uri Malco Products Brings Manufacturing to Former VISE-GRIP Nebraska Factory By www.achrnews.com Published On :: Wed, 28 Nov 2018 09:00:00 -0500 Seven of the new full-time employees hired to start up operations previously worked at the VISE-GRIP factory. Malco plans to add jobs as production increases. Full Article
uri Comprehensive Guide: HVAC Service Calls During COVID-19 By www.achrnews.com Published On :: Tue, 24 Mar 2020 11:07:00 -0400 Here's how to ensure that your customers and employees stay healthy and safe during your service calls, in the midst of a pandemic. Full Article
uri Serving Your Company During the COVID-19 Crisis By www.achrnews.com Published On :: Thu, 09 Apr 2020 04:00:00 -0400 This is a once-in-lifetime opportunity where leadership becomes a precious commodity. Full Article
uri Sales Software Can Help HVAC Businesses During Busy Seasons By www.achrnews.com Published On :: Fri, 11 Mar 2022 14:00:00 -0500 The last couple busy seasons, HVAC contractors have seen a high influx of calls due to remote work. There are steps HVAC companies can take to meet demand while also alleviating the stress of the season. Full Article
uri Continental Fan Manufacturing Inc.: Bathroom Exhaust Fan By www.achrnews.com Published On :: Mon, 16 Dec 2019 04:07:00 -0500 Awarded the Energy Star® Most Efficient Mark in 2019, this product has a high-efficiency DC motor. Full Article
uri Tape Can Help Keep Clients Warm During Chilly Months While Lowering Energy Consumption By www.achrnews.com Published On :: Sat, 03 Apr 2021 11:00:00 -0400 Properly sealing and maintaining heating and cooling ducts is a low-cost measure that can improve energy efficiency. Full Article
uri HVAC Maintenance and Service Before, During, and After Duct Leaks By www.achrnews.com Published On :: Tue, 07 Sep 2021 07:00:00 -0400 Context can help professionals direct their attention to where duct leakage can best be addressed. Full Article
uri Measuring the Success of Fleet By www.achrnews.com Published On :: Sat, 01 Apr 2023 07:00:00 -0400 By tracking and monitoring service, productivity, and fuel metrics, HVACR fleet managers can better measure their fleet improvement efforts and quickly spot process and operational issues that need to be addressed. Full Article
uri How Contractors Can Market Services During Recycle Your Mercury Thermostat Day By www.achrnews.com Published On :: Sun, 18 Oct 2020 11:00:00 -0400 Here are a few ideas that contractor can use to prime the marketing pump for this holiday. Full Article
uri Security and the Smart Thermostat: Prepare for Customer Questions By www.achrnews.com Published On :: Mon, 03 May 2021 11:00:00 -0400 The path to temperature control through smart thermostat technology is more involved than many customers realize. Full Article
uri Xen Security Advisory 464 v2 (CVE-2024-45819) - libxl leaks data to PVH guests via ACPI tables By seclists.org Published On :: Tue, 12 Nov 2024 12:08:00 GMT Posted by Xen . org security team on Nov 12 Xen Security Advisory CVE-2024-45819 / XSA-464 version 2 libxl leaks data to PVH guests via ACPI tables UPDATES IN VERSION 2 ==================== Public release. ISSUE DESCRIPTION ================= PVH guests have their ACPI tables constructed by the toolstack. The construction involves building the tables in local memory, which are then copied into guest memory. While actually used... Full Article
uri Xen Security Advisory 463 v2 (CVE-2024-45818) - Deadlock in x86 HVM standard VGA handling By seclists.org Published On :: Tue, 12 Nov 2024 12:11:26 GMT Posted by Xen . org security team on Nov 12 Xen Security Advisory CVE-2024-45818 / XSA-463 version 2 Deadlock in x86 HVM standard VGA handling UPDATES IN VERSION 2 ==================== Public release. ISSUE DESCRIPTION ================= The hypervisor contains code to accelerate VGA memory accesses for HVM guests, when the (virtual) VGA is in "standard" mode. Locking involved there has an unusual discipline, leaving... Full Article
uri Re: Xen Security Advisory 464 v2 (CVE-2024-45819) - libxl leaks data to PVH guests via ACPI tables By seclists.org Published On :: Tue, 12 Nov 2024 17:24:43 GMT Posted by Andrew Cooper on Nov 12Data are leaked into the PVShim guest, but it is the shim Xen (exclusively) which has access to the ACPI tables. The guest which has been shim'd can't architecturally access the leaked data. ~Andrew Full Article
uri Re: 4 recent security bugs in GNOME's libsoup By seclists.org Published On :: Tue, 12 Nov 2024 17:52:14 GMT Posted by Alan Coopersmith on Nov 12It appears that Mitre issued CVE id's for the first 3 of these yesterday: https://www.cve.org/CVERecord?id=CVE-2024-52530 https://www.cve.org/CVERecord?id=CVE-2024-52531 https://www.cve.org/CVERecord?id=CVE-2024-52532 Full Article
uri Re: Xen Security Advisory 464 v2 (CVE-2024-45819) - libxl leaks data to PVH guests via ACPI tables By seclists.org Published On :: Tue, 12 Nov 2024 18:10:07 GMT Posted by Demi Marie Obenour on Nov 12Is this unconditional (perhaps because the relevant data gets zeroed out by the shim), or does it only apply when the PV guest can't extract data from the shim's memory? For instance, 32-bit PV guests aren't security supported anymore, but the PV shim isn't supposed to rely on the security of the shim itself, only of the rest of the system. Full Article
uri Venturing Into E-Commerce: What HVAC Contractors Should Think About By www.achrnews.com Published On :: Mon, 28 Oct 2024 07:00:00 -0400 Selling products online is a whole new ball game. So, contractors will want to learn about their consumers buying journeys, and thoughtfully consider how to launch the online store, what products to sell, and how to market it. Full Article
uri Building Automation Systems Offer Comfort, Efficiency, and Security By www.achrnews.com Published On :: Mon, 23 Aug 2021 07:00:00 -0400 HVAC has a critical role to play in the future of building automation and digitalization. Full Article
uri Preparing For Emerging Cybersecurity Attacks Against Chillers By www.achrnews.com Published On :: Mon, 11 Nov 2024 07:00:00 -0500 When it comes to this piece of critical infrastructure, operators need to be prepared to face new and sophisticated attacks. Full Article
uri CISA and NSA Release Enduring Security Framework Guidance on Identity and Access Management By seclists.org Published On :: Tue, 21 Mar 2023 19:16:23 GMT Posted by CISA on Mar 21Cybersecurity and Infrastructure Security Agency (CISA) - Defend Today, Secure Tomorrow You are subscribed to Cybersecurity Advisories for Cybersecurity and Infrastructure Security Agency. This information has recently been updated, and is now available. CISA and NSA Release Enduring Security Framework Guidance on Identity and Access Management [... Full Article
uri Apple Releases Security Updates for Multiple Products By seclists.org Published On :: Tue, 28 Mar 2023 17:12:59 GMT Posted by CISA on Mar 28Cybersecurity and Infrastructure Security Agency (CISA) - Defend Today, Secure Tomorrow You are subscribed to Cybersecurity Advisories for Cybersecurity and Infrastructure Security Agency. This information has recently been updated and is now available. Apple Releases Security Updates for Multiple Products [ https://www.cisa.gov/news-events/alerts/2023/03/28/apple-releases-security-updates-multiple-products ] 03/28/2023 01:00 PM EDT Apple... Full Article
uri Episode 66: Gary McGraw on Security By feedproxy.google.com Published On :: Fri, 24 Aug 2007 22:00:00 +0000 This episode features an interview with the software security expert Gary McGraw. Gary explains why this topic is so important and gives several security deficiencies examples that he found in the past. The second half of the interview is about his latest book 'Exploiting Online Games' where he explains how online games are hacked and why this is relevant to everybody, not only gamers in their 'First Life'. Full Article
uri Episode 128: Web App Security with Bruce Sams By feedproxy.google.com Published On :: Sat, 07 Mar 2009 16:44:45 +0000 The majority of hacker attacks (70 %) are directed at weaknesses that are the result of problems in the implementation and/or architecture of the application. This session shows how you can protect your web applications (J2EE or .NET) against these attacks. The session covers lots of practical examples and techniques for attack. Furthermore, it shows strategies for defense, including a "Secure Software Development Lifecycle". A "Live Hacking" demo rounds it out. This is a session recorded live at OOP 2009. SE Radio thanks Bruce, SIGS Datacom and the programme chair, Frances Paulisch, for their great support! Full Article
uri Episode 174: Chip Manufacturing and Waferscanners By www.se-radio.net Published On :: Fri, 08 Apr 2011 05:30:21 +0000 Guest: Wilbert Albers Host: Markus In this episode we take a look at microchip production, with a special focus on waferscanners. To do this, we talked with Wilbert Albers of ASML, the leading waferscanner manufacturer in the world. In the episode, we talk about the overall chip production process (from silicon sand over wafer cutting […] Full Article
uri SE-Radio Episode 290: Diogo Mónica on Docker Security By traffic.libsyn.com Published On :: Mon, 08 May 2017 20:39:40 +0000 Docker Security Team lead Diogo Mónica talks with SE Radio’s Kim Carter about Docker Security aspects. Simple Application Security, which hasn’t changed much over the past 15 years, is still considered the most effective way to improve security around Docker containers and infrastructure. The discussion explores characteristics such as Immutability, the copy-on-write filesystem, as well as orchestration principles that are baked into Docker Swarm, such as mutual TLS/PKI by default, secrets distribution, least privilege, content scanning, image signatures, and secure/trusted build pipelines. Diogo also shares his thoughts around the attack surface of the Linux kernel; networking, USB, and driver APIs; and the fact that application security remains more important to focus our attention on and get right. Full Article
uri SE-Radio Episode 302: Haroon Meer on Network Security By traffic.libsyn.com Published On :: Mon, 11 Sep 2017 22:54:22 +0000 Founder of Thinkst, Haroon Meer talks with Kim Carter about Network Security. Topics include how attackers are gaining footholds into our networks, moving laterally, and exfilling our precious data, as well as why we care and what software engineers can do about it. Full Article
uri SE-Radio-Episode-309-Zane-Lackey-on-Application-Security By traffic.libsyn.com Published On :: Mon, 13 Nov 2017 19:32:36 +0000 Founder of Signal Sciences Zane Lackey talks with Kim Carter about Application Security around what our top threats are today, culture, threat modelling, and visibility, and how we can improve our security stature as Software Engineers. Full Article
uri SE-Radio Episode 314: Scott Piper on Cloud Security By traffic.libsyn.com Published On :: Mon, 15 Jan 2018 22:09:30 +0000 Scott Piper and Kim Carter discuss Cloud Security. The Shared Responsibility Model, assets, risks, and countermeasures, evaluation techniques for comparing the security stature of CSPs. Scott discusses his FLAWS CTF engine. Covering tools Security Monkey and StreamAlert. Full Article
uri SE-Radio Episode 317: Travis Kimmel on Measuring Software Engineering Productivity By traffic.libsyn.com Published On :: Tue, 06 Feb 2018 18:50:49 +0000 Kishore Bhatia talks with Travis Kimmel about Engineering Impact: In the age of data-driven decision making, how does one go about measuring, communicating, and improving engineering productivity? We’ll learn from Travis’ experience building data analytics tools in this space, with insights and best practices for engineering teams and business stakeholders for measuring value and productivity. Full Article
uri SE-Radio 336: Sasa Juric on Elixir By traffic.libsyn.com Published On :: Tue, 28 Aug 2018 18:19:04 +0000 Saša Jurić, author of Elixir in Action, explains the Elixir programming language and how it unlocks the benefits of the Erlang ecosystem, revealing the “sweet spot” for Elixir programs: highly scalability and fault tolerant systems with a simple arc Full Article
uri SE-Radio Episode 359: Engineering Maturity with Jean-Denis Greze By traffic.libsyn.com Published On :: Wed, 06 Mar 2019 18:45:10 +0000 How can you scale an engineering organization when you havent already experienced rapid growth? Jean-Denis Greze of Plaid explains how to proactively enhance team capabilities and readiness by leveling up through a maturity map. Full Article
uri Episode 376: Justin Richer On API Security with OAuth 2 By se-radio.net Published On :: Tue, 13 Aug 2019 17:44:10 +0000 Justin Richer, lead author of the OAuth2 In Action book discusses the key technical features of the OAuth2 authorization protocol and the current best practices for selecting the right parts of it for your use case. Full Article
uri Episode 378: Joshua Davies on Attacking and Securing PKI By traffic.libsyn.com Published On :: Wed, 28 Aug 2019 17:06:16 +0000 Joshua Davies discusses TLS, PKI vulnerabilities in the PKI, and the evolution of the PKI to make it more secure, with host Robert Blumen. Full Article
uri Episode 383: Neil Madden On Securing Your API By traffic.libsyn.com Published On :: Thu, 10 Oct 2019 02:08:25 +0000 Neil Madden, author of the API Security in Action book discusses the key requirements needed to secure an API, the risks to consider, models to follow and which task is the most important. Full Article
uri SE-Radio Episode 390: Sam Procter on Security in Software Design By traffic.libsyn.com Published On :: Tue, 26 Nov 2019 21:45:32 +0000 Sam Procter of the SEI discusses architecture design languages, specifically Architecture Analysis and Design Language, and how we can leverage the formal modeling process to improve the security of our application design and improve applications overall. Full Article
uri Episode 395: Katharine Jarmul on Security and Privacy in Machine Learning By traffic.libsyn.com Published On :: Fri, 10 Jan 2020 19:21:58 +0000 Katharine Jarmul of DropoutLabs discusses security and privacy concerns as they relate to Machine Learning. Host Justin Beyer spoke with Jarmul about attack types and privacy-protected ML techniques. Full Article
uri Episode 404: Bert Hubert on DNS Security By traffic.libsyn.com Published On :: Thu, 26 Mar 2020 18:09:35 +0000 Bert Hubert, author of the open source PowerDNS nameserver discusses DNS security and all aspects of the Domain Name System with its flaws and history. Full Article
uri Episode 427: Sven Schleier and Jeroen Willemsen on Mobile Application Security By traffic.libsyn.com Published On :: Wed, 23 Sep 2020 22:26:21 +0000 Sven Schleier and Jeroen Willemsen from the OWASP Mobile Application Security Verification Standard and Testing Guide project discuss mobile application security and how the verification standard and testing guide can be used to improve your app’s... Full Article
uri Episode 453: Aaron Rinehart on Security Chaos Engineering By traffic.libsyn.com Published On :: Tue, 30 Mar 2021 23:05:53 +0000 Aaron Rinehard, CTO of Verica and author, discusses security chaos engineering (SCE) and how it can be used to enhance the security of modern application architectures. Full Article
uri Episode-467-Kim-Carter-on-Dynamic-Application-Security-Testing By traffic.libsyn.com Published On :: Wed, 07 Jul 2021 00:19:26 +0000 Kim Carter of BinaryMist discusses Dynamic Application Security Testing (DAST) and how the OWASP purpleteam project can improve early defect detection. Host Justin spoke with Carter about how DAST can provide meaningful feedback loops to developers... Full Article
uri Episode 523: Jessi Ashdown and Uri Gilad on Data Governance By se-radio.net Published On :: Wed, 03 Aug 2022 22:55:41 +0000 Jessi Ashdown and Uri Gilad, authors of the book "Data Governance: The Definitive Guide," discuss what data governance entails, why it's important, and how it can be implemented. Host Akshay Manchale speaks with them about why data governance... Full Article
uri Episode 541: Jordan Harband and Donald Fischer on Securing the Supply Chain By se-radio.net Published On :: Wed, 07 Dec 2022 23:02:09 +0000 Open source developers Jordan Harband and Donald Fischer join host Robert Blumen for a conversation about securing the software supply chain, especially open source. They start by reviewing supply chain security concepts, particularly as related to open.. Full Article
uri SE Radio 568: Simon Bennetts on OWASP Dynamic Application Security Testing Tool ZAP By se-radio.net Published On :: Wed, 14 Jun 2023 20:29:00 +0000 Simon Bennetts, a distinguished engineer at Jit, discusses one of the flagship projects of OWASP: the Zed Attack Proxy (ZAP) open source security testing tool. As ZAP’s primary maintainer, Simon traces the tool's origins and shares some anecdotes with SE Radio host Priyanka Raghavan on why there was a need for it. They take a deep dive into ZAP’s features and its ability to integrate with CI/CD, as well as shift security left. Bennetts also considers what it takes to build a successful open source project before spending time on ZAP’s ability to script to provide richer results. Finally, the conversation ends with some questions on ZAP’s future in this AI-powered world of bots. Full Article
uri SE Radio 575: Nir Valtman on Pipelineless Security By se-radio.net Published On :: Tue, 01 Aug 2023 23:43:00 +0000 Nir Valtman, co-Founder and CEO at Arnica, discusses pipelineless security with SE Radio host Priyanka Raghavan. They start by defining pipelines and then consider how to add security. Nir lays out the key challenges in getting good code coverage with the pipeline-based approach, and then describes how to implement a pipelineless approach and the advantages it offers. Priyanka quizzes him on the concept of "zero new hardcoded secrets," as well as some ways to protect GitHub repositories, and Nir shares examples of how a pipelineless approach could help in these scenarios. They then discuss false positives and handling developer fatigue in dealing with alerts. The show ends with some discussion around the product that Arnica offers and how it implements the pipelineless methodology. Full Article
uri SE Radio 584: Charles Weir on Ruthless Security for Busy Developers By se-radio.net Published On :: Thu, 05 Oct 2023 19:07:00 +0000 Charles Weir—developer, security researcher, and Research Fellow at Security Lancaster—joins host Giovanni Asproni to discuss an approach that development teams can use to create secure systems without wasting effort on unnecessary security work. The episode starts with a broad description of the approach, which is based on Weir's research and on a free Developer Security Essentials workshop he created. Charles presents some examples from real-world projects, his view on AI's impact on security, and information about the workshop and where to find the materials. During the conversation, they consider several related topics including the concept of "good enough" security; security as a product decision; risk assessment, classification, and prioritization; and how to approach security in startups, greenfield, and legacy systems. Full Article
uri SE Radio 613: Shahar Binyamin on GraphQL Security By se-radio.net Published On :: Mon, 06 May 2024 18:12:00 +0000 Shahar Binyamin, CEO and co-founder of Inigo, joins host Priyanka Raghavan to discuss GraphQL security. They begin with a look at the state of adoption of GraphQL and why it's so popular. From there, they consider why GraphQL security is important as they take a deep dive into a range of known security issues that have been exploited in GraphQL, including authentication, authorization, and denial of service attacks with references from the OWASP Top 10 API Security Risks. They discuss some mitigation strategies and methodologies for solving GraphQL security problems, and the show ends with discussion of Inigo and Shahar's top three recommendations for building safe GraphQL applications. Brought to you by IEEE Software and IEEE Computer Society. Full Article
uri SE Radio 640: Jonathan Horvath on Physical Security By se-radio.net Published On :: Wed, 30 Oct 2024 21:41:00 +0000 Jonathan Horvath of Z-bit discusses physical access control systems (PACS) with host Jeremy Jung. They start with an overview of PACS components and discuss the proprietary nature of the industry, the slow pace of migration to open standards, and why Windows is commonly used. Jonathan describes the security implications of moving from isolated networks to the cloud, as well as credential vulnerabilities, encryption using symmetric keys versus asymmetric keys, and the risks related to cloning credentials. They also consider several standards, including moving from Wiegand to the Open Supervised Device Protocol (OSDP), as well as the Public Key Open Credential (PKOC) standard, and the open source OSDP implementation that Jonathan authored. Brought to you by IEEE Computer Society and IEEE Software magazine. Full Article
uri Food Forests Aren’t Just Nourishing. They’re Cool. By www.yesmagazine.org Published On :: Fri, 08 Mar 2024 20:44:09 +0000 Trees and edible plants are being planted at churches, schools, street corners, and empty lots across the country to provide free shade and food to all. Full Article Sustainable food and farming Climate Environment tree planting food banks urban forestry Food Security urban heat islands climate solutions food forest shade urban green spaces food deserts
uri Misogyny Didn’t Need a Mic During the Trump–Harris Debate By www.yesmagazine.org Published On :: Thu, 12 Sep 2024 20:45:39 +0000 Despite muted microphones during the first debate between former President Donald Trump and Vice President Kamala Harris, each candidate's face spoke volumes. Full Article Clean elections Democracy Donald Trump Kamala Harris Misogyny 2024 Election Trump Harris Debate Presidential Debate
uri Nurturing Seeds of Freedom in Palestine By www.yesmagazine.org Published On :: Mon, 05 Aug 2024 18:38:09 +0000 Surrounded by a 26-foot-high separation wall, barbed wire, and a watchtower, a group of young Palestinians prepares a 3.5-acre piece of land for the growing season in spring. The noise Full Article Local power Sustainable food and farming Indigenous lands Environment Local economies Om Sleiman Farming Israel Palestine resistance West Bank agroecology
uri 15 Wish List Gifts for the Seasoned Foodie | OUR NOURISHING ROOTS By www.ournourishingroots.com Published On :: 2011-12-14T22:00:04-08:00 there are a few good ideas in here Full Article