

1832 Asset Management L.P.

HeadnoteNational Policy 11-203 -- Process for Exemptive Relief Applications in Multiple Jurisdictions -- Relief granted from NI 41-101 to funds offering exchange-traded and conventional mutual fund series under a single simplified prospectus -- subject to conditions -- Technical relief g




sse

Entropy solutions and selection for certain classes of mean field games (November 13, 2024 4:00pm)

Event Begins: Wednesday, November 13, 2024 4:00pm
Location:
Organized By: Financial/Actuarial Mathematics Seminar - Department of Mathematics


Mean field games model the strategic interaction among a large number of players by reducing the problem to two entities: the statistical distribution of all players on the one hand and a representative player on the other. The master equation, introduce by Lions, models this interaction in a single equation, whose independent variables are time, state, and distribution. It can be viewed as a nonlinear transport equation on an infinite dimensional space. Solving this transport equation by the method of characteristics is essentially equivalent to finding the unique Nash equilibrium. When the equilibrium is not unique, we seek selection principles, i.e. how to determine which equilibrium players should follow in practice. A natural question, from the mathematical point of view, is whether entropy solutions can be used as a selection principle. We will examine certain classes of mean field games to show that the question is rather subtle and yields both positive and negative results.




sse

Laura Snyder - Dissertation Defense (November 13, 2024 10:00am)

Event Begins: Wednesday, November 13, 2024 10:00am
Location: Chemistry Dow Lab
Organized By: Department of Chemistry


Please join Laura Snyder for their dissertation defense titled "Nucleoside Modifications in Novel Coronavirus SARS-CoV-2".

*Date:* Wednesday, November 13th, 2024
*Time:* 10:00 a.m.
*Where:* Room 1706, Chemistry Building

Zoom Link: https://umich.zoom.us/j/98714440960
Passcode: 314028




sse

Metrics Matter: Assessing Progress towards Women’s Empowerment in Agriculture and Beyond

Metrics Matter: Assessing Progress towards Women’s Empowerment in Agriculture and Beyond

The Philippine Institute for Development Studies (PIDS), in partnership with the International Food Policy Research Institute (IFPRI), will hold a public seminar featuring three studies on women empowerment on August 14, 2024, 9:00 AM to 11:30 AM (Asia/Manila) / August 13, 2024, 9:00 PM to 11:30 PM (US/Eastern) at the PIDS Conference Hall and via Zoom. […]

The post Metrics Matter: Assessing Progress towards Women’s Empowerment in Agriculture and Beyond appeared first on IFPRI.




sse

79th session of the United Nations General Assembly and Climate Week 2024

79th session of the United Nations General Assembly and Climate Week 2024

The 79th session of the United Nations General Assembly marks a crucial milestone in the global effort to accelerate progress towards the 17 Sustainable Development Goals (SDGs). The highly anticipated Summit of the Future, held during UNGA, underscores the urgent need for enhanced international cooperation to address pressing challenges such as climate change, poverty and […]

The post 79th session of the United Nations General Assembly and Climate Week 2024 appeared first on IFPRI.




sse

World Food Safety Day 2024: Empowering consumers and small businesses with information

Targeting interventions to benefit public health.




sse

Unpacking the 2023 Africa agriculture assessment report (CNBC Africa) 

Unpacking the 2023 Africa agriculture assessment report (CNBC Africa) 

CNBC Africa interviewed John Ulimwengu, IFPRI Senior Research Fellow and the technical editor and lead researcher of the Africa Agriculture Status Report 2023, launched on September 6 at the Africa Food Systems Forum (AGRF). .  The Report titled “Empowering Africa’s Food Systems for the Future” highlights the ways in which Africa is uniquely positioned to redefine its future and […]

The post Unpacking the 2023 Africa agriculture assessment report (CNBC Africa)  appeared first on IFPRI.




sse

The 2024 Global Food Policy Report Stresses Urgent Need for Transformative Action to Achieve Sustainable Healthy Diets and Improved Nutrition

The 2024 Global Food Policy Report Stresses Urgent Need for Transformative Action to Achieve Sustainable Healthy Diets and Improved Nutrition

Washington DC, May 29, 2024: In the face of growing challenges posed by unhealthy diets, all forms of malnutrition, and environmental constraints, the 2024 Global Food Policy Report (GFPR) — released today by the International Food Policy Research Institute (IFPRI) — underscores the importance of transforming complex global food systems to ensure sustainable healthy diets for all. Progress […]

The post The 2024 Global Food Policy Report Stresses Urgent Need for Transformative Action to Achieve Sustainable Healthy Diets and Improved Nutrition appeared first on IFPRI.





sse

Extended Alley Closure for the alley east of the following addresses will be closed: 947 thru 957 W. Cornelia Avenue, 3433 thru 3457 N. Sheffield Avenue & 946 thru 956 W. Newport Avenue

Extended Alley Closure for the alley east of the following addresses will be closed: 957 W. Cornelia Avenue, 3433 thru 3457 N. Sheffield Avenue & 946 – 956 W. Newport Avenue




sse

Berwyn Station Temporary Closure (Planned Work w/Station(s) Bypassed)

(Sun, May 16 2021 12:01 AM to TBD) Berwyn station is temporarily closed. Please use the adjacent stations at Bryn Mawr or Argyle (enter Argyle station 1 block south of Berwyn on Foster Ave).




sse

Lawrence Station Temporary Closure (Planned Work w/Station(s) Bypassed)

(Sun, May 16 2021 12:01 AM to TBD) Lawrence stn is temporarily closed. Please use adjacent stations at Argyle (enter on Winona) or Wilson. 81 Lawrence bus rerouted to connect to Wilson station.






sse

UCLA infuses the arts into collaborative classes for Bruins and incarcerated students

The Prison Education Program recently hosted a special campus performance for participants in its innovative prison-based spoken-word course.




sse

Opening Reception for Common Ground: ART x BISSELL 2016 Exhibition

Toronto, ON — Inspired by the plight of Syrian refugees, and by the ongoing displacement of peoples in Toronto and abroad,  ART x BISSELL, in partnership with SKETCH and The Remix Project, is pleased to present Common Ground, the 2nd annual contemporary art exhibition at the University of Toronto’s Faculty of Information (iSchool). Curated by Master of Museum Studies students […]




sse

Survey Provides Rare Insight into the Governance of Private Family Businesses

Toronto, ON – Family businesses, arguably the most important contributors to Canada’s economy, recognize the need for strong governance, but approach board oversight in a variety of ways depending on their size and stage of maturity. A survey conducted by the Institute of Corporate Directors (ICD) and the Clarkson Centre for Board Effectiveness (CCBE) at […]




sse

PEN and IHRP report on India reveals culture of stifling dissent, criminalising free expression

Toronto, ON – An inefficient legal system and what amounts to unchecked abuse of vague and overbroad legislation have contributed to a chilling effect on free speech within India’s society and throughout its public sphere according to a report released today by PEN International, PEN Canada and International Human Rights Program (IHRP) at the University of […]




sse

The Moth Radio Hour: All Dressed Up

Don your finest duds! This week, The Moth Radio Hour is all about clothes -- from DIY threads to silk blouses, from a prison visiting room to a runway in France. This episode is hosted by Moth producer and director Chloe Salmon. The Moth Radio Hour is produced by The Moth and Jay Allison of Atlantic Public Media.

Hosted by: Chloe Salmon

Tween Horace Sanders creates a homemade Halloween costume.

Deepa Ambekar is caught off guard by a prison's dress code for visitors.

Zakiya Minifee fails to heed her mother's fashion advice. 

Adrienne Burris is certain that her new husband has ruined her favorite blouse. 

Graham Shelby joins the football team as a gentle teenager. 

Model Norma Jean Darden participates in a historic catwalk battle. 




sse

On the Water: Linda Grosser and Jon Goode

On this episode, stories about the power of water. Hosted by Kate Tellers, Senior Director at the Moth.

Storytellers:

Linda Grosser discovers more about herself on a sailboat.

Jon Goode learns that it’s all about standing in the right line.




sse

Listening Is Essential Work, Whether There's a Crisis or Not

The common thread in both the COVID-19 pandemic and the racial unrest sweeping America is that both crises happened because leaders failed to do one thing: listen. With coronavirus, the failure was immediate, hobbling what should have been an effective early response. In the case of the racial-justice protests, the failure to listen compounded over decades of police abuses, and the dam of national outrage finally broke following the murder of George Floyd in May. Amid the anguish and loss brought ...




sse

Companies Gain Competitive Advantage by Certifying Processes

As more companies expand operations and rely on supply chains that extend into many parts of the world, certifications are becoming more valuable.




sse

How Digital Twins Can Optimize Production, Fabrication, and Assembly

Digital twins replicate real-world environments digitally, aiding manufacturers in optimizing processes and improving safety and performance.




sse

Smart Glasses Aid Inspection of Automotive Wire Harnesses

AI-based vision system ensures that relays and other components are installed correctly.




sse

CyberMetrics Announces New Leadership of the Asset Management Division

Though FaciliWorks CMMS is already used by hundreds of Mexican companies, there is still an enormous number of potential clients who are in need of a system like FaciliWorks.




sse

Best Practices for Validating CMM-based Inspection Processes

What level of quality do you feel is required in orthopedic implants, pacemakers and other critical, life-sustaining medical devices? The highest quality, of course!




sse

How Harnessing Edge Learning AI Technology Simplifies Manufacturing Processes

Traditional machine vision used rule-based programming for controlled environments but struggled in less controlled settings. Edge learning AI, operating directly on vision systems, enhances machine vision's power and usability, revolutionizing quality assurance and manufacturing processes.




sse

Improve Your Manufacturing Processes Without Neglecting Quality and Tight Tolerances

The aerospace industry is known for manufacturing parts with critical dimensions and tight tolerances. Despite the high-demanding inspections they are required to perform, important players in the industry have managed to reduce bottlenecks and detect problems early in the manufacturing process.




sse

White Paper | Different Implants, Same Manufacturing Processes

Explore the quality gates for the metal manufacturing process and the plastic manufacturing process in this whitepaper.




sse

Creaform and Olympus Sign Worldwide Distribution Agreement for Pipeline Integrity Assessment Solutions

Olympus now distributes Creaform’s Pipecheck Analyze software.




sse

Advancements in Semi-Automated Ballistics Assessment: The Role of CT X-ray NDT

Accurate assessments of military and defense assets, especially ballistics, are crucial for battlefield success. Advanced CT X-ray nondestructive testing (NDT) and robotic systems integration have revolutionized inspections, enhancing quality control and safety.