owa

Interpreting recent Iowa election poll using a rough Bayesian partition of error

A political science colleague wrote in: We are all abuzz about the Harris +3 in that Iowa Poll with its great track record. When I check the write up of this poll I see a reasonably detailed description of their … Continue reading




owa

Humanity ‘Sleepwalking Towards the Edge of a Cliff’: 60% of Earth’s Wildlife Wiped Out Since 1970

By Julia Conley Common Dreams “Nature is not a ‘nice to have’—it is our life-support system.” Scientists from around the world issued a stark warning to humanity Tuesday in a semi-annual report on the Earth’s declining biodiversity, which shows that … Continue reading




owa

Guiding Companies Toward Pay Equity Compliance

Denise Visconti and Trish Martin discuss the steps company boards and senior management can take to support their organization’s pay equity efforts. 

Directors & Boards

View




owa

Employers Lean Toward Hybrid, In-Person Work Plans

Michelle Barrett Falconer and Devjani Mishra discuss the findings of Littler’s Executive Employer survey.

Law360

View (Subscription required.) 




owa

ETSI unveils its Report comparing worldwide COVID-19 contact-tracing systems – a first step toward interoperability

ETSI unveils its Report comparing worldwide COVID-19 contact-tracing systems – a first step toward interoperability

Sophia Antipolis, 2 February 2021

The COVID-19 pandemic has stretched the planet’s health systems to their limits and tested the measures adopted to alleviate difficulties. Contact tracking or tracing to identify infected people has been one such example. However, contact tracing based on interviews with identified or suspected patients presents known weaknesses from previous pandemics. Turning to digital means in a world where global mobility is the rule was therefore of the essence.

Read More...




owa

ETSI launches new White Paper titled Fibre Development Index: Driving Towards an F5G Gigabit Society

ETSI launches new White Paper titled Fibre Development Index: Driving Towards an F5G Gigabit Society

Sophia Antipolis, 19 August 2021

Fibre and fibre-based optical networks are the key technical enablers of our society's twin transitions (green and digital), providing sustainable and cost-effective communication with high bandwidth, stability, reliability, and improved latency. In addition, the fibre evolution enables sustainable economic growth through advanced services and applications for users, businesses, and industries.

The new ETSI White Paper explains the methodology used to define a fibre development index, provides migration path recommendations to countries with different fibre development, and highlights the importance of setting policies to underpin that twin (green and digital) transformation.

Read More...




owa

ETSI new White Paper on evolving NFV towards the next decade

Sophia Antipolis, 30 May 2023

ETSI is pleased to publish its new White Paper on “Evolving NFV towards the next decadewritten by delegates of the ETSI Industry Specification Group on Network Function Virtualization (ISG NFV).

Read More...




owa

Cybersecurity Snapshot: CISA Warns of Global Spear-Phishing Threat, While OWASP Releases AI Security Resources

CISA is warning about a spear-phishing campaign that spreads malicious RDP files. Plus, OWASP is offering guidance about deepfakes and AI security. Meanwhile, cybercriminals have amplified their use of malware for fake software-update attacks. And get the latest on CISA’s international plan, Interpol’s cyber crackdown and ransomware trends.

Dive into six things that are top of mind for the week ending Nov. 8.

1 - CISA: Beware of nasty spear-phishing campaign

Proactively restrict outbound remote-desktop protocol (RDP) connections. Block transmission of RDP files via email. Prevent RDP file execution.

Those are three security measures cyber teams should proactively take in response to an ongoing and “large scale” email spear-phishing campaign targeting victims with malicious RDP files, according to the U.S. Cybersecurity and Infrastructure Security Agency (CISA).

A foreign threat actor is carrying out the campaign. Several vertical sectors, including government and IT, are being targeted.

“Once access has been gained, the threat actor may pursue additional activity, such as deploying malicious code to achieve persistent access to the target’s network,” CISA’s alert reads.
 


Other CISA recommendations include:

  • Adopt phishing-resistant multi-factor authentication (MFA), such as FIDO tokens, and try to avoid SMS-based MFA
  • Educate users on how to spot suspicious emails
  • Hunt for malicious activity in your network looking for indicators of compromise (IoCs) and tactics, techniques and procedures

Although CISA didn’t name the hacker group responsible for this campaign, its alert includes links to related articles from Microsoft and AWS that identify it as Midnight Blizzard. Also known as APT29, this group is affiliated with Russia’s government.

To get more details, check out the CISA alert “Foreign Threat Actor Conducting Large-Scale Spear-Phishing Campaign with RDP Attachments.

For more information about securing RDP tools:

2 - OWASP issues AI security resources

How should your organization respond to deepfakes? What’s the right way of establishing a center of excellence for AI security in your organization? Where can you find a comprehensive guide of tools to secure generative AI applications?

These questions are addressed in a new set of resources for AI security from the Open Worldwide Application Security Project’s OWASP Top 10 for LLM Application Security Project

The new resources are meant to help organizations securely adopt, develop and deploy LLM and generative AI systems and applications “with a comprehensive strategy encompassing governance, collaboration and practical tools,” OWASP said in a statement.



These are the new resources:

  • The Guide for Preparing and Responding to Deepfake Events,” which unpacks four types of deepfake schemes – financial fraud, job interview fraud, social engineering and misinformation – and offers guidance about each one in these areas:
    • preparation
    • detection and analysis
    • containment eradication and recovery
    • post-incident activity
  • The LLM and GenAI Center of Excellence Guide,” which aims to help CISOs and fellow organization leaders create a center of excellence for generative AI security that facilitates collaboration among various teams, including security, legal, data science and operations, so they can develop:
    • Generative AI security policies
    • Risk assessment and management processes
    • Training and awareness
    • Research and development
  • The AI Security Solution Landscape Guide,” which offers security teams a comprehensive catalog of open source and commercial tools for securing LLMs and generative AI applications.

To get more details, read OWASP’s announcement “OWASP Dramatically Expands GenAI Security Guidance.”

For more information about protecting your organization against deepfakes:

3 - Fake update variants dominate list of top malware in Q3

Hackers are doubling down on fake software-update attacks.

That’s the main takeaway from the Center for Internet Security’s list of the 10 most prevalent malware used during the third quarter.

Malware variants used to carry out fake browser-update attacks took the top four spots on the list: SocGholish, LandUpdate808, ClearFake and ZPHP. Collectively, they accounted for 77% of the quarter’s malware infections. It's the first time LandUpdate808 and ClearFake appear on this quarterly list.


(Source: “Top 10 Malware Q3 2024”, Center for Internet Security, October 2024)

In a fake software-update attack, a victim gets duped into installing a legitimate-looking update for, say, their preferred browser, that instead infects their computers with malware.

Here’s the full list, in descending order:

  • SocGholish, a downloader distributed through malicious websites that tricks users into downloading it by offering fake software updates 
  • LandUpdate808, a JavaScript downloader distributed through malicious websites via fake browser updates
  • ClearFake, another JavaScript downloader used for fake browser-update attacks
  • ZPHP, another JavaScript downloader used for fake software-update attacks
  • Agent Tesla, a remote access trojan (RAT) that captures credentials, keystrokes and screenshots
  • CoinMiner, a cryptocurrency miner that spreads using Windows Management Instrumentation (WMI)
  • Arechclient2, also known as SectopRAT, is a .NET RAT whose capabilities include multiple stealth functions
  • Mirai, a malware botnet that compromises IoT devices to launch DDoS attacks
  • NanoCore, a RAT that spreads via malspam as a malicious Excel spreadsheet
  • Lumma Stealer, an infostealer used to swipe personally identifiable information (PII), credentials, cookies and banking information

To get more information, the CIS blog “Top 10 Malware Q3 2024” offers details, context and indicators of compromise for each malware strain.

For details on fake update attacks:


VIDEO

Fake Chrome Update Malware (The PC Security Channel)

4 - CISA’s first international plan unveiled

CISA has released its first-ever international plan, which outlines a strategy for boosting the agency’s collaboration with cybersecurity agencies from other countries.

Aligning cybersecurity efforts and goals with international partners is critical for tackling cyberthreats in the U.S. and abroad, according to the agency.

The three core pillars of CISA’s “2025 - 2026 International Strategic Plan” are:

  • Help make more resilient other countries’ assets, systems and networks that impact U.S. critical infrastructure
  • Boost the integrated cyber defenses of the U.S. and its international partners against their shared global cyberthreats
  • Unify the coordination of international activities to strengthen cyberdefenses collectively

The plan will allow CISA to “reduce risk to the globally interconnected and interdependent cyber and physical infrastructure that Americans rely on every day,” CISA Director Jen Easterly said in a statement.

5 - Interpol hits phishers, ransomware gangs, info stealers

Interpol and its partners took down 22,000 malicious IP addresses and seized thousands of servers, laptops, and mobile phones used by cybercriminals to conduct phishing scams, deploy ransomware and steal information.

The four-month global operation, titled Synergia II and announced this week, involved law enforcement agencies and private-sector partners from 95 countries and netted 41 arrests.


“Together, we’ve not only dismantled malicious infrastructure but also prevented hundreds of thousands of potential victims from falling prey to cybercrime,” Neal Jetton, Director of Interpol’s Cybercrime Directorate, said in a statement.

In Hong Kong, more than 1,000 servers were taken offline, while authorities in Macau, China took another 291 servers offline. Meanwhile, in Estonia, authorities seized 80GB of server data, which is now being analyzed for links to phishing and banking malware.

For more information about global cybercrime trends:

6 - IST: Ransomware attacks surged in 2023

Ransomware gangs went into hyperdrive last year, increasing their attacks by 73% compared with 2022, according to the non-profit think tank Institute for Security and Technology (IST).

The IST attributes the sharp increase in attacks to a shift by ransomware groups to “big game hunting” – going after prominent, large organizations with deep pockets. 

“Available evidence suggests that government and industry actions taken in 2023 were not enough to significantly reduce the profitability of the ransomware model,” reads an IST blog.

Global Ransomware Incidents in 2023

Another takeaway: The ransomware-as-a-service (RaaS) model continued to prove extremely profitable in 2023, and it injected dynamism into the ransomware ecosystem. 

The RaaS model prompted ransomware groups “to shift allegiances, form new groups, or iterate existing variants,” the IST blog reads.

The industry sector that ransomware groups hit the hardest was construction, followed by hospitals and healthcare, and by IT services and consulting. Financial services and law offices rounded out the top five.

To learn more about ransomware trends:




owa

Towards 2035: Common Prosperity and Urban-Rural Poverty Management System [in Chinese]

In 2021, General Secretary Xi Jinping solemnly declared that China's poverty alleviation battle has achieved a comprehensive victory. However, there is still a long way to go to solve the problem of unbalanced and insufficient development, narrow the development gap between urban and rural areas, and achieve comprehensive human development and common prosperity for all people.




owa

Shadow Woman A Novel Linda Howard.

NEW YORK TIMES BESTSELLER • From Linda Howard comes a thrilling and sensual new novel of romance, suspense, intrigue . . . and memories that can kill. Lizette Henry wakes up one morning and makes a terrifying discovery: She doesn't recognize the face she sees in the mirror. She remembers what she looks like, but her reflection is someone else's. To add to the shock, two years seem to have disappeared from her life. Someone has gone to great and inexplicable lengths to keep those missing years hidden forever. But the past always finds a way to return. Strange memories soon begin to surface and, along with them, some unusual skills and talents that Lizette hasn't a clue about acquiring. Sensing that she's being monitored, Lizette suddenly knows how to search for bugs in her house and tracking devices in her car. What's more, she can elude surveillance-like a trained agent. Enter a mysterious and seductive stranger named Xavier, who claims he wants to help-but who triggers disturbing images of an unspeakable crime of which Lizette may or may not be the perpetrator. With memories returning, she suddenly becomes a target of anonymous assassins. On the run with nowhere to hide, Lizette has no choice but to rely on Xavier, a strong and magnetic man she doesn't trust, with a powerful attraction she cannot resist. As murky waters become clear, Lizette confronts a conspiracy that is treacherous and far-reaching and a truth that, once revealed, may silence her and Xavier once and for all.




owa

World Food Prize Week in Des Moines, Iowa

I was delighted to spend the last week in Des Moines, Iowa, on the occasion of this year’s World Food Prize Week. To start the week, I had the pleasure of presenting the report, “How the United States Benefits from Agricultural and Food Security in Developing Countries,” together with the Board for International Food and […]




owa

Continuing collaboration with FAO toward the SDGs

I had the pleasure of meeting with FAO Director-General Qu Dongyu in Rome this week. On behalf of IFPRI, I had the chance to renew the Memorandum of Understanding with FAO to further strengthen collaboration and partnership toward our shared goal of achieving the Sustainable Development Goals (SDGs) by 2030. Building on successful IFPRI-FAO partnerships, […]




owa

OWASP Categories

Web application security is a key concern for any organization that develops or uses web applications. The software security community created the Open Web Application Security Project (OWASP) to help educate developers and security professionals on the latest web application security risks. Tenable has published reports for each OWASP version that has been released (2010,2013,2017, API 2019, and 2021). The individual reports provide organizations the ability to monitor web applications by identifying the top 10 most critical web application security risks as described in OWASP's Top 10 Application Security Risks document for the OWASP version being utilized.

The OWASP Top 10 Application Security Risks document outlines several different aspects of web-based security concerns, such as Cross-Site Scripting attacks (XSS), security misconfigurations, and sensitive data exposure. The focus of the OWASP Top 10 is to reduce risk across the most vulnerable business assets across the internet. Following these guidelines empowers organizations to reduce risk of organizational and consumer data theft.

Administrators need to ensure that their organization is not vulnerable to any of the attacks identified in the OWASP Top 10 Application Security Risks document for the relevant OWASP version being currently being used. Compliance related issues, such as known vulnerable components and insufficient logging, must be remediated to eliminate gaps in an organization's security that are not directly tied to exploitable attacks.

This report covers all aspects of the OWASP Top 10 version being utilized and provides administrators the tools and information needed to aid their efforts. The report contains 10 chapters, each aligned with one of the ten most critical web application risks (A1-A10). The information provides guidance to organizations on the actions necessary to mitigate business risk through strong security practices. The report requirements are Tenable Web App Scanning.

Report Templates:

The OWASP Top 10 categories are updated every 3 to 4 years and highlight the most critical web application security vulnerabilities. The following report templates are available and contain sections for each of the listed OWASP Top 10 categories.

  • OWASP Categories 2010 - For 2010, the OWASP Top 10 focuses on Injection, Cross-Site Scripting (XSS), and Broken Authentication in the top three positions.
  • OWASP Categories 2013 - For 2013, the OWASP Top 10 focuses on Injection, Broken Authentication and Session Management in the top three positions.
  • OWASP Categories 2017 - For 2017, the OWASP Top 10 focuses on Injection, Broken Authentication, and Sensitive Data Exposure in the top three positions.
  • OWASP Categories API 2019 - For 2019, the OWASP Top 10 focuses on Broken Object Level Authorization, Broken User Authentication, and Excessive Data Exposure in the top three positions.
  • OWASP Categories 2021 - For 2021, the OWASP Top 10 focuses on Broken Access Control, Cryptographic Failures, and Injection in the top three positions.




owa

OWASP Categories

Web application security is a key concern for any organization that develops or uses web applications. The software security community created the Open Web Application Security Project (OWASP)  to help educate developers and security professionals on the latest web application security risks. This dashboard provides organizations the ability to monitor web applications by identifying the top 10 most critical web application security risks as described in OWASP's Top 10 Application Security Risks document for 2021.

The OWASP Application Security Risks document outlines several different categories of web-based security concerns, such as Cross-Site Scripting attacks (XSS), security misconfigurations, and sensitive data exposure. OWASP's focus is to reduce risk across the most vulnerable business assets across the internet. Following these guidelines empowers organizations to reduce risk of organizational and consumer data theft.

Administrators need to ensure that their organization is not vulnerable to any of the attacks identified by OWASP. Remediating compliance related issues, such as known vulnerable components and insufficient logging, is important to eliminate gaps in an organization's infrastructure that are not directly tied to exploitable attacks.

These dashboards are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The dashboards can be easily located in the Tenable.sc Feed under the category Compliance & Configuration Assessment. The dashboard requirements are:

  • Tenable.sc 6.2.0
  • Tenable Web Application Scanning

This dashboard covers all versions of the OWASP Top 10 from 2010 to 2021, and provides administrators the tools and information needed to aid their efforts. The dashboard provides comparative view between version, using the cross-reference field utilized by plugins. The information will guide organizations on the actions to mitigate business risk through strong security practices. 

Components

WAS Data Concerns: This bar chart displays current (2021) OWASP vulnerability counts, sorted by plugin family and severity. According to OWASP, "the Top 10 represents a broad consensus about the most critical security risks to web applications." Identifying and fixing these issues provides organizations with a solid foundation for secure web development.

OWASP Categories by URL: This component displays vulnerability status counts for each Uniform Resource Locator (URL) within the organization. The URLs are sorted from those with the highest, most severe vulnerabilities to the least severe. Each URL has a graph of severity results for each severity category. 

OWASP Versions by State: This matrix displays the current and all previous OWASP versions along with a column displaying each state (New, Current, Resurfaced, Fixed). This information assists organizations in identifying OWASP vulnerabilities that are new, currently active, have previously been mitigated and have resurfaced, or have been fixed, for each OWASP version. 

OWASP Versions by Severity: This matrix displays the current and all previous OWASP Top 10 from Critical to Low. Each cell displays data on the count of web application vulnerabilities associated with the OWASP Top 10 release, and severity level. This information assists organizations in identifying the most severe OWASP vulnerabilities for the OWASP version in use. 




owa

Mrs. Dalloway and WWI: Home Front and War Front (November 13, 2024 9:00am)

Event Begins: Wednesday, November 13, 2024 9:00am
Location: Hatcher Graduate Library
Organized By: University Library


This exhibit explores the characters of Mrs. Dalloway through the lens of WWI and its aftershocks. It looks at those who fought in the trenches and those who watched from afar.

[The exhibit includes references to suicide and Post Traumatic Stress Disorder, which might be distressing for some visitors. Viewer discretion is advised.]

While all of the action in Virginia Woolf’s modernist masterpiece takes place on a single day, as preparations are made for Clarissa Dalloway’s evening party, Woolf’s stream of consciousness writing takes us in the characters’ minds all the way from English drawing rooms to colonial India to the trenches of World War I.

Check today's Hatcher Gallery Exhibit Room hours: https://myumi.ch/PkQ2x




owa

Metrics Matter: Assessing Progress towards Women’s Empowerment in Agriculture and Beyond

Metrics Matter: Assessing Progress towards Women’s Empowerment in Agriculture and Beyond

The Philippine Institute for Development Studies (PIDS), in partnership with the International Food Policy Research Institute (IFPRI), will hold a public seminar featuring three studies on women empowerment on August 14, 2024, 9:00 AM to 11:30 AM (Asia/Manila) / August 13, 2024, 9:00 PM to 11:30 PM (US/Eastern) at the PIDS Conference Hall and via Zoom. […]

The post Metrics Matter: Assessing Progress towards Women’s Empowerment in Agriculture and Beyond appeared first on IFPRI.




owa

Infants show racial bias toward members of own race and against those of other races - Racial bias begins earlier than previously thought, new insights into cause

Racial bias begins earlier than previously thought, new insights into causeToronto, ON – Two studies by researchers at the Ontario Institute for Studies in Education (OISE) at the University of Toronto and their collaborators from the US, UK, France and China, show that six- to nine-month-old infants demonstrate racial bias in favour of members of […]




owa

CT Scanning Steps Towards the Future

High-energy, large-format industrial CT scanning allows for feasible inspection of larger parts.




owa

Lennox Runs First “Feel the Love” HVAC Install in Iowa

Through the program, Lennox helps families in need by donating a state-of-the-art HVAC system, then having the equipment installed by a local Lennox dealer free of charge.




owa

Ohio Bill Could Direct School Funding Toward Air Conditioning

HB 738, introduced Oct. 4 by Rep. Niraj Antani (R-Miamisburg), requires the Ohio Facilities Construction Commission (OFCC) and the Department of Education (ODE) to study the status of school buildings regarding air conditioning, accessibility, and school safety.




owa

Rooftop Unit Manufacturers Work Toward 2023 DOE Efficiency Standards

For many manufacturers, higher efficiency systems have been in the works for a while, but the 2023 DOE standards, pandemic, and current supply chain issues have added pressure.




owa

Howard Community College Receives $50,000 Grant to Support Workforce Development and Skilled Trades

The grant will provide state-of-the-art technology and equipment for industrial training programs such as mechatronics, information technology and cybersecurity, HVAC, construction management, welding, and more.




owa

HVAC’s Smart Home Products Move Toward Mainstream Market

For residential HVAC contractors, smart homes are a fast-growing market that offers opportunity for profit.




owa

Episode 371: Howard Chu on the Lightning Memory Mapped Database (LMDB)

Howard Chu, CTO of Symas Corp and chief architect of the OpenLDAP Project, discusses the key technical features of the Lightning Memory-mapped Database (LMDB) that make it one of the fastest, most efficient and safest embedded data stores in the world.




owa

Episode 377: Heidi Howard on Distributed Consensus

Heidi Howard, a researcher in the field of distributed systems, discusses distributed consensus. Heidi explains when we need it, when we don't need and the algorithms we use to achieve it.




owa

Episode 391: Jeremy Howard on Deep Learning and fast.ai

Jeremy Howard from fast.ai explains deep learning from concept to implementation. Thanks to transfer learning, individuals and small organizations can get state-of-the-art results on machine learning problems using the open source fastai library...




owa

Episode 485: Howard Chu on B+tree Data Structure in Depth

Howard Chu, CTO of Symas Corp and chief architect of the OpenLDAP project, discusses the key features of B+Tree Data Structures which make it the default selection for efficient and predictable storage of sorted data.




owa

Episode 514: Vandana Verma on the Owasp Top 10

Vandana Verma, Security Leader at Snyk and vice-chairperson of the OWASP Global Board of directors, discusses the "OWASP top 10" with host Priyanka Raghavan. The discussion explores various subtopics such as the history behind OWASP, the OWASP top 10 security risks, example of common vulnerabilities and ends with information on top projects in OWASP and how can contribute to it.




owa

SE Radio 568: Simon Bennetts on OWASP Dynamic Application Security Testing Tool ZAP

Simon Bennetts, a distinguished engineer at Jit, discusses one of the flagship projects of OWASP: the Zed Attack Proxy (ZAP) open source security testing tool. As ZAP’s primary maintainer, Simon traces the tool's origins and shares some anecdotes with SE Radio host Priyanka Raghavan on why there was a need for it. They take a deep dive into ZAP’s features and its ability to integrate with CI/CD, as well as shift security left. Bennetts also considers what it takes to build a successful open source project before spending time on ZAP’s ability to script to provide richer results. Finally, the conversation ends with some questions on ZAP’s future in this AI-powered world of bots.




owa

Which types of power generating plants are worth planning and constructing nowadays?

Power generating plants are always a capital investment in all countries across the world. Not many countries are building new generating plants nowadays. As we all feel, a worldwide energy crisis of unparalleled severity and complexity is currently underway. The... Read more

The post Which types of power generating plants are worth planning and constructing nowadays? appeared first on EEP - Electrical Engineering Portal.




owa

Iowa State University puts the meat in PROCESS EXPO

The Food Processing Suppliers Association (FPSA) today announced the details of two important topics for the educational program at PROCESS EXPO 2015.




owa

Kraft Developing and Testing Its First Recyclable Fiber-Based Microwavable Cup

Kraft Mac & Cheese has announced it is developing and testing the brand’s first-ever recyclable fiber-based microwavable cup. Upon testing completion, the brand will launch a new Kraft Mac & Cheese Shapes variety using the new cup and design later in 2021.




owa

Attitudes Toward Automation

Automation plays a huge and ever-growing role in the packaging industry. No surprise, then, that the July issue of Packaging Strategies featured a story on automation and controls (From Smart Valves to Smart Factories).




owa

GBPUSD stretches toward 61.8% retracement

The USD is moving higher.

  • The EURUSD is against the 2024 low at 1.0600.
  • The USDJPY is trading to new highs and has entered into a swing area between 154.54 in 155.09. The high price last week reached 154.704 and is the next upside target.

For the GBPUSD it is trading to new lows and moving away from it's broken 200 day moving average at 1.28178 broken earlier today. A new low is being made as I type at 1.27347.

That low is just above the 61.8% retracement of the move up from the April 2024 low at 1.27322. Break below that retracement level and traders will be looking toward a swing area between 1.2665 and 1.2685 as seller add to their run to the downside.

If buyers lean against the retracement level and move higher, getting back above 1.2777 is needed for the buyers to have some comfort for more upside probing. Absent that and the sellers are more in control.

Ultimately, a move back above the 200-day moving average at 1.28178 is needed to scare the sellers into buying.

Sellers are pushing, but the 61.8% retracement is now in the way and being tested. Will profit takers enter here against the risk defining level or will the sellers make another push to the downside?

This article was written by Greg Michalowski at www.forexlive.com.




owa

Futurist and Renowned Author Rishad Tobaccowala to Keynote Radio Show Session on Transformation




owa

A More Democratic Future for Filmmaking: NAB Show Panel Explores Shift Towards Audience-Driven Content

Washington, D.C.— The future of the film industry is more democratic. That’s the idea behind a Main Stage panel discussion at the 2024 NAB Show in Las Vegas. The team behind “Holy Smokes,” the winner of the Decentralized Pictures Kevin Smith Comedy Short Film Screenplay Award, will dive into the challenges aspiring filmmakers face and explore the groundbreaking shift towards audience-driven filmmaking. The panel features Decentralized Pictures (DCP) Co-founder Roman Coppola (“Moonrise Kingdom,” “The French Dispatch,” and “Darjeeling Limited”), and Actor Mena Suvari (“American Beauty,” “American Pie,” HBO’s “Six Feet Under”), followed by a screening of “Holy Smokes.”




owa

LG NeoChef 23L Smart Inverter Microwave Oven $130 Delivered @ Amazon AU

Dropping faster than your 5G. Down to its ATL, possibly most popular but equally most hated compact OzB microwave.

Get onto it whilst your food is hot and your wifi is not.




owa

UN COP29 climate summit ups ‘climate finance’ target from 2009’s goal of $100 billion a year to ‘a more ambitious goal’ of ‘$1.8 trillion by 2030’ – Seeks ‘a just transition towards sustainability’

Last week, UN Trade and Development (UNCTAD) published its report on the quantitative and qualitative elements of the NCQG. It conveys a strong message that global climate finance needs a boost in both quantity and quality to address developing economies’ needs for a just transition towards sustainability and resilience. 

“Ultimately, the goal of the NCQG (New Collective Quantified Goal) on climate finance must be to transform the climate finance landscape and herald a new era of mutual trust, cooperation and climate action,” the UN Trade and Development (UNCTAD) report urges. 




owa

Rollins Museum of Art takes 2 steps toward reality in Winter Park

The new Rollins Museum of Art building planned for Winter Park received a $750,000 national grant and approval of the building's design.




owa

Mobility management in ITU-T: Its current development and next steps heading towards future networks

Mobility management in ITU-T: Its current development and next steps heading towards future networks




owa

NET2030-DF - Driving forces and vision towards Network 2030

NET2030-DF - Driving forces and vision towards Network 2030




owa

Case Study - Towards a Circular Economy with the Implementation of ITU International Standards in Costa Rica

Case Study - Towards a Circular Economy with the Implementation of ITU International Standards in Costa Rica






owa

2023 Speech Industry Award Winner: Speechmatics Inches Closer Toward a Universal Translator

Speechmatics, a provider of automatic speech recognition software based on recurrent neural networks and statistical language modeling, is on a mission to make its speech-to-text technology usable by 70 percent of the world's population in the next three years.




owa

Innovating IT infrastructure at CBP: A conversation with Sonny Bhagowalia

What is the IT strategy for the U.S. Customs and Border Protection (CBP)? How is CBP working to modernize its IT infrastructure? How is it using technology and innovation to change the way it does business? Join host Michael Keegan as he explores these questions and more with Sonny Bhagowalia, Assistant Commissioner & Chief Information Officer, U.S. Customs and Border Protection.

The post Innovating IT infrastructure at CBP: A conversation with Sonny Bhagowalia first appeared on Federal News Network.




owa

CargoAi accelerates on CargoWALLET with the appointment of Fintech veteran Olivier Veyrac

CargoAi has appointed global payment expert, Olivier Veyrac as its Senior Vice President for CargoWALLET. Over the past 18 months, CargoWALLET has been adopted by 5,000+ Airlines, Freight Forwarders, GHAs and logistic service providers.




owa

Precision Pollination project is a step towards better food security

A new project aimed at exploring the role drone technology can play in improving yield, fruit quality and forecasting in UK strawberry production is a pivotal step towards enhancing food security.




owa

NIS2 Article 28 Guidance: A Positive Step Toward Reducing DNS Abuse Across Europe

The European Union (EU) has set a high bar by tackling domain name system (DNS) abuse head on via government regulation and seems to have successfully resisted attempts to water down DNS stewardship obligations. Recent guidance from a key European Commission cooperation group (the NIS Cooperation Group) handling sections of the Network and Information Security Directive (NIS2) intends for a robust implementation of Article 28, which will go a long way toward helping to mitigate some of the longstanding problems that persist in the DNS.




owa

Iowa Tornado's Path of Destruction as Seen From Space

Thanks to clashing air masses and a jet stream sweeping storms along between them, this spring has brought a rash of destructive tornadoes.