owa Interpreting recent Iowa election poll using a rough Bayesian partition of error By statmodeling.stat.columbia.edu Published On :: Mon, 04 Nov 2024 01:25:52 +0000 A political science colleague wrote in: We are all abuzz about the Harris +3 in that Iowa Poll with its great track record. When I check the write up of this poll I see a reasonably detailed description of their … Continue reading → Full Article Bayesian Statistics Political Science
owa Humanity ‘Sleepwalking Towards the Edge of a Cliff’: 60% of Earth’s Wildlife Wiped Out Since 1970 By www.ecology.com Published On :: Tue, 30 Oct 2018 20:36:31 +0000 By Julia Conley Common Dreams “Nature is not a ‘nice to have’—it is our life-support system.” Scientists from around the world issued a stark warning to humanity Tuesday in a semi-annual report on the Earth’s declining biodiversity, which shows that … Continue reading → Full Article Biodiversity ET News biodiversity extinction mass extinction wildlife
owa Guiding Companies Toward Pay Equity Compliance By www.littler.com Published On :: Thu, 07 Mar 2024 19:02:04 +0000 Denise Visconti and Trish Martin discuss the steps company boards and senior management can take to support their organization’s pay equity efforts. Directors & Boards View Full Article
owa Employers Lean Toward Hybrid, In-Person Work Plans By www.littler.com Published On :: Thu, 20 May 2021 18:38:15 +0000 Michelle Barrett Falconer and Devjani Mishra discuss the findings of Littler’s Executive Employer survey. Law360 View (Subscription required.) Full Article
owa ETSI unveils its Report comparing worldwide COVID-19 contact-tracing systems – a first step toward interoperability By www.etsi.org Published On :: Tue, 28 Sep 2021 14:29:46 GMT ETSI unveils its Report comparing worldwide COVID-19 contact-tracing systems – a first step toward interoperability Sophia Antipolis, 2 February 2021 The COVID-19 pandemic has stretched the planet’s health systems to their limits and tested the measures adopted to alleviate difficulties. Contact tracking or tracing to identify infected people has been one such example. However, contact tracing based on interviews with identified or suspected patients presents known weaknesses from previous pandemics. Turning to digital means in a world where global mobility is the rule was therefore of the essence. Read More... Full Article
owa ETSI launches new White Paper titled Fibre Development Index: Driving Towards an F5G Gigabit Society By www.etsi.org Published On :: Wed, 22 Sep 2021 12:57:10 GMT ETSI launches new White Paper titled Fibre Development Index: Driving Towards an F5G Gigabit Society Sophia Antipolis, 19 August 2021 Fibre and fibre-based optical networks are the key technical enablers of our society's twin transitions (green and digital), providing sustainable and cost-effective communication with high bandwidth, stability, reliability, and improved latency. In addition, the fibre evolution enables sustainable economic growth through advanced services and applications for users, businesses, and industries. The new ETSI White Paper explains the methodology used to define a fibre development index, provides migration path recommendations to countries with different fibre development, and highlights the importance of setting policies to underpin that twin (green and digital) transformation. Read More... Full Article
owa ETSI new White Paper on evolving NFV towards the next decade By www.etsi.org Published On :: Wed, 31 May 2023 12:40:15 GMT Sophia Antipolis, 30 May 2023 ETSI is pleased to publish its new White Paper on “Evolving NFV towards the next decade” written by delegates of the ETSI Industry Specification Group on Network Function Virtualization (ISG NFV). Read More... Full Article
owa Cybersecurity Snapshot: CISA Warns of Global Spear-Phishing Threat, While OWASP Releases AI Security Resources By www.tenable.com Published On :: Fri, 08 Nov 2024 09:00:00 -0500 CISA is warning about a spear-phishing campaign that spreads malicious RDP files. Plus, OWASP is offering guidance about deepfakes and AI security. Meanwhile, cybercriminals have amplified their use of malware for fake software-update attacks. And get the latest on CISA’s international plan, Interpol’s cyber crackdown and ransomware trends.Dive into six things that are top of mind for the week ending Nov. 8.1 - CISA: Beware of nasty spear-phishing campaignProactively restrict outbound remote-desktop protocol (RDP) connections. Block transmission of RDP files via email. Prevent RDP file execution.Those are three security measures cyber teams should proactively take in response to an ongoing and “large scale” email spear-phishing campaign targeting victims with malicious RDP files, according to the U.S. Cybersecurity and Infrastructure Security Agency (CISA).A foreign threat actor is carrying out the campaign. Several vertical sectors, including government and IT, are being targeted.“Once access has been gained, the threat actor may pursue additional activity, such as deploying malicious code to achieve persistent access to the target’s network,” CISA’s alert reads. Other CISA recommendations include:Adopt phishing-resistant multi-factor authentication (MFA), such as FIDO tokens, and try to avoid SMS-based MFAEducate users on how to spot suspicious emailsHunt for malicious activity in your network looking for indicators of compromise (IoCs) and tactics, techniques and proceduresAlthough CISA didn’t name the hacker group responsible for this campaign, its alert includes links to related articles from Microsoft and AWS that identify it as Midnight Blizzard. Also known as APT29, this group is affiliated with Russia’s government.To get more details, check out the CISA alert “Foreign Threat Actor Conducting Large-Scale Spear-Phishing Campaign with RDP Attachments.”For more information about securing RDP tools:“Commonly Exploited Protocols: Remote Desktop Protocol (RDP)” (Center for Internet Security)“What is remote desktop protocol (RDP)?” (TechTarget)“Wondering Whether RDP IS Secure? Here's a Guide to Remote Desktop Protocol” (AllBusiness)“Why remote desktop tools are facing an onslaught of cyber threats” (ITPro)“'Midnight Blizzard' Targets Networks With Signed RDP Files” (Dark Reading)2 - OWASP issues AI security resourcesHow should your organization respond to deepfakes? What’s the right way of establishing a center of excellence for AI security in your organization? Where can you find a comprehensive guide of tools to secure generative AI applications?These questions are addressed in a new set of resources for AI security from the Open Worldwide Application Security Project’s OWASP Top 10 for LLM Application Security Project. The new resources are meant to help organizations securely adopt, develop and deploy LLM and generative AI systems and applications “with a comprehensive strategy encompassing governance, collaboration and practical tools,” OWASP said in a statement.These are the new resources:“The Guide for Preparing and Responding to Deepfake Events,” which unpacks four types of deepfake schemes – financial fraud, job interview fraud, social engineering and misinformation – and offers guidance about each one in these areas:preparationdetection and analysiscontainment eradication and recoverypost-incident activity“The LLM and GenAI Center of Excellence Guide,” which aims to help CISOs and fellow organization leaders create a center of excellence for generative AI security that facilitates collaboration among various teams, including security, legal, data science and operations, so they can develop:Generative AI security policiesRisk assessment and management processesTraining and awarenessResearch and development“The AI Security Solution Landscape Guide,” which offers security teams a comprehensive catalog of open source and commercial tools for securing LLMs and generative AI applications.To get more details, read OWASP’s announcement “OWASP Dramatically Expands GenAI Security Guidance.”For more information about protecting your organization against deepfakes:“How to prevent deepfakes in the era of generative AI” (TechTarget)“Deepfake scams escalate, hitting more than half of businesses” (Cybersecurity Dive)“The AI Threat: Deepfake or Deep Fake? Unraveling the True Security Risks” (SecurityWeek)“How deepfakes threaten biometric security controls” (TechTarget)“Deepfakes break through as business threat” (CSO)3 - Fake update variants dominate list of top malware in Q3Hackers are doubling down on fake software-update attacks.That’s the main takeaway from the Center for Internet Security’s list of the 10 most prevalent malware used during the third quarter.Malware variants used to carry out fake browser-update attacks took the top four spots on the list: SocGholish, LandUpdate808, ClearFake and ZPHP. Collectively, they accounted for 77% of the quarter’s malware infections. It's the first time LandUpdate808 and ClearFake appear on this quarterly list.(Source: “Top 10 Malware Q3 2024”, Center for Internet Security, October 2024)In a fake software-update attack, a victim gets duped into installing a legitimate-looking update for, say, their preferred browser, that instead infects their computers with malware.Here’s the full list, in descending order:SocGholish, a downloader distributed through malicious websites that tricks users into downloading it by offering fake software updates LandUpdate808, a JavaScript downloader distributed through malicious websites via fake browser updatesClearFake, another JavaScript downloader used for fake browser-update attacksZPHP, another JavaScript downloader used for fake software-update attacksAgent Tesla, a remote access trojan (RAT) that captures credentials, keystrokes and screenshotsCoinMiner, a cryptocurrency miner that spreads using Windows Management Instrumentation (WMI)Arechclient2, also known as SectopRAT, is a .NET RAT whose capabilities include multiple stealth functionsMirai, a malware botnet that compromises IoT devices to launch DDoS attacksNanoCore, a RAT that spreads via malspam as a malicious Excel spreadsheetLumma Stealer, an infostealer used to swipe personally identifiable information (PII), credentials, cookies and banking informationTo get more information, the CIS blog “Top 10 Malware Q3 2024” offers details, context and indicators of compromise for each malware strain.For details on fake update attacks:“Fake browser updates spread updated WarmCookie malware” (BleepingComputer)“Beware: Fake Browser Updates Deliver BitRAT and Lumma Stealer Malware” (The Hacker News)“Hackers Use Fake Browser Updates for AMOS Malware Attacks Targeting Mac Users” (MSSP Alert)“Malware crooks find an in with fake browser updates, in case real ones weren't bad enough” (The Register)“Fake Google Chrome errors trick you into running malicious PowerShell scripts” (BleepingComputer)VIDEOFake Chrome Update Malware (The PC Security Channel)4 - CISA’s first international plan unveiledCISA has released its first-ever international plan, which outlines a strategy for boosting the agency’s collaboration with cybersecurity agencies from other countries.Aligning cybersecurity efforts and goals with international partners is critical for tackling cyberthreats in the U.S. and abroad, according to the agency.The three core pillars of CISA’s “2025 - 2026 International Strategic Plan” are:Help make more resilient other countries’ assets, systems and networks that impact U.S. critical infrastructureBoost the integrated cyber defenses of the U.S. and its international partners against their shared global cyberthreatsUnify the coordination of international activities to strengthen cyberdefenses collectivelyThe plan will allow CISA to “reduce risk to the globally interconnected and interdependent cyber and physical infrastructure that Americans rely on every day,” CISA Director Jen Easterly said in a statement.5 - Interpol hits phishers, ransomware gangs, info stealersInterpol and its partners took down 22,000 malicious IP addresses and seized thousands of servers, laptops, and mobile phones used by cybercriminals to conduct phishing scams, deploy ransomware and steal information.The four-month global operation, titled Synergia II and announced this week, involved law enforcement agencies and private-sector partners from 95 countries and netted 41 arrests.“Together, we’ve not only dismantled malicious infrastructure but also prevented hundreds of thousands of potential victims from falling prey to cybercrime,” Neal Jetton, Director of Interpol’s Cybercrime Directorate, said in a statement.In Hong Kong, more than 1,000 servers were taken offline, while authorities in Macau, China took another 291 servers offline. Meanwhile, in Estonia, authorities seized 80GB of server data, which is now being analyzed for links to phishing and banking malware.For more information about global cybercrime trends:“AI-Powered Cybercrime Cartels on the Rise in Asia” (Dark Reading)“AI Now a Staple in Phishing Kits Sold to Hackers” (MSSP Alert)“The Business of Cybercrime Explodes” (BankDirector)“Nation state actors increasingly hide behind cybercriminal tactics and malware” (CSO)6 - IST: Ransomware attacks surged in 2023Ransomware gangs went into hyperdrive last year, increasing their attacks by 73% compared with 2022, according to the non-profit think tank Institute for Security and Technology (IST).The IST attributes the sharp increase in attacks to a shift by ransomware groups to “big game hunting” – going after prominent, large organizations with deep pockets. “Available evidence suggests that government and industry actions taken in 2023 were not enough to significantly reduce the profitability of the ransomware model,” reads an IST blog.Global Ransomware Incidents in 2023Another takeaway: The ransomware-as-a-service (RaaS) model continued to prove extremely profitable in 2023, and it injected dynamism into the ransomware ecosystem. The RaaS model prompted ransomware groups “to shift allegiances, form new groups, or iterate existing variants,” the IST blog reads.The industry sector that ransomware groups hit the hardest was construction, followed by hospitals and healthcare, and by IT services and consulting. Financial services and law offices rounded out the top five.To learn more about ransomware trends:“Ransomware Is ‘More Brutal’ Than Ever in 2024” (Wired)“Ransomware on track for record profits, even as fewer victims pay” (SC Magazine)“How Can I Protect Against Ransomware?” (CISA)“How to prevent ransomware in 6 steps” (TechTarget)“Steps to Help Prevent & Limit the Impact of Ransomware” (Center for Internet Security) Full Article
owa Towards 2035: Common Prosperity and Urban-Rural Poverty Management System [in Chinese] By www.ifpri.org Published On :: Sat, 10 Dec 2022 5:05:01 EST In 2021, General Secretary Xi Jinping solemnly declared that China's poverty alleviation battle has achieved a comprehensive victory. However, there is still a long way to go to solve the problem of unbalanced and insufficient development, narrow the development gap between urban and rural areas, and achieve comprehensive human development and common prosperity for all people. Full Article
owa Shadow Woman A Novel Linda Howard. By library.gcpl.lib.oh.us Published On :: NEW YORK TIMES BESTSELLER • From Linda Howard comes a thrilling and sensual new novel of romance, suspense, intrigue . . . and memories that can kill. Lizette Henry wakes up one morning and makes a terrifying discovery: She doesn't recognize the face she sees in the mirror. She remembers what she looks like, but her reflection is someone else's. To add to the shock, two years seem to have disappeared from her life. Someone has gone to great and inexplicable lengths to keep those missing years hidden forever. But the past always finds a way to return. Strange memories soon begin to surface and, along with them, some unusual skills and talents that Lizette hasn't a clue about acquiring. Sensing that she's being monitored, Lizette suddenly knows how to search for bugs in her house and tracking devices in her car. What's more, she can elude surveillance-like a trained agent. Enter a mysterious and seductive stranger named Xavier, who claims he wants to help-but who triggers disturbing images of an unspeakable crime of which Lizette may or may not be the perpetrator. With memories returning, she suddenly becomes a target of anonymous assassins. On the run with nowhere to hide, Lizette has no choice but to rely on Xavier, a strong and magnetic man she doesn't trust, with a powerful attraction she cannot resist. As murky waters become clear, Lizette confronts a conspiracy that is treacherous and far-reaching and a truth that, once revealed, may silence her and Xavier once and for all. Full Article
owa World Food Prize Week in Des Moines, Iowa By dgcorner.ifpri.info Published On :: Wed, 23 Oct 2019 14:07:28 +0000 I was delighted to spend the last week in Des Moines, Iowa, on the occasion of this year’s World Food Prize Week. To start the week, I had the pleasure of presenting the report, “How the United States Benefits from Agricultural and Food Security in Developing Countries,” together with the Board for International Food and […] Full Article DG Corner Homepage Feature Events Posts energy food security nutrition research trade World Food Prize
owa Continuing collaboration with FAO toward the SDGs By dgcorner.ifpri.info Published On :: Tue, 10 Dec 2019 19:36:54 +0000 I had the pleasure of meeting with FAO Director-General Qu Dongyu in Rome this week. On behalf of IFPRI, I had the chance to renew the Memorandum of Understanding with FAO to further strengthen collaboration and partnership toward our shared goal of achieving the Sustainable Development Goals (SDGs) by 2030. Building on successful IFPRI-FAO partnerships, […] Full Article DG Corner Homepage Feature Events News Posts collaboration data FAO food systems nutrition partnership policy research SDGs
owa OWASP Categories By www.tenable.com Published On :: Wed, 23 Aug 2023 12:14:01 -0400 Web application security is a key concern for any organization that develops or uses web applications. The software security community created the Open Web Application Security Project (OWASP) to help educate developers and security professionals on the latest web application security risks. Tenable has published reports for each OWASP version that has been released (2010,2013,2017, API 2019, and 2021). The individual reports provide organizations the ability to monitor web applications by identifying the top 10 most critical web application security risks as described in OWASP's Top 10 Application Security Risks document for the OWASP version being utilized. The OWASP Top 10 Application Security Risks document outlines several different aspects of web-based security concerns, such as Cross-Site Scripting attacks (XSS), security misconfigurations, and sensitive data exposure. The focus of the OWASP Top 10 is to reduce risk across the most vulnerable business assets across the internet. Following these guidelines empowers organizations to reduce risk of organizational and consumer data theft. Administrators need to ensure that their organization is not vulnerable to any of the attacks identified in the OWASP Top 10 Application Security Risks document for the relevant OWASP version being currently being used. Compliance related issues, such as known vulnerable components and insufficient logging, must be remediated to eliminate gaps in an organization's security that are not directly tied to exploitable attacks. This report covers all aspects of the OWASP Top 10 version being utilized and provides administrators the tools and information needed to aid their efforts. The report contains 10 chapters, each aligned with one of the ten most critical web application risks (A1-A10). The information provides guidance to organizations on the actions necessary to mitigate business risk through strong security practices. The report requirements are Tenable Web App Scanning. Report Templates: The OWASP Top 10 categories are updated every 3 to 4 years and highlight the most critical web application security vulnerabilities. The following report templates are available and contain sections for each of the listed OWASP Top 10 categories. OWASP Categories 2010 - For 2010, the OWASP Top 10 focuses on Injection, Cross-Site Scripting (XSS), and Broken Authentication in the top three positions. OWASP Categories 2013 - For 2013, the OWASP Top 10 focuses on Injection, Broken Authentication and Session Management in the top three positions. OWASP Categories 2017 - For 2017, the OWASP Top 10 focuses on Injection, Broken Authentication, and Sensitive Data Exposure in the top three positions. OWASP Categories API 2019 - For 2019, the OWASP Top 10 focuses on Broken Object Level Authorization, Broken User Authentication, and Excessive Data Exposure in the top three positions. OWASP Categories 2021 - For 2021, the OWASP Top 10 focuses on Broken Access Control, Cryptographic Failures, and Injection in the top three positions. Full Article
owa OWASP Categories By www.tenable.com Published On :: Tue, 22 Aug 2023 11:24:59 -0400 Web application security is a key concern for any organization that develops or uses web applications. The software security community created the Open Web Application Security Project (OWASP) to help educate developers and security professionals on the latest web application security risks. This dashboard provides organizations the ability to monitor web applications by identifying the top 10 most critical web application security risks as described in OWASP's Top 10 Application Security Risks document for 2021. The OWASP Application Security Risks document outlines several different categories of web-based security concerns, such as Cross-Site Scripting attacks (XSS), security misconfigurations, and sensitive data exposure. OWASP's focus is to reduce risk across the most vulnerable business assets across the internet. Following these guidelines empowers organizations to reduce risk of organizational and consumer data theft. Administrators need to ensure that their organization is not vulnerable to any of the attacks identified by OWASP. Remediating compliance related issues, such as known vulnerable components and insufficient logging, is important to eliminate gaps in an organization's infrastructure that are not directly tied to exploitable attacks. These dashboards are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The dashboards can be easily located in the Tenable.sc Feed under the category Compliance & Configuration Assessment. The dashboard requirements are: Tenable.sc 6.2.0 Tenable Web Application Scanning This dashboard covers all versions of the OWASP Top 10 from 2010 to 2021, and provides administrators the tools and information needed to aid their efforts. The dashboard provides comparative view between version, using the cross-reference field utilized by plugins. The information will guide organizations on the actions to mitigate business risk through strong security practices. Components WAS Data Concerns: This bar chart displays current (2021) OWASP vulnerability counts, sorted by plugin family and severity. According to OWASP, "the Top 10 represents a broad consensus about the most critical security risks to web applications." Identifying and fixing these issues provides organizations with a solid foundation for secure web development. OWASP Categories by URL: This component displays vulnerability status counts for each Uniform Resource Locator (URL) within the organization. The URLs are sorted from those with the highest, most severe vulnerabilities to the least severe. Each URL has a graph of severity results for each severity category. OWASP Versions by State: This matrix displays the current and all previous OWASP versions along with a column displaying each state (New, Current, Resurfaced, Fixed). This information assists organizations in identifying OWASP vulnerabilities that are new, currently active, have previously been mitigated and have resurfaced, or have been fixed, for each OWASP version. OWASP Versions by Severity: This matrix displays the current and all previous OWASP Top 10 from Critical to Low. Each cell displays data on the count of web application vulnerabilities associated with the OWASP Top 10 release, and severity level. This information assists organizations in identifying the most severe OWASP vulnerabilities for the OWASP version in use. Full Article
owa Mrs. Dalloway and WWI: Home Front and War Front (November 13, 2024 9:00am) By events.umich.edu Published On :: Fri, 30 Aug 2024 11:24:55 -0400 Event Begins: Wednesday, November 13, 2024 9:00am Location: Hatcher Graduate Library Organized By: University Library This exhibit explores the characters of Mrs. Dalloway through the lens of WWI and its aftershocks. It looks at those who fought in the trenches and those who watched from afar. [The exhibit includes references to suicide and Post Traumatic Stress Disorder, which might be distressing for some visitors. Viewer discretion is advised.] While all of the action in Virginia Woolf’s modernist masterpiece takes place on a single day, as preparations are made for Clarissa Dalloway’s evening party, Woolf’s stream of consciousness writing takes us in the characters’ minds all the way from English drawing rooms to colonial India to the trenches of World War I. Check today's Hatcher Gallery Exhibit Room hours: https://myumi.ch/PkQ2x Full Article Exhibition
owa Metrics Matter: Assessing Progress towards Women’s Empowerment in Agriculture and Beyond By www.ifpri.org Published On :: Thu, 08 Aug 2024 16:33:42 +0000 Metrics Matter: Assessing Progress towards Women’s Empowerment in Agriculture and Beyond The Philippine Institute for Development Studies (PIDS), in partnership with the International Food Policy Research Institute (IFPRI), will hold a public seminar featuring three studies on women empowerment on August 14, 2024, 9:00 AM to 11:30 AM (Asia/Manila) / August 13, 2024, 9:00 PM to 11:30 PM (US/Eastern) at the PIDS Conference Hall and via Zoom. […] The post Metrics Matter: Assessing Progress towards Women’s Empowerment in Agriculture and Beyond appeared first on IFPRI. Full Article
owa Infants show racial bias toward members of own race and against those of other races - Racial bias begins earlier than previously thought, new insights into cause By media.utoronto.ca Published On :: Tue, 11 Apr 2017 14:59:15 +0000 Racial bias begins earlier than previously thought, new insights into causeToronto, ON – Two studies by researchers at the Ontario Institute for Studies in Education (OISE) at the University of Toronto and their collaborators from the US, UK, France and China, show that six- to nine-month-old infants demonstrate racial bias in favour of members of […] Full Article Education Media Releases
owa CT Scanning Steps Towards the Future By www.qualitymag.com Published On :: Mon, 23 Oct 2017 07:00:00 -0400 High-energy, large-format industrial CT scanning allows for feasible inspection of larger parts. Full Article
owa Lennox Runs First “Feel the Love” HVAC Install in Iowa By www.achrnews.com Published On :: Fri, 02 Nov 2018 00:00:00 -0400 Through the program, Lennox helps families in need by donating a state-of-the-art HVAC system, then having the equipment installed by a local Lennox dealer free of charge. Full Article
owa Ohio Bill Could Direct School Funding Toward Air Conditioning By www.achrnews.com Published On :: Fri, 09 Nov 2018 09:00:00 -0500 HB 738, introduced Oct. 4 by Rep. Niraj Antani (R-Miamisburg), requires the Ohio Facilities Construction Commission (OFCC) and the Department of Education (ODE) to study the status of school buildings regarding air conditioning, accessibility, and school safety. Full Article
owa Rooftop Unit Manufacturers Work Toward 2023 DOE Efficiency Standards By www.achrnews.com Published On :: Mon, 06 Jun 2022 11:00:00 -0400 For many manufacturers, higher efficiency systems have been in the works for a while, but the 2023 DOE standards, pandemic, and current supply chain issues have added pressure. Full Article
owa Howard Community College Receives $50,000 Grant to Support Workforce Development and Skilled Trades By www.achrnews.com Published On :: Sun, 10 Nov 2024 11:00:00 -0500 The grant will provide state-of-the-art technology and equipment for industrial training programs such as mechatronics, information technology and cybersecurity, HVAC, construction management, welding, and more. Full Article
owa HVAC’s Smart Home Products Move Toward Mainstream Market By www.achrnews.com Published On :: Mon, 14 Dec 2020 07:00:00 -0500 For residential HVAC contractors, smart homes are a fast-growing market that offers opportunity for profit. Full Article
owa Episode 371: Howard Chu on the Lightning Memory Mapped Database (LMDB) By traffic.libsyn.com Published On :: Tue, 25 Jun 2019 23:24:39 +0000 Howard Chu, CTO of Symas Corp and chief architect of the OpenLDAP Project, discusses the key technical features of the Lightning Memory-mapped Database (LMDB) that make it one of the fastest, most efficient and safest embedded data stores in the world. Full Article
owa Episode 377: Heidi Howard on Distributed Consensus By traffic.libsyn.com Published On :: Tue, 20 Aug 2019 20:29:28 +0000 Heidi Howard, a researcher in the field of distributed systems, discusses distributed consensus. Heidi explains when we need it, when we don't need and the algorithms we use to achieve it. Full Article
owa Episode 391: Jeremy Howard on Deep Learning and fast.ai By traffic.libsyn.com Published On :: Thu, 05 Dec 2019 19:17:57 +0000 Jeremy Howard from fast.ai explains deep learning from concept to implementation. Thanks to transfer learning, individuals and small organizations can get state-of-the-art results on machine learning problems using the open source fastai library... Full Article
owa Episode 485: Howard Chu on B+tree Data Structure in Depth By traffic.libsyn.com Published On :: Tue, 09 Nov 2021 17:03:50 +0000 Howard Chu, CTO of Symas Corp and chief architect of the OpenLDAP project, discusses the key features of B+Tree Data Structures which make it the default selection for efficient and predictable storage of sorted data. Full Article
owa Episode 514: Vandana Verma on the Owasp Top 10 By se-radio.net Published On :: Tue, 31 May 2022 18:02:14 +0000 Vandana Verma, Security Leader at Snyk and vice-chairperson of the OWASP Global Board of directors, discusses the "OWASP top 10" with host Priyanka Raghavan. The discussion explores various subtopics such as the history behind OWASP, the OWASP top 10 security risks, example of common vulnerabilities and ends with information on top projects in OWASP and how can contribute to it. Full Article
owa SE Radio 568: Simon Bennetts on OWASP Dynamic Application Security Testing Tool ZAP By se-radio.net Published On :: Wed, 14 Jun 2023 20:29:00 +0000 Simon Bennetts, a distinguished engineer at Jit, discusses one of the flagship projects of OWASP: the Zed Attack Proxy (ZAP) open source security testing tool. As ZAP’s primary maintainer, Simon traces the tool's origins and shares some anecdotes with SE Radio host Priyanka Raghavan on why there was a need for it. They take a deep dive into ZAP’s features and its ability to integrate with CI/CD, as well as shift security left. Bennetts also considers what it takes to build a successful open source project before spending time on ZAP’s ability to script to provide richer results. Finally, the conversation ends with some questions on ZAP’s future in this AI-powered world of bots. Full Article
owa Which types of power generating plants are worth planning and constructing nowadays? By electrical-engineering-portal.com Published On :: Mon, 19 Feb 2024 06:24:59 +0000 Power generating plants are always a capital investment in all countries across the world. Not many countries are building new generating plants nowadays. As we all feel, a worldwide energy crisis of unparalleled severity and complexity is currently underway. The... Read more The post Which types of power generating plants are worth planning and constructing nowadays? appeared first on EEP - Electrical Engineering Portal. Full Article Energy and Power Energy Generation Hydropower Solar Power Wind Power capacity factor coal coal-fired plants combustion engine plant concentrated solar plant cost production diesel engine plant energy production fossil fuels fuel gas turbine plant hydropower plant natural gas nuclear power plant operational losses plant capacity factor power generating plants pv farm running cost single line diagrams solar power plant steam thermal power plant wind farm
owa Iowa State University puts the meat in PROCESS EXPO By www.packagingstrategies.com Published On :: Thu, 06 Aug 2015 00:00:00 -0400 The Food Processing Suppliers Association (FPSA) today announced the details of two important topics for the educational program at PROCESS EXPO 2015. Full Article
owa Kraft Developing and Testing Its First Recyclable Fiber-Based Microwavable Cup By www.packagingstrategies.com Published On :: Thu, 14 Jan 2021 00:00:00 -0500 Kraft Mac & Cheese has announced it is developing and testing the brand’s first-ever recyclable fiber-based microwavable cup. Upon testing completion, the brand will launch a new Kraft Mac & Cheese Shapes variety using the new cup and design later in 2021. Full Article
owa Attitudes Toward Automation By www.packagingstrategies.com Published On :: Tue, 01 Aug 2023 00:00:00 -0400 Automation plays a huge and ever-growing role in the packaging industry. No surprise, then, that the July issue of Packaging Strategies featured a story on automation and controls (From Smart Valves to Smart Factories). Full Article
owa GBPUSD stretches toward 61.8% retracement By www.forexlive.com Published On :: Tue, 12 Nov 2024 16:46:03 GMT The USD is moving higher. The EURUSD is against the 2024 low at 1.0600.The USDJPY is trading to new highs and has entered into a swing area between 154.54 in 155.09. The high price last week reached 154.704 and is the next upside target.For the GBPUSD it is trading to new lows and moving away from it's broken 200 day moving average at 1.28178 broken earlier today. A new low is being made as I type at 1.27347. That low is just above the 61.8% retracement of the move up from the April 2024 low at 1.27322. Break below that retracement level and traders will be looking toward a swing area between 1.2665 and 1.2685 as seller add to their run to the downside.If buyers lean against the retracement level and move higher, getting back above 1.2777 is needed for the buyers to have some comfort for more upside probing. Absent that and the sellers are more in control. Ultimately, a move back above the 200-day moving average at 1.28178 is needed to scare the sellers into buying.Sellers are pushing, but the 61.8% retracement is now in the way and being tested. Will profit takers enter here against the risk defining level or will the sellers make another push to the downside? This article was written by Greg Michalowski at www.forexlive.com. Full Article Technical Analysis
owa Futurist and Renowned Author Rishad Tobaccowala to Keynote Radio Show Session on Transformation By www.nab.org Published On :: 8 Jun 2021 00:00:00 EST Full Article
owa A More Democratic Future for Filmmaking: NAB Show Panel Explores Shift Towards Audience-Driven Content By www.nab.org Published On :: 14 Feb 2024 00:00:00 EST Washington, D.C.— The future of the film industry is more democratic. That’s the idea behind a Main Stage panel discussion at the 2024 NAB Show in Las Vegas. The team behind “Holy Smokes,” the winner of the Decentralized Pictures Kevin Smith Comedy Short Film Screenplay Award, will dive into the challenges aspiring filmmakers face and explore the groundbreaking shift towards audience-driven filmmaking. The panel features Decentralized Pictures (DCP) Co-founder Roman Coppola (“Moonrise Kingdom,” “The French Dispatch,” and “Darjeeling Limited”), and Actor Mena Suvari (“American Beauty,” “American Pie,” HBO’s “Six Feet Under”), followed by a screening of “Holy Smokes.” Full Article
owa LG NeoChef 23L Smart Inverter Microwave Oven $130 Delivered @ Amazon AU By www.ozbargain.com.au Published On :: Wed, 13 Nov 2024 21:17:56 +1100 Dropping faster than your 5G. Down to its ATL, possibly most popular but equally most hated compact OzB microwave. Get onto it whilst your food is hot and your wifi is not. Full Article Electrical & Electronics LG LG MS2336DB Microwave Oven
owa UN COP29 climate summit ups ‘climate finance’ target from 2009’s goal of $100 billion a year to ‘a more ambitious goal’ of ‘$1.8 trillion by 2030’ – Seeks ‘a just transition towards sustainability’ By www.climatedepot.com Published On :: Tue, 05 Nov 2024 18:10:44 +0000 Last week, UN Trade and Development (UNCTAD) published its report on the quantitative and qualitative elements of the NCQG. It conveys a strong message that global climate finance needs a boost in both quantity and quality to address developing economies’ needs for a just transition towards sustainability and resilience. “Ultimately, the goal of the NCQG (New Collective Quantified Goal) on climate finance must be to transform the climate finance landscape and herald a new era of mutual trust, cooperation and climate action,” the UN Trade and Development (UNCTAD) report urges. Full Article Middle Column cop29 development funding un
owa Rollins Museum of Art takes 2 steps toward reality in Winter Park By www.orlandosentinel.com Published On :: Sat, 29 Apr 2023 09:15:00 +0000 The new Rollins Museum of Art building planned for Winter Park received a $750,000 national grant and approval of the building's design. Full Article
owa Mobility management in ITU-T: Its current development and next steps heading towards future networks By www.itu.int Published On :: Tue, 20 Sep 2016 15:46:49 GMT Mobility management in ITU-T: Its current development and next steps heading towards future networks Full Article
owa NET2030-DF - Driving forces and vision towards Network 2030 By www.itu.int Published On :: Tue, 16 Feb 2021 15:00:05 GMT NET2030-DF - Driving forces and vision towards Network 2030 Full Article
owa Case Study - Towards a Circular Economy with the Implementation of ITU International Standards in Costa Rica By www.itu.int Published On :: Thu, 16 Dec 2021 09:41:12 GMT Case Study - Towards a Circular Economy with the Implementation of ITU International Standards in Costa Rica Full Article
owa WVU researchers develop microwave technology that could extend the life cycle of plastics - WBOY.com By news.google.com Published On :: Wed, 13 Nov 2024 00:04:54 GMT WVU researchers develop microwave technology that could extend the life cycle of plastics WBOY.com Full Article
owa Razer launches Android smartphone geared towards gamers By www.siliconrepublic.com Published On :: Thu, 02 Nov 2017 09:11:11 +0000 Gaming giant Razer had been rumoured to be working on a smartphone for some time. Read more: Razer launches Android smartphone geared towards gamers Full Article Gear Android gaming mobile Three
owa 2023 Speech Industry Award Winner: Speechmatics Inches Closer Toward a Universal Translator By www.speechtechmag.com Published On :: Wed, 13 Sep 2023 00:00:00 GMT Speechmatics, a provider of automatic speech recognition software based on recurrent neural networks and statistical language modeling, is on a mission to make its speech-to-text technology usable by 70 percent of the world's population in the next three years. Full Article
owa Innovating IT infrastructure at CBP: A conversation with Sonny Bhagowalia By federalnewsnetwork.com Published On :: Mon, 14 Feb 2022 17:47:33 +0000 What is the IT strategy for the U.S. Customs and Border Protection (CBP)? How is CBP working to modernize its IT infrastructure? How is it using technology and innovation to change the way it does business? Join host Michael Keegan as he explores these questions and more with Sonny Bhagowalia, Assistant Commissioner & Chief Information Officer, U.S. Customs and Border Protection. The post Innovating IT infrastructure at CBP: A conversation with Sonny Bhagowalia first appeared on Federal News Network. Full Article All News Analysis Federal Insights Radio Interviews The Business of Government Hour Business of Government Hour Customs and Border Protection IBM Center for the Business of Government Michael J. Keegan Sonny Bhagowalia
owa CargoAi accelerates on CargoWALLET with the appointment of Fintech veteran Olivier Veyrac By www.logisticsit.com Published On :: CargoAi has appointed global payment expert, Olivier Veyrac as its Senior Vice President for CargoWALLET. Over the past 18 months, CargoWALLET has been adopted by 5,000+ Airlines, Freight Forwarders, GHAs and logistic service providers. Full Article
owa Precision Pollination project is a step towards better food security By www.logisticsit.com Published On :: A new project aimed at exploring the role drone technology can play in improving yield, fruit quality and forecasting in UK strawberry production is a pivotal step towards enhancing food security. Full Article
owa NIS2 Article 28 Guidance: A Positive Step Toward Reducing DNS Abuse Across Europe By circleid.com Published On :: 2024-10-28T07:45:00-07:00 The European Union (EU) has set a high bar by tackling domain name system (DNS) abuse head on via government regulation and seems to have successfully resisted attempts to water down DNS stewardship obligations. Recent guidance from a key European Commission cooperation group (the NIS Cooperation Group) handling sections of the Network and Information Security Directive (NIS2) intends for a robust implementation of Article 28, which will go a long way toward helping to mitigate some of the longstanding problems that persist in the DNS. Full Article
owa Iowa Tornado's Path of Destruction as Seen From Space By www.discovermagazine.com Published On :: Fri, 31 May 2024 03:45:00 GMT Thanks to clashing air masses and a jet stream sweeping storms along between them, this spring has brought a rash of destructive tornadoes. Full Article Planet Earth