how

‘An Unprecedented Disruption’ — How Adolescents Are Coping With the Pandemic

As millions of adolescents head back to school, what can science tell us about how the isolation and upheaval of the past year-and-a-half have affected their mental health and development?




how

How College and University Leaders Are Getting Their Campuses Vaccinated

For the first time since the pandemic struck, many colleges and universities are bringing students back to campus at full capacity. Their administrators are turning to new strategies and incentives to get students vaccinated against COVID-19.




how

Confronting a ‘Triple Existential Threat’ — NAM President Victor Dzau Discusses How Health and Medicine Can Respond to Current Crises

In advance of the National Academy of Medicine’s annual meeting on Oct. 17-18, NAM President Victor Dzau sat down to talk about the compounding crises of COVID-19, climate change, and systemic racism — and how health and medicine can help respond to these threats.




how

New Publication Explores How to Prioritize Investments in Infrastructure in the Gulf of Mexico

The recently passed Infrastructure Investment and Jobs Act presents a unique opportunity for the U.S. to improve its transportation, water, communication, and energy systems.




how

International Science Academies Meet in Poland to Explore How to Support Ukrainian Science and Researchers

The U.S. National Academy of Sciences and the Polish Academy of Sciences brought together leaders from the National Academy of Sciences Ukraine and several other national academies for a meeting in Warsaw to identify concrete actions the international science community can take to support Ukrainian researchers and science capabilities.




how

‘A Marathon, Not a Sprint’ — How Can Cities Reduce Greenhouse Gas Emissions and Also Improve Mobility?

Emission reduction goals, changing transportation patterns caused by COVID, an influx of infrastructure investments, and the need to support mobility for all residents together present a challenge for planners. A recent webinar explored how cities can support a transition to more equitable, lower-emissions urban transportation systems.




how

Conference of Global Science Academies, Including Young Academies for the First Time, Will Explore How to Make Research Systems More Inclusive, Effective, and Sustainable

The Triennial Conference of the InterAcademy Partnership and the Worldwide Meeting of Young Academies will take place Nov. 1-3. The conference will convene the world’s senior and young science academies to explore how to make research structures and processes more inclusive, effective, and sustainable.




how

Researchers Need to Rethink and Justify How and Why Race, Ethnicity, and Ancestry Labels Are Used in Genetics and Genomics Research, Says New Report

Race, ethnicity, and ancestry labels are often used in genomics and genetics research to describe human genetic differences, which is misleading and inaccurate. Researchers and scientists who utilize genetic and genomic data should rethink and justify how and why they use these descriptors in their work.




how

Untangling the hiring dilemma: How security solutions free up HR processes

The prerequisites for becoming a security elite create a skills ceiling that is tough to break through – especially when it comes to hiring skilled EDR or XDR operators. How can businesses crack this conundrum?




how

The who, where, and how of APT attacks – Week in security with Tony Anscombe

This week, ESET experts released several research publications that shine the spotlight on a number of notable campaigns and broader developments on the threat landscape




how

What happens when AI goes rogue (and how to stop it)

As AI gets closer to the ability to cause physical harm and impact the real world, “it’s complicated” is no longer a satisfying response




how

AI in HR: Is artificial intelligence changing how we hire employees forever?

Much digital ink has been spilled on artificial intelligence taking over jobs, but what about AI shaking up the hiring process in the meantime?




how

The murky world of password leaks – and how to check if you’ve been hit

Password leaks are increasingly common and figuring out whether the keys to your own kingdom have been exposed might be tricky – unless you know where to look




how

How Arid Viper spies on Android users in the Middle East – Week in security with Tony Anscombe

The spyware, called AridSpy by ESET, is distributed through websites that pose as various messaging apps, a job search app, and a Palestinian Civil Registry app




how

Hijacked: How hacked YouTube channels spread scams and malware

Here’s how cybercriminals go after YouTube channels and use them as conduits for fraud – and what you should watch out for when watching videos on the platform




how

5 common Ticketmaster scams: How fraudsters steal the show

Scammers gonna scam scam scam, so before hunting for your tickets to a Taylor Swift gig or other in-demand events, learn how to stop fraudsters from leaving a blank space in your bank account




how

Understanding IoT security risks and how to mitigate them | Unlocked 403 cybersecurity podcast (ep. 4)

As security challenges loom large on the IoT landscape, how can we effectively counter the risks of integrating our physical and digital worlds?




how

Hello, is it me you’re looking for? How scammers get your phone number

Your humble phone number is more valuable than you may think. Here’s how it could fall into the wrong hands – and how you can help keep it out of the reach of fraudsters.




how

How a signed driver exposed users to kernel-level threats – Week in Security with Tony Anscombe

A purported ad blocker marketed as a security solution leverages a Microsoft-signed driver that inadvertently exposes victims to dangerous threats




how

Black Hat USA 2024: How cyber insurance is shaping cybersecurity strategies

Cyber insurance is not only a safety net, but it can also be a catalyst for advancing security practices and standards




how

How a BEC scam cost a company $60 million – Week in security with Tony Anscombe

Business email compromise (BEC) has once again proven to be a costly issue, with a company losing $60 million in a wire transfer fraud scheme




how

How regulatory standards and cyber insurance inform each other

Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with




how

6 common Geek Squad scams and how to defend against them

Learn about the main tactics used by scammers impersonating Best Buy’s tech support arm and how to avoid falling for their tricks




how

Time to engage: How parents can help keep their children safe on Snapchat

Here’s what parents should know about Snapchat and why you should take some time to ensure your children can stay safe when using the app




how

Quishing attacks are targeting electric car owners: Here’s how to slam on the brakes

Ever alert to fresh money-making opportunities, fraudsters are blending physical and digital threats to steal drivers’ payment details




how

Google Voice scams: What are they and how do I avoid them?

Watch out for schemes where fraudsters trick people into sharing verification codes so they can gain access to their phone numbers




how

How to remove your personal information from Google Search results

Have you ever googled yourself? Were you happy with what came up? If not, consider requesting the removal of your personal information from search results.




how

From chargers to children's data: How the EU reined in big tech

The groundbreaking Digital Services Act (DSA) and its sister law, the Digital Markets Act (DMA), are the biggest and most recent attempts to rein in tech companies.




how

How emerging trends in big data can transform India's retail industry

Big data allows retailers to analyze vast sets of customer information including purchase history, demographics, browsing behaviour, and social media interactions. This enables highly targeted marketing campaigns, product recommendations, and loyalty programs.




how

How leaders bring in real business impact of data in enterprises

Harnessing data is a multifaceted endeavor including CX, privacy, modernization, etc. Industry leaders talk about how data can drive substantial business impact while navigating the inherent challenges.




how

Digital Services Act: Here's how Europe is cracking down on Big Tech

The Digital Services Act aims to protect European users when it comes to privacy, transparency, and removal of harmful or illegal content.




how

How Karza Technologies makes due diligence and onboarding simpler for banks & NBFCs

One of the key pillars of growth for the Indian economy are small and medium-sized businesses, which generate roughly 30 percent of the countrys GDP and provide jobs to over 110 million people.




how

How the renewed data protection landscape impact BPO industry

With the increased focus on data security and privacy, BPO service providers will need to restructure their data compliance plan ahead of time. This is not only to ensure that the soon-to-be-updated rules are implemented in a timely manner but also to improve customer service efficiency and increase the firm's general reputation.




how

How Blue Sapphire Healthcare is building parallel digital solutions at low cost

Over 80 percent of invoicing at Blue Sapphire Healthcare has already gone digital with patients also accepting digital invoices.




how

How Sodexo leveraged the cloud ERP to manage their financial data more efficiently

French food services & facilities management company Sodexo is consolidating its multiple ERP installations across the group to a single cloud-based ERP platform.




how

Enroute GCC: How Amadeus India is leading the shift to high strategic projects

With 40% of Amadeus’ product development happening in India, Sreejith A. R, Head of Creation Platform and Shared Services- APAC, details the factors that work for GCC, and the role of AI in making GCCs more efficient.




how

How my organization fell prey to transnational cyber fraud

Last year my organization fell victim to a trans- national export invoice fraud. Since 99 percent of our sales come from exports, the cyber fraud dealt a big blow to our organization. We have a customer in South East Asia and my organization had business dealings with this customer for over five years.




how

How to choose a public cloud storage provider

A recent Gartner study offers some useful guidelines on how to choose an enterprise-level cloud storage provider. But don’t forget that providers need to work together effectively too.




how

How CIOs are using the cloud to take on shadow IT

There’s a growing phenomenon in CIOs’ lives, and it’s called Shadow IT: other departments like finance and marketing bypassing the IT department and buying their own technology.




how

How we connect you for a better future

At BT Global Services connections are our business. We are trusted by thousands of enterprises around the world, combining our global strength in networks, IT and innovation with local presence, expertise and delivery. Watch this video to find out how we can help you connect for a better future.




how

Show as well as tell

Desktop sharing features put everyone in the picture




how

How fungi help trees tolerate drought

The mutualistic relationship between tree roots and ectomycorrhizal (ECM) fungi has been shaping forest ecosystems since their inception. ECM fungi are key players supporting the growth, health and stress tolerance of forest trees globally, such as oak, pine, spruce, birch and beech, and help boost the productivity of bioenergy feedstock trees, including poplar and willow. The most common ECM fungus is Cenococcum geophilum, found in subtropical through arctic zones and especially in extreme environments. It is also the only mycorrhizal fungus in the Dothideomycetes, a large class comprised of some 19,000 fungal species, many of them plant pathogens.

read more



  • Biology & Nature

how

Study reveals how ionising radiation damages DNA and causes cancer

For the first time, researchers from the Wellcome Trust Sanger Institute and their collaborators have been able to identify in human cancers two characteristic patterns of DNA damage caused by ionising radiation. These fingerprint patterns may now enable doctors to identify which tumours have been caused by radiation, and investigate if they should be treated differently.

read more



  • Biology & Nature

how

Digital payments show strong uptick buoyed by wider adoption of credit during festive season

During this year’s festive season sales, credit cards and credit-based payment instruments like pay-later products saw a significant increase, according to industry reports. Transactions rose by 35-50% compared to last year, with a large share being made through credit cards, EMIs, and pay-later options. Unified Payments Interface (UPI) remained the dominant payment method, with a 34% rise in transactions and over 500 million daily payments recorded.




how

How 5-star online customer reviews can backfire

It may be counterintuitive, but the more positive online reviews a product gets may actually lead to a net negative profit for the retailer. That's the conclusion of new research by a team of marketing experts from a Dutch and a German university that will be published in the September 2016 issue of the Journal of Retailing.

read more



  • Mathematics & Economics

how

How Flipkart leverages data analytics to create e-commerce strategies

In an interview with ETCIO, Ravi Vijayaraghavan, SVP & Chief Data & Analytics Officer, Flipkart shares how the homegrown e-commerce giant leverages data science to drive customer experience and seller profitability.




how

How to measure your food safety climate

Ever since Frank Yiannas of Walmart's Food Safety Leadership published his insightful book "Food Safety Culture" in 2008, the food and beverage industry has embraced the reality that having a strong food safety culture is essential for success.




how

How does air affect food safety in snack and bakery facilities?

The air around your product should be maintained just like all equipment and product itself. The air intake system should be part of your sanitary design program, evaluating the design to ensure inspection and cleaning hatches are installed at various points for proper maintenance.




how

IFT20 roundup: The annual show goes virtual

This year's IFT show was very different because of the coronavirus pandemic: it was virtual-only, and was renamed SHIFT20. All events took place online, from July 12-15.




how

ECD BakeWATCH to showcase new cake, bread sensor designs at IBIE

Show attendees to get first-hand look at CakeOMETER for cake-baking precision, BreadOMETER's enhanced durability design, and pre-launch version of reimagined baking profiler and software.