nds

Attack on Titan. 4, Humanity pushes back! / Hajime Isayama ; [translator, Sheldon Drzka ; lettering, Steve Wands].

"Humanity pushes back! The Survey Corps develops a risky gambit— have Eren in Titan form attempt to repair Wall Rose, reclaiming human territory from the monsters for the first time in a century. But Titan-Eren's self-control is far from perfect, and when he goes on a rampage, not even Armin can stop him! With the survival of humanity on his massive shoulders, will Eren be able to return to his senses, or will he lose himself forever?"-- Page [4] of cover.




nds

Outcast. Volume 1, A darkness surrounds him / Robert Kirkman, creator, writer ; Paul Azaceta, artist ; Elizabeth Breitweiser, colorist ; Rus Wooton, letterer.

Kyle Barnes has been plagued by demonic possession all his life and now he needs answers. Unfortunately, what he uncovers along the way could bring about the end of life on Earth as we know it.




nds

CSA Investor Alert: Investment scams imitating well-known financial brands

Toronto – The Canadian Securities Administrators (CSA) is warning the public about scammers claiming to represent large, well-known financial companies.  Recently, the CSA has noted an increase in the number of scams involving the use of professional looking electronic broch




nds

My little pony : friendship is magic. Season 10, Volume 1 / colors by Heather Breckel ; letters by Neil Uyetake.

A first installment in a graphic-novel rendering of Season 10 from the beloved animated series finds Twilight adjusting to new leadership responsibilities by recruiting her friends to help explore potentially dangerous regions throughout Equestria.




nds

CSA Notice and Request for Comment – Proposed Amendments to National Instrument 81-101 Mutual Fund Prospectus Disclosure, National Instrument 81-102 Investment Funds, National Instrument 81-106 Investment Fund Continuous Disclosure, National Instrument 81

This document is available as PDF only. The following links go to sections in the PDF. 




nds

Tenable Research Uncovers Thousands of Vulnerable Cyber Assets Amongst Southeast Asia’s Financial Sector

 New research conducted by Tenable®, Inc., the exposure management company, has uncovered more than 26,500 potential internet-facing assets among Southeast Asia’s top banking, financial services and insurance (BFSI) companies by market capitalisation across Indonesia, Malaysia, the Philippines, Singapore, Thailand and Vietnam.

On July 15, 2024, Tenable examined the external attack surface of over 90 BFSI organisations with the largest market capitalisations across the region. The findings revealed that the average organisation possesses nearly 300 internet-facing assets susceptible to potential exploitation, resulting in a total of more than 26,500 assets across the study group.

Singapore ranked the highest among the six countries assessed, with over 11,000 internet-facing assets identified across its top 16 BFSI companies. Over 6,000 of those assets are hosted in the United States. Next on the list is Thailand with over 5000 assets. The distribution of internet-accessible assets underscores the need for cybersecurity strategies that adapt to the rapidly evolving digital landscape.

CountryNumber of internet-facing assets amongst top 90 BFSI companies by market capitalisation
  1. Singapore
11,000
  1. Thailand
5,000
  1. Indonesia
4,600
  1. Malaysia
4,200
  1. Vietnam
3,600
  1. Philippines
2,600

“The results of our study reveal that many financial institutions are struggling to close the priority security gaps that put them at risk. Effective exposure management is key to closing these gaps,” said Nigel Ng, Senior Vice President, Tenable APJ. “By identifying and securing vulnerable assets before they can be exploited, organisations can better protect themselves against the growing tide of cyberattacks.” 


Cyber Hygiene Gaps 
The Tenable study revealed many potential vulnerabilities and exposed several cyber hygiene issues among the study group, including outdated software, weak encryption, and misconfigurations. These vulnerabilities provide cybercriminals with easily exploitable potential entry points, posing potential risk to the integrity and security of financial data. 

Weak SSL/TLS encryption 

A notable finding is that among the total assets, organisations had nearly 2,500 still supporting TLS 1.0—a 25-year old security protocol introduced in 1999 and disabled by Microsoft in September 2022. This highlights the significant challenge organisations with extensive internet footprints face in identifying and updating outdated technologies.

Misconfiguration increases external exposure

Another concerning discovery was that over 4,000 assets, originally intended for internal use, were inadvertently exposed and are now accessible externally. Failing to secure these internal assets poses a significant risk to organisations, as it creates an opportunity for malicious actors to target sensitive information and critical systems.

Lack of encryption 

There were over 900 assets with unencrypted final URLs, which can present a security weakness. When URLs are unencrypted, the data transmitted between the user's browser and the server is not protected by encryption, making it vulnerable to interception, eavesdropping, and manipulation by malicious actors. This lack of encryption can lead to the exposure of sensitive information, such as login credentials, personal data, or payment details, and can compromise the integrity of the communication.


API vulnerabilities amplify risk

The identification of over 2,000 API v3 out of the total number of assets among organisations' digital infrastructure poses a substantial risk to their security and operational integrity.

APIs serve as crucial connectors between software applications, facilitating seamless data exchange. However, inadequate authentication, insufficient input validation, weak access controls, and vulnerabilities in dependencies within API v3 implementations create a vulnerable attack surface.

Malicious actors can exploit such weaknesses to gain unauthorised access, compromise data integrity, and launch devastating cyber attacks.

“The cybersecurity landscape is evolving faster than ever, and financial institutions must evolve with it, so they can know where they are exposed and take action to close critical risk” Ng added. “By prioritising exposure management, these organisations can better protect their digital assets, safeguard customer trust, and ensure the resilience of their operations in an increasingly hostile digital environment.”

About Tenable
Tenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com

Notes to Editors:

  1. Tenable examined the top 12-16 BFSI companies discoverable based on market cap. 
  2. In the context of this alert:
  • An asset is a domain name, subdomain, or IP addresses and/or combination thereof of a device connected to the Internet or internal network. An asset may include, but not limited to web servers, name servers, IoT devices, network printers, etc. Example: foo.tld, bar.foo.tld, x.x.x.xs.
  • The Attack Surface is from the network perspective of an adversary, the complete asset inventory of an organisation including all actively listening services (open ports) on each asset.




nds

Tenable Launches Tenable Enclave Security to Meet Demands of Highly Secure Environments

Tenable®, the exposure management company, today announced the availability of Tenable Enclave Security, a solution that supports the needs of customers operating in highly secure environments, such as those that are classified or otherwise air-gapped. Backed by Tenable Security Center, Tenable Enclave Security protects IT assets and modern workloads with risk assessment and contextual insight so organizations can identify exposures before they cause damage.

Federal agencies face unique security and compliance regulations when deploying cloud solutions, and Tenable Enclave Security is key to supporting public sector customers, as well as commercial organizations with strict data residency, security or privacy requirements. 

Built to support the strictest security requirements, including FedRAMP High and Impact Level 5, Tenable Enclave Security empowers agencies to know, expose and close IT and container exposures from a single, highly secure platform. This consolidated approach also eliminates tool sprawl, reduces costs and boosts efficiency for public sector organizations.

“As a leader in vulnerability management and cloud security and a longtime partner of governments all around the world, we’re perfectly positioned to tap into our expertise and deliver mission critical capabilities to assist government agencies as they transform their IT strategy and safely embrace modern workloads to speed innovation,” said Robert Huber, chief security officer and president, Tenable Public Sector, Tenable. “With Tenable Enclave Security, agencies are now able to gain a fuller understanding of their exposure and risk with the ability to continuously discover, assess and prioritize vulnerabilities across IT assets and container images, all from a single, highly secure framework.”

Tenable Enclave Security will immediately enable organizations to: 

  • Meet cloud security and data residency restrictions: Tenable Enclave Security enables customers to meet stringent cloud security and data residency requirements, such as FedRAMP High or Impact Level 5. It can meet customers’ needs wherever they reside, with the ability to be deployed on-prem, in a virtual private cloud or commercial cloud.
  • Secure containers before they hit production: As agencies modernize their infrastructure, containers create a more efficient manner to create applications and modernize existing ones. Tenable Enclave Security empowers organizations to quickly assess the risk in their container images, expose their vulnerabilities and understand the breadth of impact.
  • Centralize security tools: Unlike siloed solutions with fragmented visibility, Tenable Enclave Security provides protection for IT assets and modern workloads from a single deployment architecture. 

For more information on Tenable Enclave Security, please visit: https://www.tenable.com/products/enclave-security 

About Tenable

Tenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com

###

Media Contact:

Tenable

tenablepr@tenable.com




nds

Tenable Cloud Risk Report Sounds the Alarm on Toxic Cloud Exposures Threatening Global Organizations

Tenable®, the exposure management company, today released its 2024 Tenable Cloud Risk Report, which examines the critical risks at play in modern cloud environments. Most alarmingly, nearly four in 10 organizations globally are leaving themselves exposed at the highest levels due to the “toxic cloud trilogy” of publicly exposed, critically vulnerable and highly privileged cloud workloads. Each of these misalignments alone introduces risk to cloud data, but the combination of all three drastically elevates the likelihood of exposure access by cyber attackers.

Security gaps caused by misconfigurations, risky entitlements and vulnerabilities combine to dramatically increase cloud risk. The Tenable Cloud Risk Report provides a deep dive into the most pressing cloud security issues observed in the first half of 2024, highlighting areas such as identities and permissions, workloads, storage resources, vulnerabilities, containers and Kubernetes. It also offers mitigation guidance for organizations seeking ways to limit exposures in the cloud.

Publicly exposed and highly privileged cloud data lead to data leaks. Critical vulnerabilities exacerbate the likelihood of incidents. The report reveals that a staggering 38% of organizations have cloud workloads that meet all three of these toxic cloud trilogy criteria, representing a perfect storm of exposure for cyber attackers to target. When bad actors exploit these exposures, incidents commonly include application disruptions, full system takeovers, and DDoS attacks that are often associated with ransomware. Scenarios like these could devastate an organization, with the 2024 average cost of a single data breach approaching $5 million.1 

Additional key findings from the report include: 

  • 84% of organizations have risky access keys to cloud resources: The majority of organizations (84.2%) possess unused or longstanding access keys with critical or high severity excessive permissions, a significant security gap that poses substantial risk. 
  • 23% of cloud identities have critical or high severity excessive permissions: Analysis of Amazon Web Services (AWS), Google Cloud Platform (GCP) and Microsoft Azure reveals that 23% of cloud identities, both human and non-human, have critical or high severity excessive permissions. 
  • Critical vulnerabilities persist: Notably, CVE-2024-21626, a severe container escape vulnerability that could lead to the server host compromise, remained unremediated in over 80% of workloads even 40 days after its publishing. 
  • 74% of organizations have publicly exposed storage: 74% of organizations have publicly exposed storage assets, including those in which sensitive data resides. This exposure, often due to unnecessary or excessive permissions, has been linked to increased ransomware attacks. 
  • 78% of organizations have publicly accessible Kubernetes API servers: Of these, 41% also allow inbound internet access. Additionally, 58% of organizations have cluster-admin role bindings — which means that certain users have unrestricted control over all the Kubernetes environments.

“Our report reveals that an overwhelming number of organizations have access exposures in their cloud workloads of which they may not even be aware,” said Shai Morag, chief product officer, Tenable. “It’s not always about bad actors launching novel attacks. In many instances, misconfigurations and over-privileged access represent the highest risk for cloud data exposures. The good news is, many of these security gaps can be closed easily once they are known and exposed.”

The report reflects findings by the Tenable Cloud Research team based on telemetry from millions of cloud resources across multiple public cloud repositories, analyzed from January 1 through June 30, 2024.

To download the report today, please visit: https://www.tenable.com/cyber-exposure/tenable-cloud-risk-report-2024 

1 IBM Security Cost of a Data Breach Report 2024

About Tenable

Tenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com

###

Media Contact:

Tenable

tenablepr@tenable.com




nds

Mouse and mole fine feathered friends / Wong Herbert Yee.

It is a blustery spring day, and Mouse and Mole are very excited. They are going to go bird watching and plan to make bird books. It turns out, birds are not so easy to watch. Together, they come up with a plan to get closer to the birds.




nds

Dear Libby : will you answer my questions about friendship?.

How do we find lasting, trusting, and fulfilling friendships? Is it by being popular? Dazzling others with your genius? Looking for that ultimate BFF? Hiding all your imperfections and trying hard to fit in? Deep and enduring friendships are essential to our psychological and physical well-being. Unfortunately, between bullying, social anxiety, peer pressure, and other issues, many teens feel isolated. In Dear Libby, trusted columnist Libby Kiszner offers a breakthrough approach to friendship and connection. You can create friendships from the inside out-rather than from the outside in. You can experience friendships with vibrant self-expression in every stage of life, making Dear Libby a book that can be read and reread at any age. Containing seven core principles, this life-changing resource not only explains the dynamics of connections and friendships but also gives practical tools to develop them. Integrating contemporary issues, timeless insight, real-life skills, and unique perspectives, Dear Libby provides a hands-on guide for dealing with everyday friendship struggles faced by teens today. Teens and readers of all ages will gain insight and understanding on how to make profound, joyful relationships possible. Find answers to real questions like: What should I do when people who are supposed to be my friends call me names or embarrass me? What should I do I do if I'm being ignored at school? What is the best way to handle loneliness? Someone just stole my friend. What can I do? What can I do when my friends get together and "forget" to invite me?




nds

2022 Threat Landscape Report

2022 began with concerns over supply chains and Software Bills of Material (SBOM) as organizations worldwide were forced to reconsider how they respond to incidents in anticipation of the next major event. Tenable’s Security Response Team (SRT) continuously monitors the threat landscape throughout the year, always at the forefront of trending vulnerabilities and security threats. This dashboard provides a summary of Tenable data that has been compiled over the past year.

In a year marked by hacktivism, ransomware and attacks targeting critical infrastructure in a turbulent macroeconomic environment, organizations struggled to keep pace with the demands on cybersecurity teams and resources. Attacks against critical infrastructure remained a common concern. Ransomware continued to wreak havoc, even as some groups had operations shuttered by law enforcement, collapsed under the weight of internal power struggles, or splintered into new groups. New and complex vulnerabilities emerged, providing remediation challenges.

Perhaps most alarming is that the vulnerabilities of years past continue to haunt organizations. In fact, known flaws were so prominent inn 2022 that they warranted a spot on Tenable’s list of top vulnerabilities of 2022. We cannot stress this enough: Threat actors continue to find success with known and proven exploitable vulnerabilities that organizations have failed to patch or remediate successfully.

The constant evolution of the modern digital environment introduces new challenges for security practitioners. Successful security programs must take a comprehensive approach and understand where the most sensitive data and systems reside and what vulnerabilities or misconfigurations pose the greatest risk. Given the brisk rate of digital transformation, a complete understanding of the external attack surface is paramount.

With thousands of new vulnerabilities patched each year, only a small subset will ever see active exploitation. Focusing resources on the vulnerabilities that are exploitable and understanding how attackers chain vulnerabilities and misconfigurations enables security teams to design comprehensive strategies to reduce their overall risk exposure.

The Tenable 2022 Threat Landscape Report (TLR) inspects key aspects of the cybersecurity landscape and describes how organizations can revise their programs to focus on reducing risk. The TLR covers:

  • Significant vulnerabilities disclosed and exploited throughout the year, including how common cloud misconfigurations can affect even large tech companies
  • The continuous transformation of the ransomware ecosystem and the rise of extortion-only threat groups
  • Ongoing risks, vulnerabilities and attacks within the software supply chain
  • Tactics used by advanced persistent threat groups to target organizations with cyber espionage as well as financially motivated attacks.
  • Breach factors and the challenges in analyzing breach data, given the limited information available and lack of detailed reporting requirements
  • Details of the key vulnerabilities affecting enterprise software

Tenable Research delivers world class cyber exposure intelligence, data science insights, alerts, and security advisories. The Tenable Research teams perform diverse work that builds the foundation of vulnerability management. The Security Response Team (SRT) tracks threat and vulnerability intelligence feeds and provides rapid insight to the Vulnerability Detection team, enabling them to quickly create plugins and tools that expedite vulnerability detection. This fast turnaround enables customers to gain immediate insight into their current risk posture. Tenable Research has released over 180,000 plugins and leads the industry on CVE coverage. Additionally, the SRT provides breakdowns for the latest vulnerabilities on the Tenable Blog and produces an annual Threat Landscape Report. The SRT continuously analyzes the evolving threat landscape, authors white papers, blogs, Cyber Exposure Alerts, and additional communications to provide customers with comprehensive information to evaluate cyber risk.

Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable.sc discovers and analyzes assets continuously to provide an accurate and unified view of an organization’s security posture. The requirements for this dashboard is: Nessus.

Components

TLR 2022 – Top 5 Vulnerabilities:  This component features the top five vulnerabilities of 2022 as described in Tenable's 2022 Threat Landscape Report: Log4shell, Apache Log4j - CVE-2021-44228, Follina, Microsoft Support Diagnostic Tool - CVE-2022-30190, Atlassian Confluence Server and Data Center - CVE-2022-26134, ProxyShell, Microsoft Exchange Server - CVE-2021-34473, and Known Vulnerabilities - CVE-20XX-XXXX.

2022 TLR – Mitigation Tasks:  This component provides a list of patches that mitigate the key vulnerabilities in 2022, leveraging the CVEs identified in Tenable's 2022 Threat Landscape Report (TLR). The Remediation Summary tool uses the concept of a Patch Chain, and identifies the top patch to be remediated for the greatest risk reduction. When the top patch is applied, all other patches in the chain will be remediated.

2022 TLR – 90 Day Trend Analysis of Key Vulnerabilities: This component provides a 90-day analysis of the most notable vulnerabilities in 2022, leveraging the CVEs identified in Tenable's 2022 Threat Landscape Report (TLR). There are over 180 CVEs discussed in the TLR, which, combined with the trend line, helps risk managers determine how risk has been reduced over a period of 90 days. The vulnerability last observed filter is set to 1 day to display risk changes on a daily basis.

2022 TLR CVSS to VPR Heat Map: This component provides a correlation between CVSSv3 scores and Vulnerability Priority Rating (VPR) scoring for the key vulnerabilities listed in the 2022 Threat Landscape Report (TLR). The CVSSv3 scores are the standard scoring system used to describe the characteristics and severity of software vulnerabilities. Tenable's VPR helps organizations refine the severity level of vulnerabilities in the environment by leveraging data science analysis and threat modeling based on emerging threats. Each cell is comprised of a combination of cross-mapping of CVSS, VPR scoring, and 2022 CVE identifiers. Using a heat map approach, the filters begin in the left upper corner with vulnerabilities that present least risk.  Moving to the right and lower down the matrix the colors change darker from yellow to red as the risk levels increase.  Tenable recommends that operations teams prioritize remediation for risks in the lower right corners, and then work towards the upper left cells.

2022 TLR – Zero Day Vulnerabilities by Software/Hardware Type: This component displays a list of software/hardware that had zero-day vulnerabilities described in the 2022 Threat Landscape Report (TLR). Each indicator uses CVE from the report through the entire 2022 year. Details are provided in Tenable's 2021 Threat Landscape Report (TLR).

2022 TLR Key Vulnerabilities: This component displays cells for the most significant vulnerabilities of 2022 using CVE filters from the 2022 Threat Landscape Report. These filters display the key vulnerabilities from 2022 as well as the notable legacy vulnerabilities from prior years. Details are provided in Tenable's 2022 Threat Landscape Report.




nds

EHP Funds Inc. and EHP Global Multi-Strategy Alternative Fund

HeadnoteNational Policy 11-203 Process for Exemptive Relief Applications in Multiple Jurisdictions -- Relief granted from fund multi-layering restriction in paragraph 2.5(2)(b) of NI 81-102 to permit an investment fund to invest in another investment fund under common management that hol




nds

RP Investment Advisors LP and The Funds

HeadnoteNational Policy 11-203 Process for Exemptive Relief Applications in Multiple Jurisdictions -- relief granted revoking and replacing existing short selling, cash cover and custodial relief to extend existing relief beyond a "government security" as defined in NI 81-102 to also inc




nds

Eyewitness travel. Canary Islands, [2017] / main contributors, Piotr Paszkiewicz, Hanna Faryna-Paszkiewicz, Gabriele Rupp.

Provides background information on the Canary Islands; describes the major sights, and suggests hotels, restaurants, entertainment, and outdoor activities.




nds

Grand Rounds with Dr. Uché Blackstock (November 13, 2024 12:00pm)

Event Begins: Wednesday, November 13, 2024 12:00pm
Location: School of Social Work Building
Organized By: School of Social Work


We are delighted to announce that Dr. Uché Blackstock—an esteemed author, highly sought-after speaker on racism in medicine, and founder and CEO of Advancing Health Equity—will be virtually visiting the School of Social Work. During her visit, she will participate in a 30-minute fireside chat, followed by a 15-minute Q&A session. Lunch will be provided in the ECC for those attending in person who register by November 11, 2024.

In anticipation of her visit, we are pleased to offer 100 complimentary copies of her book, "LEGACY: A Black Physician Reckons with Racism in Medicine." To receive a free copy, please RSVP for the event. Upon confirming your attendance, you will be provided with a link to schedule a time to pick up your book in person, as we are unable to mail any copies.

We look forward to welcoming Dr. Blackstock and hope you take advantage of this unique opportunity to engage with her insightful work.




nds

"KIN: Us and Our Kinds" Art Exhibition (November 13, 2024 9:00am)

Event Begins: Wednesday, November 13, 2024 9:00am
Location: Lane Hall
Organized By: Judaic Studies


KIN assembles the queer beings who dwell beyond the confines of binary gender and species categories. It highlights communities whose members and affiliations strain normative arrangements of “nature” and “culture.” KIN transmutes these categories by its joinings of oddbods and oddkin. It envisions worlds in which creatures form kinship beyond the monogamous, cisheterosexual, human family unit.

Transversing painting, drawing, comics, and installation, KIN’s menagerie of media, draws on ancient Jewish sources, demi-fictional autobiography, deviant zoology, and a love for the materiality of mark-making itself. Process, rather than product; becoming, rather than stasis; collaboration rather than closure: this is KIN’s hope.




nds

Navigating the Trade Landscape: A Latin American Perspective building on the WTO 13th Ministerial Conference

Navigating the Trade Landscape: A Latin American Perspective building on the WTO 13th Ministerial Conference

The governance of agricultural and food trade is facing unprecedented challenges in a rapidly evolving global landscape. As traditional agricultural trade issues, such as domestic support and market access, seem to lose their prominence and the feasibility of advancing with a multilateral strategy diminishes, the focus is shifting toward the environmental and nutritional dimensions of […]

The post Navigating the Trade Landscape: A Latin American Perspective building on the WTO 13th Ministerial Conference appeared first on IFPRI.











nds

CTA Extends #9 Ashland to Connect Directly to Ravenswood Metra Station

The Chicago Transit Authority (CTA) announced the extension to one of its most heavily ridden routes, the #9 Ashland, to the Ravenswood Metra station located at Lawrence and Ravenswood.




nds

New U-Pass Plus with Metra popular with UIC students; Thousands sign up for joint Metra/CTA fare product

More than 4,100 University of Illinois Chicago students have signed up to receive the new U-Pass + Metra, a pass that gives them unlimited rides on Metra and the CTA for a reduced fare price under a one-year pilot program.




nds

Get Into the Spooky Sights and Sounds of the Season with CTA

Travel on CTA to all your fun activities across town. Customers can save money by purchasing an unlimited rides pass, either the 1-Day ($5) – far more economical and convenient than the price of gas and parking - or the 3-Day ($15) pass – a real budget-saving move.




nds

SUMMER SCHOOL 2: Index Funds & The Bet

In 2006, Warren Buffett bet a million dollars that the most brainless, boring investment around would do better than the researched, handpicked investments of some of the smartest hedge fund managers in the world. The second class of Summer School looks at how that bet played out, the origins of the index fund, and why it's so hard to beat the market. Returning to the underlying theme of risk and reward, we also discuss how diversification reduces risk. | Watch this Tik Tok to learn more and subscribe to our weekly newsletter here.

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy




nds

SUMMER SCHOOL 4: Bonds & Becky With The Good Yield

A few years back, Cardiff asked for an unusual Christmas present: a junk bond... Parallel to the stock market, the bond market offers different levels of risk and reward. In this class, what is a bond, how do they differ from stocks, and how do they help companies grow? | Watch this Tik Tok to learn more and subscribe to our weekly newsletter here.

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy




nds

EXTRA: Grandma's Hands

On this short Mother's Day episode, Madzimoyo Owusu came to StoryCorps with her daughter, Johannah Owusu, to honor the memory of the woman who helped shape her life.

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy





nds

Climate Mindset

In the past few months, human beings have come together to fight a global threat. This hour, TED speakers explore how our response can be the catalyst to fight another global crisis: climate change. Guests include political strategist Tom Rivett-Carnac, diplomat Christiana Figueres, climate justice activist Xiye Bastida, and writer, illustrator, and artist Oliver Jeffers.

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy




nds

Making Amends

What makes a true apology? What does it mean to make amends for past mistakes? This hour, TED speakers explore how repairing the wrongs of the past is the first step toward healing for the future. Guests include historian and preservationist Brent Leggs, law professor Martha Minow, librarian Dawn Wacek, and playwright V (formerly Eve Ensler).

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy




nds

Listen Again: Climate Mindset

Original broadcast date: May 22, 2020. In the past few months, human beings have come together to fight a global threat. This hour, TED speakers explore how our response can be the catalyst to fight another global crisis: climate change. Guests include political strategist Tom Rivett-Carnac, diplomat Christiana Figueres, climate justice activist Xiye Bastida, and writer, illustrator, and artist Oliver Jeffers.

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy




nds

Listen Again: Making Amends

Original broadcast date: July 10, 2020. What makes a true apology? What does it mean to make amends for past mistakes? This hour, TED speakers explore how repairing the wrongs of the past is the first step toward healing for the future. Guests include historian Brent Leggs, law professor Martha Minow, librarian Dawn Wacek, and playwright V (formerly Eve Ensler).

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy




nds

Listen Again: Making Amends

Original broadcast date: July 10, 2020. What makes a true apology? What does it mean to make amends for past mistakes? This hour, TED speakers explore how repairing the wrongs of the past is the first step toward healing for the future. Guests include historian Brent Leggs, law professor Martha Minow, librarian Dawn Wacek, and playwright V (formerly Eve Ensler).

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy




nds

Changing Our Minds

Admitting we're wrong is painful--even seen as a sign of weakness. But what if we take a more flexible approach? This hour: how rethinking ideas can be good for our brains and our relationships. Guests include former GOP congressman Bob Inglis, organizational psychologist Adam Grant, and civil rights activist Loretta J. Ross.

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy




nds

Changing Our Minds (2021)

Original broadcast date: Friday, December 3, 2021. Admitting we're wrong is painful--even seen as a sign of weakness. But what if we take a more flexible approach? This hour: how rethinking ideas can be good for our brains and our relationships. Guests include former GOP congressman Bob Inglis, organizational psychologist Adam Grant, and civil rights activist Loretta J. Ross.

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy




nds

Changing Our Minds: Why we should admit when we're wrong

Original broadcast date: Friday, December 3, 2021. Admitting we're wrong is painful — even seen as a sign of weakness. But what if we take a more flexible approach? This hour: how rethinking ideas can be good for our brains and our relationships. Guests include former GOP congressman Bob Inglis, organizational psychologist Adam Grant, and civil rights activist Loretta J. Ross.

TED Radio Hour+ subscribers now get access to bonus episodes, with more ideas from TED speakers and a behind the scenes look with our producers. A Plus subscription also lets you listen to regular episodes (like this one!) without sponsors. Sign-up at plus.npr.org/ted.

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy




nds

Brija Johnson leads new program that expands UCLA’s entrepreneurial ties in the region

Bruin Founders will advance goal 1 of UCLA’s Strategic Plan: to deepen the university’s engagement with Los Angeles.




nds

UCLA’s Big Ten opener: New rivals, new friends

The unfortunate result on the field couldn’t quash the newfound camaraderie between Bruins and Indiana Hoosiers fans.




nds

UCLA expands graduate housing with new Canfield Apartments in Cheviot Hills

The newly constructed six-story, 62-unit apartment building in West Los Angeles adds 142 beds to UCLA’s inventory. Move-in begins Oct. 1.




nds

UCLA’s Lindsey T. Kunisaki authors first-of-its-kind Proposition 28 report for Arts for LA

The report finds an arts teacher shortage, gaps in public involvement and capacity issues holding back the full potential of the arts education measure.




nds

Mountain fire ‘a suburban firestorm’ due to Santa Ana winds

California chapparal fire burns into urban Ventura County, showing need for strategies beyond fighting ‘forest’ fires.




nds

University of Toronto study finds action video games bolster sensorimotor skills

TORONTO, ON — A study led by University of Toronto psychology researchers has found that people who play action video games such as Call of Duty or Assassin’s Creed seem to learn a new sensorimotor skill more quickly than non-gamers do. A new sensorimotor skill, such as learning to ride a bike or typing, often […]




nds

$1,873,485 in Canada Foundation for Innovation funds awarded to U of T Researchers

TORONTO, ON — Eleven U of T researchers have been selected as recipients of the Canada Foundation for Innovation’s John R. Evans Leaders funds totalling $1,873,485. The John R. Evans Leaders Fund was established to assist institutions in attracting and retaining talented researchers. Candidates for funding must be either recognized leaders or have demonstrated the […]




nds

University of Toronto study finds high levels of equality for Muslim women in Canada

TORONTO, ON — A landmark study on gender equality among religious minorities in Canada sharply disputes the stereotype Muslim women are more repressed by men than other groups of immigrants. Sharia law, burqas, honour killings and overseas terrorism directed at girls and women grab headlines and shape public opinion, but workforce participation rates among immigrants […]



  • Arts
  • Social Sciences & Humanities

nds

Baruch College Team Successfully Defends its Title at the Rotman International Trading Competition

Toronto, ON – For the second year in row a team from the Master of Financial Engineering program at Baruch College in New York City has won the Rotman International Trading Competition. The 14th annual edition of one of the world’s preeminent trading competitions was hosted by the University of Toronto’s Rotman School of Management […]




nds

Many life-saving defibrillators behind locked doors during off-hours, study finds

Toronto, ON –  When a person suffers cardiac arrest, there is a one in five chance a potentially life-saving Automated External Defibrillator (AED) is nearby. But up to 30 per cent of the time, the device is locked inside a closed building, according to a study led by U of T Engineering researchers, published today […]




nds

1,400 students and teachers to participate in Canada’s largest STEM event for kids - University of Toronto Engineering, Google and Actua partner on Innovate U, a day-long STEM event for children in grades 3-8, featuring hands-on coding, circuitry and more

University of Toronto Engineering, Google and Actua partner on Innovate U, a day-long STEM event for children in grades 3–8, featuring hands-on coding, circuitry and moreToronto, ON – More than 1,400 students from Grades 3–8 will descend on the University of Toronto on Friday, May 13 for Innovate U, a massive day of hands-on activities […]