how to Minecraft with RTX now available on Windows: Heres how to download it By feedproxy.google.com Published On :: 2020-04-17T17:59:48+05:30 Full Article Gaming
how to Buy groceries on JioMart using WhatsApp, heres how to order By feedproxy.google.com Published On :: 2020-04-28T07:45:00+05:30 Full Article General
how to How to record the screen on Android devices By feedproxy.google.com Published On :: 2020-04-28T13:53:45+05:30 Full Article General
how to From video conferencing apps to app stores and scam emails - how to stay safe online By feedproxy.google.com Published On :: 2020-05-01T16:30:00+05:30 Full Article Internet
how to 3 ways to prepare data for analytics: How to choose the best option By feedproxy.google.com Published On :: Wed, 11 Dec 2019 13:01:49 +0000 Jeff Stander helps us understand the different options of preparing data for analytics. The post 3 ways to prepare data for analytics: How to choose the best option appeared first on The Data Roundtable. Full Article Uncategorized data management for analytics data preparation
how to Inspiring Innovation: How To Motivate Creative Marketing Teams By www.dmnews.com Published On :: Thu, 07 Jun 2018 13:38:43 GMT Tips from executives on how to inspire creativity in the workplace Full Article
how to How to void Suriety ? By www.lawyersclubindia.com Published On :: Sat, 9 May 2020 15:59:39 GMT Respected sir My father is an employee (Govt.)He is eligible for Suriety signature.If any one borrows money in chitfunds(Lifting money)/Buying a new vechile under Bank insurance. If they ask him(My father) for Suriety signature my father does it without knowing me and my family and they won't pay the desired amount to the respective companies/Banks.Ultimately my family is getting trouble.So to avoid all these,is there any chance/idea/plan/e. t. c.,. for not to do Suriety signature. [It should not be valid].Is there any chance sir. I am expecting a positive response from your side ð sir. If my father does also it should not be valid. It must be null(signature) Thanking you sir Full Article
how to Super Flower Moon 2020: Date, timing in India, how to watch full moon; check details By www.financialexpress.com Published On :: 2020-05-07T14:51:00+05:30 Did you miss last month's Pink Supermoon? Don’t worry! You can witness another supermoon today. Full Article Lifestyle Science
how to How to respond final report By www.lawyersclubindia.com Published On :: Dear Experts I have lodge a FIR in which I.O. has been submitted Final Report but I have some material documentary evidence which IO keep set aside. I want to know remedies available for me I do not want re Investigation can I proceed in court directly by converting FIR to complaint case. Thank You Full Article
how to Inspiring Innovation: How To Motivate Creative Marketing Teams By feedproxy.google.com Published On :: Thu, 07 Jun 2018 13:38:43 GMT Tips from executives on how to inspire creativity in the workplace Full Article
how to How to keep children busy, entertained and yet in line in time of self-quarantine By www.financialexpress.com Published On :: 2020-04-05T00:30:00+05:30 Struggling to balance work-from-home and parenting duties? Difficult as it might sound, there are several ways to keep children entertained and happy even in lockdown mode Full Article Lifestyle
how to How To Customise Your Car Insurance Policy? By www.banknetindia.com Published On :: How To Customise Your Car Insurance Policy? Full Article
how to Zoom Safe? How To Use Safely, Zoom Meetings, Hosting, Top Free Zoom Alternatives By trak.in Published On :: Fri, 17 Apr 2020 02:42:43 +0000 Is Zoom safe or not? Latest Zoom updates here. Is Zoom safe to download? What are the best Zoom alternatives free? Here’s everything you need to know about Zoom and whether you should continue using Zoom or try a new video conferencing platform instead. We have answered all your queries here and compiled a full […] The post Zoom Safe? How To Use Safely, Zoom Meetings, Hosting, Top Free Zoom Alternatives first appeared on Trak.in . Trak.in Mobile Apps: Android | iOS. Full Article Business Internet Best Zoom Alternatives Top Zoom Alternatives Video Conferencing Apps Zoom Zoom Alternatives Zoom Alternatives 2020 Zoom Alternatives Free Zoom Safe Or Not
how to How to Protect Women From Violence Under Lockdowns? Send Cash By allafrica.com Published On :: Thu, 07 May 2020 05:39:02 GMT [African Arguments] Domestic abuse has spiked under COVID-19. Cash transfers are no panacea, but they've been shown to reduce violence and can be adapted. Full Article
how to How to Verify Performance of Complex Interconnect-Based Designs? By feedproxy.google.com Published On :: Sun, 14 Jul 2019 15:43:00 GMT With more and more SoCs employing sophisticated interconnect IP to link multiple processor cores, caches, memories, and dozens of other IP functions, the designs are enabling a new generation of low-power servers and high-performance mobile devices. The complexity of the interconnects and their advanced configurability contributes to already formidable design and verification challenges which lead to the following questions: While your interconnect subsystem might have a correct functionality, are you starving your IP functions of the bandwidth they need? Are requests from latency-critical initiators processed on time? How can you ensure that all applications will receive the desired bandwidth in steady-state and corner use-cases? To answer these questions, Cadence recommends the Performance Verification Methodology to ensure that the system performance meets requirements at the different levels: Performance characterization: The first level of verification aims to verify the path-to-path traffic measuring the performance envelope. It targets integration bugs like clock frequency, buffer sizes, and bridge configuration. It requires to analyze the latency and bandwidth of design’s critical paths. Steady state workloads: The second level of verification aims to verify the master-by-master defined loads using traffic profiles. It identifies the impact on bandwidth when running multi-master traffic with various Quality-of-Service (QoS) settings. It analyzes the DDR sub-system’s efficiency, measures bandwidth and checks whether masters’ QoS requirements are met. Application specific use cases: The last level of verification simulates the use-cases and reaches the application performance corner cases. It analyzes the master-requested bandwidth as well as the DDR sub-system’s efficiency and bandwidth. Cadence has developed a set of tools to assist customers in performance validation of their SoCs. Cadence Interconnect Workbench simplifies the setup and measurement of performance and verification testbenches and makes debugging of complex system behaviors a snap. The solution works with Cadence Verification IPs and executes on the Cadence Xcelium® Enterprise Simulator or Cadence Palladium® Accellerator/Emulator, with coverage results collected and analyzed in the Cadence vManager Metric-Driven Signoff Platform. To verify the performance of the Steady State Workloads, Arm has just released a new AMBA Adaptive Traffic Profile (ATP) specification which describes AMBA abstract traffic attributes and defines the behavior of the different traffic profiles in the system. With the availability of Cadence Interconnect Workbench and AMBA VIP support of ATP, early adopters of the AMBA ATP specification can begin working immediately, ensuring compliance with the standard, and achieving the fastest path to SoC performance verification closure. For more information on the AMBA Adaptive Traffic Profile, you can visit Dimitry's blog on AMBA Adaptive Traffic Profiles: Addressing The Challenge. More information on Cadence Interconnect Workbench solution is available at Cadence Interconnect Solution webpage. Thierry Full Article Verification IP Interconnect Workbench Interconnect Validator SoC Performance modeling AMBA ATP ARM System Verification
how to How to write Innovus Gui command to a cmd/log file? By feedproxy.google.com Published On :: Tue, 07 Apr 2020 03:07:13 GMT HI, I have been using the Innovus GUI commands for several things and wonder if those command can be written to a log or cmd file so I can use it in my flow script? Is there such options that we can set? Thanks Full Article
how to How to place pins inside of the edge in Innovus By feedproxy.google.com Published On :: Fri, 10 Apr 2020 04:02:08 GMT Hi, I am doing layout for a mixed-signal circuit in Innovus. I want to create a digital donut style of layout (i.e. put analog circuit in the middle, and circle analog part with digital circuits). To do that, I need to place some pins inside the edge to connect to analog circuit (as shown in my attachment), but the problems is that I cannot place pins inside the edge by using "pin editor" within Innovus. Any suggestions to place pins inside? Thank you so much for your time and effort. Full Article
how to How to customize default_hdl_checks/rules in CCD conformal constraint designer By feedproxy.google.com Published On :: Tue, 03 Sep 2019 08:12:48 GMT Dear all, I am using Conformal Constraint Designer (Version 17.1) to analyse a SystemVerilog based design. While performing default HDL checks it finds some violations (issues) in RTL and complains (warnings, etc) about RTL checks and others. My questions: Is there any directive which I can add to RTL (system Verilog) so that particular line of code or signal is ignored or not checked for HDL or RTL checks. I can set ignore rules in rule manager (gui) but it does not seems effective if code line number changes or new signals are introduced. What is the best way to customize default_hdl_rules ? I will be grateful for your guidance. Thanks for your time. Full Article
how to How to dump waveform, fsdb in SimVision? By feedproxy.google.com Published On :: Thu, 09 Jan 2020 02:30:31 GMT As title, How to dump waveform, fsdb in SimVision? (Simulation Analysis Environment SimVision(64) 18.09-s001)Please help. Thanks. Full Article
how to How to Specify Phase Noise as an Instance Parameter in Spectre Sources (e.g. vsource, isource, Port) By feedproxy.google.com Published On :: Wed, 21 May 2014 00:33:00 GMT Last year, I wrote a blog post entitled Modeling Oscillators with Arbitrary Phase Noise Profiles . We now have an easier way to do this. Starting in MMSIM 13.1 , you can specify the phase noise as an instance parameter in Spectre sources, including...(read more) Full Article Spectre RF phase noise spectreRF analogLib port noise profiles
how to 7 Habits of Highly Successful S-Parameters: How to Simulate Those Pesky S-Parameters in a Time Domain Simulator By feedproxy.google.com Published On :: Tue, 16 May 2017 20:11:02 GMT Hello Spectre Users, Simulating S-parameters in a time domain (transient, periodic steady state) simulator has been and continues to be a challenge for many analog and RF designers. I'm often asked: What is required in order to achieve accurate...(read more) Full Article S-parameter Spectre RF Spectre International Microwave Symposium
how to Link to: 7 Habits of Highly Successful S-Parameters: How to Simulate Those Pesky S-Parameters in a Time Domain Simulator By feedproxy.google.com Published On :: Thu, 06 Jul 2017 22:18:34 GMT Hi All, If you were unable to attend IMS 2017 in June 2017, the IMS MicroApp “7 Habits of Highly Successful S-Parameters” is on our Cadence website. On Cadence Online Support , the in-depth AppNote is here: 20466646 . Best regards, Tawna...(read more) Full Article nport analog/RF APS S-parameter Virtuoso Spectre Spectre RF broadband SPICE nport settings RF spectre spectreRF spectreRF s parameter simulation
how to How to Set Up and Plot Large-Signal S Parameters? By feedproxy.google.com Published On :: Mon, 04 Dec 2017 09:23:00 GMT Large-signal S-parameters (LSSPs) are an extension of small-signal S-parameters and are defined as the ratio of reflected (or transmitted) waves to incident waves. (read more) Full Article RF Simulation Spectre RF Virtuoso ADE Virtuoso
how to How to get test name from test session object? By feedproxy.google.com Published On :: Thu, 30 Apr 2020 07:04:23 GMT Hi, I have a test session object that I am getting like this: maeTstSession=maeGetTestSession(test ?session session) Is it possible to get the test name from this object? I am asking because this object passed to several levels of functions and I don't want to pass an additional argument with the test name Full Article
how to How to save the cellview of all instances in a top cell faster? By feedproxy.google.com Published On :: Wed, 06 May 2020 06:47:41 GMT I have a top cell & need to revise all the instances' cellview & export top cell as a new GDS file. So I write a SKILL code to do so and I find out it will be a little bit slow by using the dbSave to save the cellview of each instance. Code as below: let( (topCV subCV ) topCV = dbOpenCellViewByType(newLibName topCellName "layout" "maskLayout" "a") foreach(inst topCV->instances subCV = dbOpenCellViewByType(newLibName inst->cellName "layout" "maskLayout" "a") ;;;revise code content ;;;... ;;;revise code content dbSave(subCV) dbClose(subCV) ) dbSave(topCV) dbClose(topCV) system(strcat( "strmout -library " newLibName " -topCell " topCellName " -view layout -strmFile " resultFolder "/" topCellName ".gds -techLib " srcLibName " -enableColoring -logFile " topCellName "_strmOut.log" ) ) ) Even if the cell content is not revised, the run time of dbSave will be 2 minutes when there are ~ 1000 instances in topcell. The exported GDS file size is ~2MB. And the dbSave becomes the bottle neck of the code runtime... Is there any better way to do such a thing? Full Article
how to How to get m0 layer info in a layout By feedproxy.google.com Published On :: Wed, 06 May 2020 11:27:53 GMT HI All, I am new to skill. My requirement is open layout get m0 layer cordinates in a layout dump info into a text file For example 2 input Nand, A,B output , vcc , vssx and internal net (n2) will be the m0 layers. I need info like in a text file. n2 co ordinate vssx (co ordinate) a (co ordinate) b (co ordinate ) . I found similar code in cadence form . Can you help me on this procedure(printPts()let( (type (cnt 0) (objList geGetSelSet()))foreach(obj objList ++cnt type = obj~>objType case(type ("inst" printf("%s %L at %L " type obj~>xy)) ("rect" printf("%s on layer %L at %L " type obj~>lpp obj~>bBox)) ("polygon" printf("%s on layer %L at %L " type obj~>lpp obj~>points)) ("path" printf("%s on layer %L at %L " type obj~>lpp obj~>points)) ("pathSeg" printf("%s on layer %L at %L " type obj~>lpp list(obj~>beginPt obj~>endPt))) ("label" printf("%s on layer %L at %L " type obj~>lpp obj~>xy)) (t printf("%s not defined " type)) ))printf("%n objects selected " cnt)); end of let); end of printPts Full Article
how to skill ocean: how to get instances of type hisim_hv from simulation results? By feedproxy.google.com Published On :: Fri, 08 May 2020 20:46:12 GMT Hi there, I'm running a transient simulation, and I want to get all instances with model implementation hisim_hv because after that I want to process the data and to adjust some parameters for this kind of devices before dumping the values. What is the easiest/fastest way to get those instances in skill/ocean? What I did until now: - save the final OP of the simulation and then in skill openResults()selectResults('tranOp)report(?type "hisim_hv" ?param "vgs") Output seems to be promising, and looks like I can redirect it to a file and after that I have to parse the file. Is there other simple way? I mean to not save data to file and to parse it. Eventually having an instance name, is it possible to get the model implementation (hsim_hv, bsim4, etc..)? Best Regards, Marcel Full Article
how to How to check a cluster of same net vias spacing, with have no shape or cline covered By feedproxy.google.com Published On :: Fri, 14 Feb 2020 04:12:15 GMT Hi all, I have a question regarding the manufacture : how to check a cluster of same net vias spacing, with have no shape or cline covered Full Article
how to How to install PLL Macro Model Wizard? By feedproxy.google.com Published On :: Tue, 10 Mar 2020 04:13:35 GMT Hello, I am using virtuoso version IC 6.1.7-64b.500.1, and I am trying to follow the Spectre RF Workshop-Noise-Aware PLL Design Flow(MMSIM 7.1.1) pdf. I could find the workshop library "pllMMLib", but I cannot find PLL Macro Model Wizard, and I attached my screen. Could you please help me install the module "PLL Macro Model Wizard"? Thanks a lot! Full Article
how to How to force the garbage collection By feedproxy.google.com Published On :: Thu, 05 Mar 2020 03:31:57 GMT I have a script to handle many polys in memory in allegro. But after the completion of the script, I run the axlPolyMemUse(), it reports (31922 0 0 55076 252482) Seems too many polys are still in the memory,and they are not being used. So how to delete these polys from the memory? And reclaim the memory? BTW. I have no skill dev license. So gc() function doesn't work. Thanks. Full Article
how to How to reload a SKILL-script in Allegro By feedproxy.google.com Published On :: Thu, 02 Apr 2020 06:26:49 GMT I am working on some SKILL scripts which are loaded by allegro.ilinit at startup. If I edit my .il-files how do I get them updated in Allegro? Right now I restart the program but there must be a simpler way. A newbie question, I know... Full Article
how to How to call a skil file in the other skill file to create one new function. By feedproxy.google.com Published On :: Mon, 20 Apr 2020 11:05:56 GMT Hi guys, eDave, I need to call (replay) a skill to combine some skills to ONE UI for more convenience and using as more easier. Please help me to find the command to execute this.(code for example as more good) HT, Full Article
how to How to get the location of Assembly Line By feedproxy.google.com Published On :: Tue, 21 Apr 2020 11:41:14 GMT Hi I'm trying to find the location of the assembly line in the design automatically without using "Show Element". And also I want to find the end points of that line. The line exists in "Package Geometry/Assembly_Top" Layer. So is there any code snippet to find the location of assembly line? Full Article
how to How to run a regressive test and merge the ncsim.trn file of all test into a single file to view the waveform in simvision ? By feedproxy.google.com Published On :: Mon, 13 Jan 2020 12:04:01 GMT Hi all, I want to know how to run a regressive test in cadence and merge all ncsim .trn file of each test case into a single file to view all waveform in simvision. I am using Makefile to invoke the test case. eg:- test0: irun -uvm -sv -access +rwc $(RTL) $(INTER) $(PKG) $(TOP) $(probe) +UVM_VERBOSITY=UVM_MEDIUM +UVM_TESTNAME=test0 test1: irun -uvm -sv -access +rwc $(RTL) $(INTER) $(PKG) $(TOP) $(probe) +UVM_VERBOSITY=UVM_MEDIUM +UVM_TESTNAME=test1 I just to call test0 followed by test1 or parallel both test and view the waveform for both tests case. I new to this tool and help me with it Full Article
how to How to refer the library compiled by INCISIVE 13.20 in Xcelium 19.30 By feedproxy.google.com Published On :: Wed, 19 Feb 2020 08:56:22 GMT Hi, I am facing this elaboration error when using Xcelium: Command> xmverilog -v200x +access+r +xm64bit -f vlist -reflib plib -timescale 1ns/1ps Log> xmelab: *E,CUVMUR (<name>.v,538|18): instance 'LUTP0.C GLAT3' of design unit 'tlatntscad12' is unresolved in 'worklib.LUTP0:v'. I guess the plib was not referred to as the simulation configuration because the tlatntscad12 is included in plib. The plib is compiled by INCISIVE 13.20 and I am using the Xcelium 19.30. Please tell me the correct command on how to refer to the library directory compiled by different versions. Thank you, Full Article
how to How to remove sessions from vManager without deleting them By feedproxy.google.com Published On :: Mon, 02 Mar 2020 23:35:09 GMT I am importing sessions which are run by other people to analyse and I would like to remove them from my vManager Regressions tab as they become obsolete. As I am not the original person who run the sims, I cannot "delete" sessions. What are my options? Thanks. Full Article
how to How to get product to license feature mapping information? By feedproxy.google.com Published On :: Wed, 06 May 2020 03:45:06 GMT When I run simulation with irun, it may use may license features. How can I know which feature(s) a product use? I get below message in cdnshelp: ------------------------------------------------------------- Which Products Are in the License File? One Cadence product can require more than one license (FEATURE). The product to feature mapping in the license file lists the licenses each product needs. For example, if the license file lists these features for the NC-VHDL Simulator: Product Name: Cadence(R) NC-VHDL Simulator# Type: Floating Exp Date: 31-jul-2006 Qty: 1# Feature: NC_VHDL_Simulator [Version: 9999.999]# Feature: Affirma_sim_analysis_env [Version: 9999.999] ------------------------------------------------------------------- But, in my license file, I can't find such info. There is only "FEATURE" lines in my license file. How can I get product to feature mapping info? Thanks! Full Article
how to how to add section info to extsim_model_include? By feedproxy.google.com Published On :: Wed, 22 Apr 2020 22:12:45 GMT i had encountered error message like this before. but in liberate, i did not find the entry to input section info. Full Article
how to Arduino: how to save the dynamic memory? By feedproxy.google.com Published On :: Wed, 06 Nov 2019 07:25:31 GMT When the Arduino Mega2560 is added to the first serial port, the dynamic memory is 2000 bytes, and when the second serial serial is added, the dynamic memory is 4000 bytes. Now I need to add the third Serial serial port. The dynamic memory is 6000 bytes. Due to the many variables in the program itself, the dynamic memory is not enough. Please help me how to save the dynamic memory? Full Article
how to How To Track North Korea's Mysterious New Satellite By packetstormsecurity.com Published On :: Thu, 11 Feb 2016 16:42:59 GMT Full Article headline space cyberwar korea
how to How To Hack A Company By Circumventing Its WAF For Fun And Profit - Part 2 By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:35:24 GMT Full Article headline hacker flaw
how to Microsoft's MileIQ Helps a Nonprofit Show People How to Save Lots of Energy By feeds.techsoup.org Published On :: Thu, 05 Oct 2017 14:26:00 GMT In 2015, the state of Louisiana consumed more energy per capita than any other state, according to the U.S. Energy Information Administration. Although this may not come as a complete surprise — the state's warm, muggy climate makes air conditioning a must — it's clear that Louisiana's energy-use profile needs a drastic transformation. The Energy Wise Alliance (EWA), a small nonprofit based in New Orleans, is determined to do just that. Along the way, the organization has gotten a boost from Microsoft's MileIQ app. MileIQ is a mobile app from Microsoft that automatically tracks the miles you've traveled and records all of your tax-deductible and reimbursable mileage. It's kind of like using a Fitbit, except you're tracking your driving. You can report your business drives on demand and claim your reimbursements or maximize your tax deductions. The average MileIQ user is logging $6,900 per year. Building a More Energy-Efficient Community EWA works to make energy efficiency more accessible to everyone. The organization works primarily with low-income families, tenants, and others who would otherwise be left out of the green energy revolution. EWA accomplishes its goals through both workshops and equipment upgrades at homes and businesses. Its Energy Smart for Kids program teaches students throughout the state how to lead a more energy-efficient lifestyle. These hourlong sessions cover the pitfalls of nonrenewable energy and detail more sustainable alternatives. At the end of each session, EWA volunteers hand out energy-efficiency starter kits so students can apply what they learned at home. Much like the rest of EWA's programs, Energy Smart for Kids serves underserved and underprivileged communities. In fact, many of the schools that EWA serves are Title 1 schools — schools whose students generally come from lower-income households. Aside from schools, EWA also helps nonprofits become more sustainable. Making Nonprofits Greener and More Cost-Efficient Nonprofits can benefit from EWA's work by way of simple but effective power-saving retrofits. EWA also provides volunteer labor and donates the materials for the retrofits, which means added cost savings. And as we all know, cost-saving programs are like gold dust for nonprofits. For example, volunteers from EWA revitalized the Victorian-era headquarters of the Alliance Française, a nonprofit dedicated to preserving Francophone heritage in the New Orleans community, with sustainable retrofits. As part of these upgrades, EWA sealed cracks, gaps, and openings; installed additional insulation; and programmed new thermostats. In addition, EWA gave the Alliance Française's volunteers a hands-on demonstration of behavioral changes so that they could bring this knowledge back home. EWA anticipated that the Alliance Française would save a total of $2,000 to $3,000 as a result of these green improvements. EWA's staff members also actively save money and operate more efficiently through the use of the mile-tracking app MileIQ. Saving Time and Money with MileIQ This method, as you can imagine, was time-consuming, and it brought with it the risk of human error. Most people can't possibly remember every single trip they make with their car, after all. "MileIQ is super accurate and takes the forgetting out of the equation," said Jamie Wine, executive director of EWA. For Kevin Kellup, education coordinator at EWA, MileIQ has been a game-changer. Jamie explained, "Kevin drives like crazy from school to school," racking up miles on his personal car. Now, thanks to MileIQ, Kevin can get more fairly and accurately reimbursed for his constant traveling. The most important benefit of Microsoft's MileIQ for Jamie is that his staff can be correctly reimbursed for mileage. He wants to show staff members that he values their time and effort spent traveling, which MileIQ really helps him achieve. For nonprofits, particularly small ones like EWA, it's always great when the team can receive fair compensation for its hard work. "The staff doesn't get paid much," Jamie said. And considering how important staff members' work is to the community, every penny matters. That's also where TechSoup comes in. TechSoup's Role: "Essential" Through TechSoup, eligible nonprofits can get MileIQ at 80 percent off the subscription rate. "Without TechSoup," Jamie noted, "this huge step up in technology" would not have been possible. The MileIQ discount program from Microsoft has made acquiring MileIQ way easier on the nonprofit's pocket. Having also previously obtained Microsoft Office 365 and QuickBooks Online through TechSoup, Jamie said, "TechSoup is a great equalizer." He mentioned that TechSoup helps a small nonprofit to grow into a technologically advanced organization. He added, "The super discounted products from TechSoup are like the pot of gold at the end of the rainbow." Getting MileIQ Premium Eligible nonprofits can get MileIQ at 80 percent off the individual subscription rate through TechSoup and can request an unlimited number of individual subscriptions. In addition to individual subscriptions, MileIQ is now included with an Office 365 Business Premium license. Nonprofits who currently do not have an Office 365 license can visit Microsoft's Office 365 for nonprofits page to register. This blog post was written by Nicholas Fuchs. spanhidden Full Article microsoft
how to 5 Data Security Risks for Nonprofits (and How to Fix Them) By feeds.techsoup.org Published On :: Fri, 13 Oct 2017 19:56:00 GMT Many nonprofits handle sensitive personal information belonging to community members — whether it's names or email addresses or payment information. But are you handling this data properly to prevent a data breach? This post is by no means exhaustive — after all, every nonprofit handles different sorts of data, and each organization has different security needs. That said, these are some practical things to think about when you review your handling of sensitive personal information. #1 Risk: Malware and Software Vulnerabilities The Problem This one may seem obvious, but with so many other security risks out there, it's easy to forget that malware still poses a major threat to your organization's data. How You Can Mitigate It To start, make sure you have antivirus software installed, and that it's up to date. In addition, you'll want to make sure your operating system and any software installed are also up to date, with all security patches installed. Beyond that, be careful what you click on. Don't download and install software from sites you don't trust. Be careful of the email attachments and links you click on — even from people you know. If you aren't expecting a file or link, click with caution. #2 Risk: Ransomware The Problem Ransomware is an especially insidious form of malware that holds your computer or data hostage unless you pay a sum of money to a criminal actor. Oftentimes, ransomware will encrypt your data, preventing you from accessing it. And according to Symantec's Director of Security Response Kevin Haley, some forms of ransomware will threaten to publicly release your data. How You Can Mitigate It Aside from up-to-date antivirus software and taking steps to avoid infection in the first place, there isn't a ton you can do to deal with a ransomware attack once your data's been encrypted. In that case, according to Haley, keeping up-to-date backups of your data is your best bet. That way, you'll be able to get back up and running quickly with minimal data loss. (TechSoup offers backup and recovery solutions from Veritas.) #3 Risk: Public Wi-Fi The Problem Public Wi-Fi is generally fine for some things, such as browsing cat videos on YouTube, or catching up on the headlines. However, for anything involving sensitive personal information, it's a security disaster waiting to happen. Bad actors could potentially eavesdrop on what you're doing while using public Wi-Fi, leaving your data and work open to prying eyes. How You Can Mitigate It First off, avoid using public, unsecured Wi-Fi when handling sensitive information — whether it's internal organizational data or your own personal banking information. Using a wireless hotspot, like those from Mobile Beacon (offered through TechSoup), instead of public Wi-Fi is an easy way to keep your data more secure. If you can't avoid public Wi-Fi, a virtual private network (VPN) is a good option — VPNs secure data between your computer and the website you're visiting. Not all VPNs provide the same level of security, though, and you'll need to make sure your VPN of choice conforms to any data security regulations that your organization may be subject to. See our previous overview of VPNs for more. #4 Risk: Inappropriate Sharing of Sensitive Information The Problem Sharing sensitive information via email, messaging apps, or similar means is a risky proposition. Email is a notoriously insecure method of communication. Email accounts are often the target of data breaches and phishing attacks. (A phishing attack is where an attacker tries to steal your account information by tricking you to enter your account information on a phony login page.) And whether it's through email or messaging app, it's all too easy to accidentally leak data by sharing it with the wrong person. How You Can Mitigate It Avoid sending sensitive information to colleagues via email. It's easier said than done, we know. Maybe you need to share a list of donor contact information with your marketing department, for example. Consider uploading it to a secure file server on your network that can only be accessed by others in the office. If your organization uses a cloud storage service like Box, consider using that instead — so long as it meets your organization's security needs. These cloud storage services usually encrypt data you upload to prevent it from getting stolen. You may also want to consider using constituent relationship management (CRM) software, a tool designed specifically to store and manage your organization's contacts. In addition, pay attention to access permissions. If you can, restrict access to sensitive information to only those who need it. Revisit your permissions settings regularly and update them as needed. To prevent your user accounts from being compromised in the first place, practice good account security hygiene. Use strong passwords and require your staff to use two-factor authentication. #5 Risk: Handling Credit Card Data The Problem A breach involving credit card data can be embarrassing for your organization, but it could wreak financial havoc on your members and supporters. All it takes is for hackers to grab a few pieces of information to rack up credit card debt in your supporters' names. How You Can Mitigate It Securing credit card information is important, but you don't have to make it up as you go. Make sure your organization conforms to payment card security standards. The Payment Card Industry Security Standards Council, as well as banks and credit card issuers, provide guidelines on how to best handle credit card information to prevent breaches. Has your nonprofit recently encountered any other notable risks? Tell us about it in the comments! spanhidden Full Article security symantec2017 privacy databases
how to How to Recognize a Suspicious Email By feeds.techsoup.org Published On :: Fri, 13 Oct 2017 23:23:30 GMT As champions of National Cyber Security Awareness Month (NCSAM), we're kicking off our first week with a focus on email. Read on for facts and tips on email security from the National Cyber Security Alliance. Across the world, 269 billion emails are sent every day. It's estimated that the average business user will receive 96 emails per day by 2019 (source: Radicati). Given our reliance on the medium, it's no surprise that email is one of cybercriminals' favorite methods of attack. According to the National Cyber Security Alliance, 85 percent of U.S. organizations have experienced a phishing attack and 30 percent of people have opened a phishing email. There are simple steps you can take to ensure that you don't become a victim of a cyberattack. Somewhat like a poker tell, suspicious emails contain hints that the sender isn't who they claim to be. Watch this video to learn how to spot email scams. The Facts About Email Scams Suspicious emails engage in "spoofing," a type of scam in which attackers impersonate a trustworthy entity to make it more likely that the recipient will open and act on the email. Spoofed emails typically employ one of two tactics: Phishing, the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money) for malicious reasons. Spreading malware by getting the user to open malicious email attachments or click on malicious links. Practical Tips on Spotting Suspicious Emails Look carefully at the email and ask yourself the following questions: Do you know or recognize the "from" address or contact's name? Does the message contain incorrect grammar or misspelled words? Does the message ask you to take action on something you didn't request, such as "click on this link to pick the new phone you requested"? If the answer to the first is no, or the answer to the second or third above is yes: Don't click on links. Instead, hover your cursor over links to determine if the address is unknown, suspicious, or misleading: for example, www.microsoft.com.maliciousdomain.it. Don't open any attachments the email contains. If you suspect a work email is a phishing attack, immediately report it to your IT administrator so they can alert your fellow coworkers of the attempted attack. If it's a personal email, most email service providers provide a mechanism to report that. Check out this example from Gmail. Additional Cybersecurity Resources Want to learn more about cybersecurity and how you can keep your data safe? Read our latest blog post about the Equifax breach. Need a little inspiration? Find out how TechSoup and Symantec are making a difference in the lives of at-risk teens. Get more security tips from the National Cyber Security Alliance. National Cyber Security Alliance Month — observed every October — was created as a collaborative effort between government and industry to ensure all Americans have the resources they need to stay safer and more secure online. Find out how you can get involved. Image: National Cyber Security Alliance spanhidden Full Article security communications
how to Sustainable Women Series: How to Build a 75 Percent Net Zero Community By feedproxy.google.com Published On :: 2016-06-07T20:29:00Z What does it take to build a 75 percent net zero community and the “largest Emerald-rated community” in the world? Tabitha Crawford explains how her team combined solar, HVAC, and sustainable building practices to build 250 net zero homes while keeping construction costs at a 3 percent premium. Full Article Energy Efficiency Energy Efficiency Rooftop Solar
how to 10 Options and 5 Case Studies Show How to Reform Utility Business Models By feedproxy.google.com Published On :: 2018-11-12T16:18:07Z Experts from Rocky Mountain Institute, the Advanced Energy Economy Institute and America’s Power Plan have released a new report that shows why new utility business models are key to the energy transition. Full Article Microgrids Microgrids News DER Energy Efficiency Utility Integration Infrastructure
how to Companies explore how to make your home smart and 100% renewable-powered By feedproxy.google.com Published On :: 2019-05-24T14:18:41Z Big Oil wants to put a box in your hall closet that works like a human brain, can cut the lights, stop the refrigerator and will know how you move about in the privacy of your home better than you do. Full Article Microgrids Microgrids News DER Energy Efficiency Rooftop DER
how to Companies explore how to make your home smart and 100% renewable-powered By feedproxy.google.com Published On :: 2019-05-24T14:18:41Z Big Oil wants to put a box in your hall closet that works like a human brain, can cut the lights, stop the refrigerator and will know how you move about in the privacy of your home better than you do. Full Article Microgrids Microgrids News DER Energy Efficiency Rooftop DER
how to How to Achieve High Speeds Without Breaking the Bank By www.ipc.org Published On :: Presentation by Michael Freda of Oracle’s Semiconductor Packaging & Technology Group. Full Article
how to Live Webinar | How to avoid the security dangers with working from home (WFH) By www.bankinfosecurity.eu Published On :: Full Article