Home Blog

Five Niche Parenting Markets And How To Reach Them Beyond The Mommy Blog

Five Niche Parenting Markets And How To Reach Them Beyond The Mommy Blog

The “mommy blogging” movement began in the early 2000s when internet conversations amongst new moms gave much-needed support and guidance. I had my blog before starting my agency, as did the ladies who would later become my business partners. We used this relatively new medium to discuss our daily highs and lows and build essential bonds that have lasted to this day in many situations.

The “mother blog” has grown into a multibillion-dollar business. And it’s no surprise: according to various studies, American mothers control anywhere from 64 percent to 85 percent of household spending. In 2018, it was predicted that women held as much as $40 trillion in consumer purchasing throughout the globe. While today’s broad parenting audiences are still seeking issues that will always connect with anybody raising small children (for example, first meals, toilet training, and sleepless nights), many parenting makers are increasingly focusing on specialization.

Today’s parenting influencers provide the perfect collaboration opportunity for marketers wishing to access these highly focused, highly engaged audiences. Not only can they talk to the specialist themes that their followers are interested in, but their shared experiences also have the authenticity that customers react to. Here’s how you use parental influencers to reach five highly targeted markets:

  1. Families of Military Personnel

Active-duty troops, reservists, veterans, and their families have similar characteristics: they are often relocated, stationed far away from loved ones, and have a close-knit group of friends and neighbors.

According to a survey, word-of-mouth recommendations and evaluations are critical in this sector, particularly when they come from a reliable source.

Consider influencer marketing efforts that include coupons or discounts and promotions focusing on travel, vacation, or summer relocation. Authentic content from military influencers that understand the community and its needs will ring true in this market, seeking more than lip service.

  1. Consumption

Food-focused parenting producers cover a wide range of themes and recipes on their platforms, and many are accessible for sponsored content, recipe creation, photography, and brand ambassadorship.

These influencers’ material often includes a parenting component, such as solid food introductions or coming up with nutritious, innovative snack ideas. They’re perfect for marketing food products, kitchen gadgets, takeout (for those evenings when everyone’s too tired to cook! ), grocery stores, and more. Sponsored recipes and material based on family rituals, holidays, parenting experiences (getting kids to eat veggies, for example), and entertaining are all excellent choices for this area.

For example, our firm recently completed a campaign for Stonyfield that included a millennial parent blogger’s piece titled “5 Ways to Get Your Child Active This Spring.” Her material contained bright, pinnable visuals and her advice for concentrating on the exercise, which incorporated the brand’s healthy on-the-go snack message.

  1. Education at home

Homeschooling is increasing, with an estimated 3.5 million children enrolled each year. More than home education items, homeschooling parents are interested in life experiences, unique learning methods, and family-first issues in general.

Brands can attract homeschooling audiences by weaving advertising into engaging tales, guidance, activities, and suggestions. Consider sponsoring printables, a summer bucket list, DIY instructions, or recipes that are helpful year after year.

  1. Saving Money/Couponing

According to PaydayNow, While budget-conscious parenting influencers may not immediately spring to mind as a sponsorship partner, their enthusiasm and highly engaged audiences are ideal for advertising rewards programs, coupons/discounts, financial services, or any product with a money-saving advantage.

Brands could consider Family-oriented subjects with the actual value for consumers: a top ten list for saving money over the holidays, how to vacation on a budget, back-to-school shopping under $100, and so on. One frugal-focused influencer, for example, helped promote FreeShipping.com with a holiday-themed article on saving money by utilizing the client’s cash-back program for a campaign we executed with FreeShipping.com.

  1. Handicraft/DIY

Their diversity only equals do-it-yourself parenting gurus’ inventiveness and inspiration. This thriving sector provides infinite options for brand collaborations, from professional designers to home craft aficionados.

Videos and lessons and before and after photos have shown to be quite effective in this market. Because Pinterest is one of the most popular places to look for this sort of material, make sure your campaign contains eye-catching photos with big, legible text and your brand URL, scaled to Pinterest’s ideal image ratio (2:3). (Canva is a tool that many of our influencers use to find and customize Pinterest-ready layouts.)

The topics covered by today’s parenting creators range from fashion to health to vacation. Regardless of the theme, they include more than just the stereotypical “mom” image: men, parents of color, LGBTQ+, mixed and adoptive families are all part of this vibrant content production. Content patterns will change as platforms expand, but the essential aspect of parents bonding over similar interests will stay the same. Brands that provide relevant, compelling information to assist in establishing such relationships will succeed.

Increase adoption of connected devices to have Domino


Rockville, Nov. 23, 2022 (GLOBE NEWSWIRE) — According to new industry analysis by Fact.MR, a market research and competitive intelligence provider, the global Electronic Design Automation (EDA) software market ) is expected to exceed a valuation of US DOLLARS$ 11.2 billion in 2023 and grow to a Large Value CAGR of 8.6% until 2033.

An explosion in the use of IoT devices can be attributed to the perfect storm of technological and societal change; there is a growing demand for IoT solutions in most IoT end markets. Global IoT connections grew by 8% in 2021, representing 12.2 billion active end users, representing many opportunities for businesses.

Download a sample copy of this report:


Smartphones, wearables, televisions, and smart home systems are some of the established IoT devices that have grown from niche sectors to being widely discussed and adopted. The incorporation of integrated circuits in all these consumer electronic devices is expected to drive the EDA software market. Vast developments in the processing power and miniaturization of smart connected devices will usher in a new era for electronic design automation software vendors.

Key insights from market research

  • By type, design EDA software is expected to remain the most attractive vertical in the global market and represent a valuation of US$4.3 billion in 2023.
  • Based on deployment, web-based EDA software is expected to be valued at US$7.3 billion in 2023 and hold a market share of 65.4%.
  • Europe is expected to generate a valuation of US$3 billion in 2023.
  • The North American market is expected to witness a CAGR of 8.5% during the forecast period.
  • The United States is expected to hold a 23.7% share of the global market.
  • China is expected to generate a valuation of US$1.5 billion in 2023 and post a CAGR of 8.1% through 2033.

Competitive landscape

Major EDA software vendors in the world are Aldec, Inc., Altair Engineering Inc, Altium Limited, ANSYS, Inc, Cadence Design Systems, Inc., ELECTRO-SYSTEM CO.LTD, EMA Design Automation, Inc, Faraday&Future Inc, Intel Corporation, Intercept Technology, Keysight Technologies, Microsemi, Pulsic Limited, Siemens, Silvaco, Inc., Synopsis, Inc., Tabula, Taiwan Semiconductor Manufacturing Company Limited, WestDev 2022 and Zuken.

These key manufacturers are constantly innovating software to meet the modern challenges of producing electronic systems due to the rise of VLSI systems.

In February 2022, Intel announced a partnership with the world’s largest EDA software companies, Siemens EDA, Ansys, Cadence, and Synopsis under the “IFS Acceleration” program to create an ecosystem to support and nurture its new foundry service business. This association will allow software vendors to fine-tune their chip design software for Intel’s latest process and packaging technologies.

Fact.MR provided detailed information on the service offering of leading EDA software vendors positioned across all regions, sales growth, deployment scale, and speculative technology expansion, in the recently released report.

Get customization on this report for specific research solutions:


Market development

Several software vendors offer electronic design automation software, making the market highly competitive. Software vendors are leveraging the customization of their offerings to meet the dynamic demand of dynamic end users.

  • Synopsys, a leading U.S. electronics design automation company, launched its cloud-optimized electronics design automation deployment model in March 2022 that provides chip and system design flexibility to customers. unparalleled levels with the help of a single source. The software provider’s cloud-optimized design and verification tools will be available through Synopsys Cloud with a pre-optimized infrastructure on “Microsoft Azure”, which will be able to solve complex chip development issues.
  • In August 2022, Siemens announced its expansion of early design verification solutions for the Caliber platform for integrated circuit verification. The extended technology in the EDA space aims to provide users with the latest technologies needed to rapidly deliver world-class silicon products.

Get full access to the full report:


EDA Software Industry Research Segmentation

  • By type:
    • Simulation
    • Design
    • Verification
  • By operating system:
  • By source code:
    • open-source
    • Owner
      • Perpetual (one-time license)
      • Subscription
  • Per Deployment:
  • By end use:
    • Education and formation
    • Professional
      • Aerospace and Defense
      • Automation and robotics
      • Automotive
      • Discreet manufacturing
      • Electrical and Electronic
      • Health care devices
      • IT & Telecommunications
      • Semiconductor industry
      • Others
  • By region:
    • North America
    • Latin America
    • Europe
    • East Asia
    • South Asia and Oceania
    • AEM

More valuable information available

Fact.MR in its new offering presents an unbiased analysis of the global Electronic Design Automation Software Market, showcasing historical market data (2018-2022) and forecast statistics for the period 2023-2033.

The study reveals essential information on the basis of type (simulation, design, verification), operating system (Windows, MAC, Linux, Unix), source code (open source, proprietary (perpetual (single license), subscription) ), deployment (standalone, web-based) and end use (education and training, professional, aerospace and defense, automation and robotics, automotive, discrete manufacturing, electrical and electronics, health devices, IT and telecommunications, industrial semiconductors, other), in six major regions (North America, Latin America, Europe, East Asia, South Asia and Oceania, MEA).

Check out other related studies published by Fact.MR Research:

Digital Marketing Software MarketThe global digital marketing software market is expected to reach US$65 billion in 2022, which is expected to reach US$370 billion by 2032. The expected growth rate is 19% from 2022 to 2032. The expansion of the market can be attributed to the growing preference for mobile phones to get information on the go.

data mining software marketHigh demand for advanced business intelligence tools and the shift towards artificial intelligence and machine learning technologies are the major drivers for the growth of the data mining software market. Growing need of organizations across all industry sectors to obtain valuable insights into data generated by different business processes, advancements in technology and use of cloud-based solutions is expected to drive the growth of the software market. data mining.

Productivity Management Software MarketThe global productivity management software industry was valued at USD 47 billion in 2021 and is expected to grow at a steady CAGR rate of 13.7% during the forecast period. Based on this growth rate, this industry can be predicted to reach a market size of US$192.96 billion by 2032.

Clientless Remote Support Software MarketGlobal clientless remote support software market is estimated to be worth USD 1.7 billion in 2022 and is expected to exceed USD 6.7 billion by 2032, growing at a CAGR of 14.5% from 2022 to 2032 The global clientless remote support software market accounted for approximately 1% of the global ICT market in 2021. The global clientless remote support software market is estimated to have an absolute opportunity of USD 5.0 ​​billion over the forecast years 2022-2032.

Public Safety Software MarketThe global public safety software market reached a valuation of approximately US$7 billion in 2020 and is projected to grow at a CAGR of 11% to reach US$20 billion by 2031. by computer is expected to grow at a CAGR of 9% over the assessment period from 2021 to 2031. According to detailed industry analysis, by 2031, global sales of public safety software will account for 2.1% of the market overall software.

About Fact.MR

Fact.MR is a market research and advisory agency with deep expertise in emerging market intelligence. Covering a wide range – from automotive and industry 4.0 to healthcare, technology, chemicals and materials, even to the most specialized categories. We are committed to providing information that helps companies better understand their target markets. We understand that making sense of the vast maze of data can be overwhelming for businesses. That’s why focus on offering information that can really make a difference in terms of results.

Specialties: Competitor Tracking, Custom Research, Syndicated Research, Investment Research, Social Media Research, Business Intelligence, Industry Analysis, Thought Leadership.

USA sales office
11140 Rockville Pike
Office 400
Rockville, MD 20852
United States
Such. : +1 (628) 251-1583, +353-1-4434-232
E : [email protected]
Follow us: LinkedIn | Twitter | Blog

NASA capsule buzzes the moon, last big step before lunar orbit


NASA’s Orion capsule reached the moon on Monday, whipping across and buzzing the lunar surface on its way to a record-breaking orbit with seated test dummies for the astronauts.

It’s the first time a capsule has visited the Moon since NASA’s Apollo program 50 years ago and marks a milestone in the $4.1 billion test flight that began last Wednesday.

Video of the looming moon and our pale blue planet more than 230,000 miles (370,000 kilometers) away has left workers ‘stunned’ at Johnson Space Center in Houston, home to Mission Control, according to flight director Judd Frieling. Even the flight controllers themselves were “absolutely amazed”.

“Just smiles on all levels,” Orion program director Howard Hu said.

The 81-mile (130-kilometre) close approach occurred while the crew capsule and its three wired dummies were on the far side of the moon. Due to a half-hour communications blackout, flight controllers in Houston were unsure if the critical engine burn had gone well until the capsule emerged from behind the moon. The capsule’s cameras returned an image of Earth – a small blue dot outlined in black.

The capsule accelerated to well over 5,000 mph (8,000 km/h) when it regained radio contact, NASA said. Less than an hour later, Orion flew over Tranquility Base, where Neil Armstrong and Buzz Aldrin landed on July 20, 1969. There were no photos of the site because the pass was in the darkness, but officials promised to try to take photos during the return flyby. in two weeks.

Orion had to launch a slingshot around the moon to gain enough speed to enter the swept and unbalanced lunar orbit. Another engine fire will place the capsule into that orbit on Friday.

Next weekend, Orion will break NASA’s distance record for a spacecraft designed for astronauts – nearly 250,000 miles (400,000 kilometers) from Earth, set by Apollo 13 in 1970. And it will go on, reaching a maximum distance from Earth next Monday at nearly 270,000 miles (433,000 kilometers).

The capsule will spend nearly a week in lunar orbit before returning home. A Pacific splashdown is scheduled for December 11.

Orion does not have a lunar lander; a landing won’t come until NASA astronauts attempt a lunar landing in 2025 with SpaceX’s Starship. Before that, astronauts will tether to Orion for a moon tour as early as 2024.

Mission lead Mike Sarafin said he was pleased with the progress of the mission, giving it an “A-plus cautiously optimistic” so far.

The Space Launch System rocket — the most powerful NASA has ever built — performed extremely well in its early days, Sarafin told reporters. He said the teams are facing two issues that require workarounds – one involving the navigational star trackers, the other the power system.

The 322-foot (98-meter) rocket, however, caused more damage than expected on the launch pad at Kennedy Space Center. The force of the 8.8 million pounds (4 million kilograms) of liftoff thrust was so great that it ripped the elevator’s blast doors off, rendering it unusable.

Sarafin said the pad damage will be repaired long before the next launch.

New framework for CBWs – overhaul or missed opportunity? – Comment




The April 2021 Development and Regulatory Policy Statement of the Reserve Bank of India (RBI) noted the growth of Asset Reconstruction Companies (ARCs) and that “their potential for resolving stressed assets is not not yet fully realized”. The statement proposed the creation of a committee to review the regulatory framework for CRAs and “recommend appropriate measures” to enable CRAs “to meet the growing demands of the financial sector.” On October 11, 2022, the RBI published a revised regulatory framework for CRAs, introducing measures “to enhance transparency in the CRA industry and improve corporate governance standards in CRAs”.


Previously, CRAs were required to invest up to a minimum amount of 15% in each Security Receipt (SR) scheme. The revised regulatory framework now requires CRAs to invest at least 15% of a transferor’s investment in SRs or 2.5% of total SRs issued, whichever is greater. To encourage broader participation, an SR offering document should also disclose:

  • a summary of the ARC’s financial information for the previous five years or since it began operations (whichever is shorter);
  • history of returns generated on SRs issued over the previous 8 years; and
  • history of recovery ratings migration and engagement with credit rating agencies over the past 8 years.

It is mandatory for CRAs to obtain a recovery rating for SRs and must also disclose the rating and rationale for the rating to SR holders. A CRA must retain the services of a credit rating agency for a minimum period of six rating cycles (of six months each).

The previous regulatory framework allowed CRAs to develop a board-approved policy for the settlement of debts and delegate authority to a committee or identified officials to make decisions on such proposals. From now on, debt settlement proposals should be reviewed by an independent advisory committee (IAC), which must be composed of professionals with a technical, legal or financial background. The IAC will provide recommendations to the ARC Board after reviewing factors such as the borrower’s financial condition, time to collection, and earnings and cash flow forecasts. The board – which must be made up of at least two independent directors – will review the recommendations of the ARC and then decide on the proposal for payment of dues. Payment of dues should only be considered after all other collection options have been taken and there is no longer any prospect of collection. The revised regulatory framework provides that the management fee can only be levied on the amounts recovered from the assets managed by the ARC. In addition, the board-approved fee policy should also establish the cap on management fees and incentives. Any deviation from the above would require Board approval.

CRAs are also now permitted to participate as “Resolution Seekers” in a resolution process under the Insolvency and Bankruptcy Code 2016. Reports in the public domain indicate that previously the RBI n was not inclined to allow CRAs to act as resolution seekers on the grounds that such activities were not contemplated under the Securitization and Reconstruction of Financial Assets and Enforcement Act 2002 securities. To participate as a resolution applicant, a CRA must have a minimum net fund of 10 billion Indian rupees (approximately $121.9 million) and must also fulfill other requirements such as having a policy approved by the board of directors on participation as a candidate for the resolution and a committee composed of a majority of independent directors to make decisions on this participation.


While the decision to allow IECs to participate as candidates for the resolution was welcomed in some circles, its impact can only be determined over time. The revised regulatory framework does not address operational aspects such as debt aggregation, measures to encourage the participation of debt capital markets in SRs, improving the negotiability of SRs or improving resolution-enhancing actions, such as changing the management of a borrower or providing protection for IRCs from routine procedures that may delay the resolution process. Perhaps, in the absence of a complete overhaul of the statutory framework, the RBI’s measures would only move things forward and not spearhead progress.

For more information on this subject, please contact Aditya BhargavaWhere Sristi Yadav to Phoenix Legal by telephone (+91 22 4340 8500) or by e-mail ([email protected], [email protected] Where [email protected]). The Phoenix Legal website can be accessed at www.phoenixlegal.in.

2024 Mercedes E-Class gives us first undisguised look at front and interior


We’ve seen the upcoming 2024 Mercedes tests a few times, but a new batch of leaked photos from China reveal the parts the automaker was working the hardest to keep secret.

As you’d expect, the new front end looks a lot like the S-Class. The heavily chromed grille is strongly reminiscent of the larger sedan, and the overall shape is slightly hexagonal, as revealed in these photos, released for the first time. times by Autohome and Xincheping. The headlights combine with the grille to form a winged shape, like on other modern Mercedes models.

The dashboard has been revealed almost entirely, giving us our first glimpse of a large, square infotainment system, a move away from the portrait-style unit we saw in the S-Class, and a screen of rectangular instruments. Above the infotainment screen, thin vents can be seen running across the entire dash in a long line that curves near the passenger door.

More: The 2024 Mercedes E-Class ditches its disguise and shows off its sleeker new bodywork

Picture Xincheping

Previous spy shots have shown most of the rest of the exterior. On the sides of the new E-Class, a line of characters can be seen running near the windows. The line, however, is broken in the middle of the vehicle. The model also appears to be longer than it was before.

The rear of the 2024 E-Class remains the last part of the vehicle that we’ve only seen in camouflage. From what we know, however, a slender light bar extending to the rear seems likely, and a new bumper design should help differentiate this model from the one it replaces.

CarPix Photos for CarScoops

Under the hood, we expect a variety of different options, including a 2.0-litre turbocharged four-cylinder engine, a 2.0-litre diesel and a plug-in hybrid powertrain.

The 2024 Mercedes E-Class is expected to be unveiled in early 2023 and will be followed by another plug-in hybrid, the E53 E-Performance, which is expected to produce around 671 PS (500 kW / 680 hp) and 553 lb-ft (750 Nm) of torque .

more pics…

3072-bit key length: extra strength for code signing certificate


As data becomes a critical asset and data breach incidents increase, software becomes a critical factor for both. And to secure it, Code signing certificate is a core component used by software vendors.

Developers recently used certificates with a key length of 2048 bits. But, in 2021, a new policy was enacted requiring CAs to issue code-signing certificates with a key length of 3072 bits. The primary objective of defining such a standard was to enhance security. Additionally, there are many other aspects that a developer or security enthusiast should understand about such a change. So, let’s take a look.

What is the key length of 3072 bits?

Every time a software developer uses code signing certificatee, a pair of private and public keys come into action. The two keys work in correspondence and provide encryption and decryption functionality respectively. And it has different key length, such as 1024 bit, 2048 bit, 3072 bit and 4096 bit.

Bits represent the length of a key, helping publishers determine the security of the certificate: the more bits, the less likely there is to face a cyberattack. With a higher bit count, you can create additional unique alphanumeric combinations, preventing the hacker from violating and reading the source code.

Currently, cyberattacks have increased, due to which NIST sets the guidelines for the 3072-bit user encryption standard. In addition, from June 2021, it has become mandatory for each CA to issue a code signing certificate if its CSR is in a 3072-bit encrypted format. There are several reasons for imposing such regulations. So, let’s take a look at them.

Why CAs are moving from 2048-bit to 3072-bit key length

There are several reasons CAs issue code signing certificates with a key size of 3072 bits. And below is the main logic for such a change:

  • To comply with NIST and CA/Browser guidelines, CAs are beginning to issue code signing certificates with a key size of 3072 bits. It also helps the publisher comply with the latest standards and prevent lawsuits.
  • To enhance overall security. A protected 3072-bit file is more complex to break than a 1024-bit and 2048-bit file. Therefore, to provide state-of-the-art security solutions, CAs are seamlessly transitioning to the new NIST standard.
  • 3072-bit encryption is more advanced than the traditional 2048-bit mechanism, offering over 60,000 unique combinations to make code unreadable to attackers, hackers and crackers.
  • To maintain reputation and standing in the industry, CA/B Forum and certificate providers agree to offer solutions with the 3072-bit standard. They must ensure user security to improve user trust, productivity, and revenue.

The impact of the 3072-bit length on the code signing certificate

With the implementation of the standard to use 3072-bit encryption, users of the code signing certificate have seen a solidification of code security. Source code violations are reduced because hackers cannot convert source code to its original format and modify it.

Moreover, cracking a 3072-bit encrypted file requires significantly more computational resources than breaking the 2048-bit encryption. Therefore, it reduces the likelihood of being attacked and raped quickly. The attacker will have to plan his attack more precisely. However, you can disable any illegitimate long-term planning if you audit and update your security systems frequently.

Similarly, code signing certificates, SSL certificates are also offered with the same bit configuration. And, if you use both certificates, aligning with the latest security approaches, cyberattacking your software will be next to impossible.

Therefore, the certificate provider and the users analyze a positive change with the modification of the key length.

Can any software publisher purchase a code signing certificate with a 3072-bit key?

YES, any software vendor can benefit from the 3072-bit encryption standard. You just need to purchase and complete the validation process of the certificate providing such functionality. Whether you are a individual developer or a business, getting a certificate with such advanced functionality is a seamless task.

You can also check the current private key version of any certificate by following the steps below:

Step 1: Select a executable or software configuration file.

2nd step: Double-click the file to let the system run it and display a dialog box.

Step 3: Click on More details and you will be given the option to view the code signing certificate.

Step 4: A new dialog box will open, displaying the certificate details. It will have three tabs, General, Details and Certificate Path.

Step 5: Switch to the Details tab and scroll down to the Public key option. You will know whether the software is following the 2048-bit key or the new 3072-bit key standard.

To make your code tamper-proof and ensure its integrity, you need to buy it from a genuine vendor.

Best code signing certificate provider, offering solutions that comply with the latest standards

Confidentiality and data integrity is a major concern for any software publisher. And the code signing certificate is an essential element to maintain them. Therefore, you should always purchase a certificate from a reliable provider, such as SignMyCode.

Additionally, you must follow the checklist below before finalizing your supplier.

  • The seller must offer support services, available 24 hours a day, 7 days a week.
  • Free tools for generating CSR should be available on the supplier’s website.
  • The vendor should offer a wide variety of code signing certificates.
  • If the distributor is an authorized CA partner, like SignMyCode, it’s a good deal.
  • The vendor should provide plenty of guides and resources to help with certificate setup.


Implementing 3072-bit encryption for the code signing certificate is the right decision of the CA/B forum. With advances in technology and security, it’s essential to always have a solid foundation. The 3072-bit mechanism uses a more complicated mathematical algorithm than the 2048-bit. As a result, cyberattacks are avoided and publishers provide secure software.

Additionally, from mid-2021, all CAs will provide certificates with a key length of 3027 bits. And you should only use one certificate with the same configuration to appear in the top rankings.

The post office 3072-bit key length: extra strength for code signing certificate appeared first on SignMyCode – Blog.

*** This is a syndicated blog from the Security Bloggers Network of SignMyCode – Blog Written by SignMyCode – Blog. Read the original post at: https://signmycode.com/blog/what-is-3072-bit-key-length-in-code-signing

RBI is working with ICRIER to develop a food inflation projection framework

The Reserve Bank of India (RBI) is working with the Indian Council for Research on International Economic Relations (ICRIER) to develop a food inflation projection framework as the central bank seeks to rely more on an advisory approach to collect first-hand data and improve policy responses.

“Many retrospective models, which operate on past data, may not provide useful information and estimates for policy. The department (economic and policy research) still needs to strengthen its consultative approach to collect first-hand information directly from stakeholders,” RBI Governor Shaktikanta Das said.

He also suggested consultative approaches in other areas of research.

“There is an increasing use of big data and data generated by private sources for policy research. We cannot escape the fact that data is the new oil. The ministry may need to look at all this data, bearing in mind ways to deal with the misleading information and noisy analysis that such data can sometimes generate,” he said at his annual research conference in Hyderabad on Saturday. He said the pandemic has forced researchers to explore and harness the power of Big Data and enhance direct feedback mechanisms while working from home.

The department will repeat a national survey of farmers, retailers and wholesalers next month to understand the changes brought about by the pandemic.

Speaking of food and other critical inputs, Das highlighted the need to explore different sources in the context of war in Europe which has led to severe food crisis and energy crisis worldwide.

“A new risk has emerged in the form of a fragmentation of the global economy, driven by rapidly changing geopolitical considerations, which have underscored the need to reduce reliance on a single source of critical supplies,” he said. he declared.

Taylor Swift: Ticketmaster fiasco “excruciating for me”


New York
CNN Business

Taylor Swift spoke on Friday about the box office debacle that took place this week, as many fans were unable to purchase tickets for his upcoming tour on ticket master.

“It goes without saying that I am extremely protective of my fans,” Swift wrote on instagram Friday. “It’s really hard for me to trust an outside entity with those connections and loyalties, and excruciating for me to just watch mistakes happen without recourse.”

Swift blamed Ticketmaster for the snafu, noting that there were a “multitude of reasons people had such a hard time” getting tickets.

“I’m not going to excuse anyone because we’ve asked them many times if they can handle this kind of request and we’ve been assured they can,” the singer wrote. “It’s really amazing that 2.4 million people got tickets, but it really pisses me off that a lot of them feel like they’ve suffered multiple bear attacks to get them.”

Swift added that she would try to “understand how this situation can be improved in the future.”

Sales for the singer’s new Eras tour began on Tuesday, but high demand rumbled the ticketing site, exasperating fans who were unable to obtain tickets. Customers complained about Ticketmaster not loading, saying the platform wouldn’t let them access tickets even if they had a presale code for verified fans.

On Thursday, Ticketmaster announced that the sale to the general public, which was due to begin on Friday, had been canceled due to “extraordinarily high demands on the ticketing systems and insufficient remaining ticket inventory to meet this demand”.

“To those who didn’t get tickets, all I can say is that I hope to give us more opportunities to come together and sing these songs,” Swift added.

Ticketmaster’s troubles began on Tuesday, when the site launched a sale for “verified fans” – a mechanism to weed out bots that give presale codes to individuals.

The ‘verified fan’ platform was created in 2017 to help Ticketmaster handle huge demand situations, but as more than 3.5 million people pre-registered to be a Swift ‘verified fan’, the system was submerged. It’s the biggest check-in in the company’s history, according to Ticketmaster.

“Historically, working with ‘Verified Fan’ invite codes has worked because we were able to manage the volume coming into the site to purchase tickets,” the company wrote Thursday in a blog post that has since been deleted. “However, this time the sheer number of bot attacks as well as fans who did not have invite codes drove unprecedented traffic to our site.”

Ticketmaster noted that it “usually takes us about an hour to sell through a stadium show,” but the site has slowed some sales while delaying others to “stabilize systems.” It stopped everything.

The site appeared to have avoided major problems on Wednesday when presales began for Capital One credit card holders. But the company’s inability to keep up with demand for Swift’s tour as well as a lack of tickets to meet the additional demand essentially killed Friday’s scheduled sale to the general public.

Fans blamed Ticketmaster while others, including members of Congress, strongly criticized the company’s control over the live music industry.

“Ticketmaster’s strength in the core ticket market insulates it from the competitive pressures that typically drive companies to innovate and improve their services,” said Senator Amy Klobuchar. wrote in an open letter to its CEO on Wednesday. “It can lead to the kinds of dramatic service outages we’ve seen this week, where consumers are the ones paying the price.”

Senator Richard Blumenthal echoed Klobuchar’s concerns, tweeting that the tour “is a perfect example of how the Live Nation/Ticketmaster merger hurts consumers by creating a virtual monopoly.”

“I have long urged the DOJ to investigate the state of competition in the ticketing industry,” he said. said. “Consumers deserve better than this anti-hero behavior.”

Taylor Swift begins her new tour next March.  It hits 52 stadiums across the United States.

The backlash also highlighted the enormity of Swift’s popularity

The pop star has had countless hits over the course of her career, built up an ultra-loyal following of fans – better known as “Swifties” – and recently became the first artist to claim all 10 simultaneously. top spots on the Billboard Hot 100 after the release. from his latest album, “Midnights”, released last month.

His Eras Tour – which kicks off in Glendale, Arizona on March 17 and ends in Los Angeles on August 9 – hits 52 stadiums across the United States.

Ticketmaster noted Thursday that more than two million tickets were sold out on Tuesday for Swift’s upcoming tour – the most ever for an artist in a single day. The company also said ticket demand for the Eras Tour was twice that of the top five tours of 2022 and the Super Bowl. combined.

“Based on the volume of traffic to our site, Taylor would need to perform over 900 stadium shows (nearly 20 times the number of shows she does),” Ticketmaster wrote Thursday. “It’s a stadium show every night for the next 2.5 years.”

Tickets for Swift’s upcoming tour have also drawn astronomical prices on ticket resale sites, with some tickets being listed for tens of thousands of dollars.

Since her debut album in 2006, Swift has also established herself as a cultural icon with immense influence in getting things done in the industry. She has taken on music streaming services like Spotify

and Apple Music regarding artist compensation and is is currently re-recording his songs to reclaim his masters.

In many ways, just like Swift, so is the music industry.

Serona Elton, music industry professor at the University of Miami’s Frost School of Music, further explained Swift’s popularity noting her success in music sales and touring. Most music is now consumed via streaming, she said, which is more popular among younger generations who skew slightly towards women.

“The demographic group that generates the highest percentage of music consumption is seen in her and is closely tied to what she sings,” she said.

Engine Oil Change Market Competitor Analysis, Winning Strategies


Engine Flushing Market

Engine Flushing Market: Introduction

The engine is an essential part of a machine, which produces mechanical energy, imparting movement to vehicles. In order for the engines to have high efficiency, it is necessary to change the engine oil at regular intervals. The primary function of engine oil is to maintain lubrication in the crankshaft and to maintain cooling in the engine. At high temperatures, engine oil carbonizes and forms sludge, which is contaminants. Contaminants such as sludge, tar, and other harmful contaminants continue to move through the engine bay causing wear resulting in reduced lubrication. Changing oil from a contaminated engine will only result in poor efficiency. Therefore, to remove these harmful contaminants before changing the oil, an engine flush is used.

To stay “ahead” of your competitors, request a [email protected] https://www.persistencemarketresearch.com/samples/11761

Engine flushing market: dynamic

The global engine flushing market is primarily driven by the growing demand for engine cleaning, which otherwise stagnates engine performance. Engine flushing is a quick cleanser and removes contaminants by dissolving them, which further propels the global engine flushing market.

In addition, engine flushing helps to increase fuel efficiency and improves engine life, which further accelerates the global use of engine flushing in automobiles and hence the growth of the engine flushing market . However, flushing the engine when used with strong chemicals damages rubber seals and gaskets. This might limit its usage and thus hamper the growth of the engine flushing market.

Engine Flushing Market: Segmentation
engine type basis

Petrol engine
Diesel motor

basis of engine oil type

Mineral oil
Semi-synthetic oil
Fully synthetic oil

application basis

industrial equipment

For critical information on this market, request customization here @ https://www.persistencemarketresearch.com/request-customization/11761

Engine Flushing Market: Regional Outlook

The global engine flushing market is segmented into seven regions, namely North America, Latin America, Asia-Pacific ex Japan (APEJ), Western Europe, Eastern Europe East, Japan and the Middle East and Africa (MEA). North America holds the major share of the global engine flushing market, as the usage of vehicles and other machinery, which requires engine oil, is higher in this region.

Thus leading to a demand for engine flushing among consumers in the region. North America, APEJ and Japan follow in engine flush consumption, where the growth is attributed to the increased use of automobiles and other manufacturing industries, which require oil flushing for engine flushing. engine cleaning.

As Western Europe is dominant in the industrial development, an increase in the consumption of engine flushing is expected during the forecast period. In the MEA region, Saudi Arabia is the global leader in the production and export of oil to various countries, where engine flushing is mainly used in the transportation and industrial sector, thus driving the growth of the market engine flushing.

Buy the full report now and get up to 20% off @ https://www.persistencemarketresearch.com/checkout/11761

Engine oil change market: key players

Some of the key players identified in the global engine flushing market include:

International Lubricants, Inc.
BARDAHL manufacturing company
Petra Oil Company, Inc.
Rymax Lubricants
penite oil
Raaj Unocal Lubricants Limited
Ashland Inc. (Valvoline)

Persistence Market Research
Address – 305 Broadway, 7th Floor, New York, NY 10007 USA
Telephone in the United States – +1-646-568-7751
USA-Canada Toll Free – +1 800-961-0353
Sales – [email protected]

About Us: –
Persistence Market Research (PMR), as a third-party research organization, operates through a proprietary fusion of market research and data analytics to help businesses soar no matter the turbulence encountered due to financial/natural crises.

This press release was published on openPR.

Hardnine Choppers presents Custom Indian Scout Rogue at EICMA 2022


Indian has entered the club-style performance cruiser segment with its 2022 Indian Scout Rogue. While the model’s quarter fairing, mini apes, single seater, 19-inch front wheel and color blackened adhere to the Sons of Anarchy pattern, the Rogue mostly conforms to the standard Scout pattern.

To push the performance boundaries of the variant, longtime Hardnine Choppers collaborator and builder Danny Schneider got his hands on an all-new Rogue. With a background in Freestyle Motocross, the Bern, Switzerland-based customizer was the perfect partner for the project.

“My idea when I first saw the Scout Rogue, I really liked it, was performance racing – that’s where I come from – I really wanted to design it to suit my riding style. hard and we did everything we can with performance parts,” Schneider revealed. “We started with Öhlins front forks and Öhlins rear shock, the suspension is the most important thing for me coming from a motocross environment.”

However, not all components were plug-and-play. Schneider modified the bike’s triple clamps to accept the new front end and adapted the headlight cowl to work with the ProTaper sport handlebar. A set of Roland Sands Design follow-on wheels replace the stock units, but Schneider also had to create custom brackets to accommodate the Beringer calipers and front master cylinder.

Chief Hardnine even turned to Beringer for a matching clutch lever, but the quick Dynojet shifter pretty much makes that addition obsolete. The Rogue can maintain the Scout’s 94 horsepower and 71.5 lb-ft of torque, but the Jekill and Hyde 2-into-1 exhaust unleashes the full roar of the 1,133 V-twin. To save precious pounds, Schneider is went so far as to reduce the primary cowl to its minimum dimensions.

After all that performance preparation, the Hardnine crew have sided with a King of the Baggers-inspired livery to underline the Scout Rogue’s sporting aspirations. Schneider and Indian then presented the project at EICMA 2022, showing all of Europe the personalized potential of the platform.

Supernova wants to make it easier to move design elements to codebases • TechCrunch


As companies increasingly turn to tools like Figma to design their software, moving design elements such as color schemes from the design tool to your codebase can be a time-consuming, manual process. .

Supernova is an early-stage startup that wants to make it easier for you by acting as a bridge between your design team and your development team, making it easier to automate changes to design elements.

Today, Y Combinator graduates announced a $4.8 million seed round.

“The idea of ​​Supernova comes from the divergence between designers and developers. There is, I think, a kind of communication blockage between them. Also, the design and development worlds are quite disconnected one on the other, and so anything you can do to help designers and developers work together better actually goes a long way, and that’s especially true in large organizations,” said the company’s CEO and co-founder Jiri Trecak told TechCrunch.

The software acts as a sort of bridge, connecting your various design tools and repositories with your coding tools to make it easy to connect all these tools at scale. Additionally, if you have a particularly complex workflow, you can build custom apps or scripts on top of Supernova to extend the tooling even further, Trecak explained.

He says an easy way to understand how it works is to imagine you have a brand like Spotify and need to change your logo color from the familiar green to a new color. A business like this would take months to do manually, but with Supernova you just need to change your color scheme in your design tools and run the scripts, and it will ripple through the entire base of code, automatically changing the colors.

He said it could work with multiple design tools and that Supernova would still move changes regardless.

He launched the company in the Czech Republic in 2018 and became the first startup from that country to be accepted into Y Combinator in the winter of 2019. Today, Trecak runs the company from San Francisco and the company launched the current iteration of the product last year. The engineering team remains in the Czech Republic.

They have built a user base of over 1,000 customers, several dozen of which are large enterprises. The company currently has around 30 people, with plans to increase that number with the new funding.

As he grows the business, Trecak says he is very focused on building a diverse employee base and currently has employees who represent eight or nine different nationalities. “It’s something that’s really our priority. We’ve tried to be pretty diligent about it and we’ll try to be even more diligent when we go into the US market,” he said.

Today’s funding was led by Wing Venture Capital with participation from EQT Ventures and Kaya VC, as well as several prominent industry angels.

Benchmark Expands Staff and Facilities to Meet Demand


SAN FRANCISCO – Benchmark Space Systems has nearly tripled its staff and established manufacturing facilities to produce up to 1,000 engines in the United States and United Kingdom over five years.

Benchmark has recorded over 250 engine orders. Most engines are built and tested at the company’s headquarters in Burlington, Vermont. However, the company also has manufacturing and testing facilities in California and the UK.

The baseline headcount has grown from 30 to 83 over the past 12 months. Key new hires include Wesley Grove, chief operating officer, Matt Bradley, vice president of finance, and Kent Frankovich, vice president of electric propulsion.

While increasing its manufacturing capacity, Benchmark expanded its guidance, navigation and control software engineering organization. This organization focuses on thrusters, positioning subsystems, and SmartAIM guidance, navigation, and control software for satellites equipped with Benchmark’s Halcyon high-test peroxide thrusters and Xantus metallic plasma thrusters.

Benchmark ready to start manufacturing a propulsion system in the UK Benchmark announced plans in May to establish a manufacturing and test facility at the Westcott Innovation Centre. Working with UK-based Satellite Applications Catapult, Benchmark was able to set up its assembly and cleanroom in the UK in less than six months.

In the UK, Benchmark will begin producing Halcyon Avant bipropellant systems for Space Forgea Wales-based company that focuses on producing high-value materials in orbit to bring to Earth.

Reference demonstrated for the first time its chemical propulsion on an undisclosed government satellite in 2021. Since then, the company has demonstrated its “breakthrough chemical, electric and hybrid propulsion systems,” Benchmark CEO Ryan McDevitt said in a statement.

As a result, Benchmark will fill “major engine orders” in the coming months, McDevitt said. “Benchmark is signing major contracts to enable mission-critical government and commercial space programs, and we have the people and infrastructure in place to meet the exciting demand,” he added.

Mark Arthur, Benchmark’s director of European operations, called Benchmark’s UK facility an “important piece” of the company’s global strategy.

“We are now very well positioned to meet the specific needs of the European space market with bespoke chemical, electric and hybrid propulsion solutions,” Arthur said in a statement. “We plan to conduct our first hot trials early next year.”

The latest news happening in Nigeria right now and the latest headlines from today’s newspapers


The country’s mainstream media and stakeholders, including civil society and non-media groups, will meet in Lagos on Monday to discuss an acceptable framework for regulating the media industry in the country.

The Executive Secretary of the Newspaper Owners Association of Nigeria (NPAN), Feyi Smith, said so in a statement, a copy of which was obtained by our reporter over the weekend from Abuja.

He explained that the move, aimed at building public confidence by establishing a credible adjudicative mechanism, was under the auspices of NPAN in collaboration with the Nigerian Editors Guild (NGE), Union of Journalists of Nigeria (NUJ) and Broadcasting Organizations of Nigeria (BON) and the MacArthur Foundation.

The statement said that “respected media guru and former governor of Ogun State, Chief Olusegun Osoba, will chair the roundtable. Other prominent leaders from practice, management, ownership, academia and media professionals, leaders from leading media NGOs, the bar, the legislature and the diplomatic corps are also expected.

“The theme of the roundtable would be: ‘Deepening media professionalism through co-regulation’, and the program would be in two sessions.

The first would be on “Reflections on co-regulation through an independent ombudsman framework”, the second session would examine “the revised draft of a new code of ethics for Nigerian journalists”.

The event would be held at Protea Hotel Ikeja Select, Alausa, Ikeja at 10:00 a.m.,
NPAN Chairman and Nigeria Press Organization (NPO) Chairman Mallam Kabiru Yusuf would be assisted by NGE Chairman Mr. Mustapha Isah; NUJ President, Chief Chris Isiguzo; President of BON, Mr. John Ugbe; Chairman of Broadcasting Organizations of Nigeria, Mr. Guy Murray-Bruce; Chairman of the IBAN and President of the Bar Association of Nigeria (NBA) Mr. Yakubu. C. Maikyau, SAN.

The others are Vanguard Newspapers editor Sam Amuka; ThisDay Newspapers and Arise TV Editor Prince Nduka Obaigbena; Former Newswatch Editor Ray Ekpu, Guardian Newspapers Editor Lady Maiden Alex-Ibru, Business Day Editor Frank Aigbogun, Punch Newspapers Chairman Ms Angela Emuwa, Channels TV Chairman John Momoh, Former Guardian Managing Director Lade Bonuola, Diamond Publications CEO Lanre Idowu, Managing Director of Vanguard Newspapers Gbenga Adefaye, Leadership Editor Azu Ishiekwene, CEO Daria Media and Radio Now Ms. Kadaria Ahmed, and Feyi Smith of NPAN, among others.

There’s another aftermarket fix for the Big BMW M4 grille


Ever since BMW launched this generation of BMW M4 (and its four-door sibling, the M3) in 2020, there has been no shortage of reviews. The comment sections of car sites on the internet are awash with scathing reviews and creative jokes about the design of the M4’s front end. So it’s no wonder that aftermarket tuning companies tried to fix the grille with new bumper kits. The latest brand to create an M4 grille patch is ADRO and it might be the best yet.

ADRO’s fix isn’t minor, it’s an all-new front bumper that only retains the original headlight design. With this new front bumper, a completely redesigned grille is shorter and wider than the original one, while being lower on the bumper. Not only is it smaller than the original grille, but its shape and location causes the front of the M4 to slope lower, towards the ground, giving it a sort of BMW shark nose feel, like an E24 generation 6 series.

It’s not just the grille that’s fixed, though. There are new front air intakes, wider than before, and a lower lip spoiler. The entire front end is wider and lower than stock, making the ADRO-assisted M4 more menacing than the standard car.

According to ADRO’s chief designer, Davis Lee, BMW has never missed the mark with its M3 and M4 designs until this one. However, Lee also said that the front design of this new M4 was “fundamentally wrong”. Lee has worked for Mercedes, helping to design the stunning Vision Mercedes-Maybach 6 concept, and Hyundai, as part of the design team that created the impressive Hyundai Ioniq 5. Lee clearly knows a thing or two about the good design and put his skills to work fixing BMW’s most recent mistake.

ADRO also offers further visual enhancements for the BMW M4. New side skirts, a gooseneck rear spoiler and a rear diffuser complete the more aggressive look. While the front bumper is made of injection molded TPO, the other elements are made of carbon fiber.

The whole kit will cost you $11,300, but if you just want to fix the front bumper, it costs $3,500. ADRO unveiled its M4 facelift at the 2022 SEMA show earlier this month and is accepting pre-orders now. If you pre-order any of these pieces, you also get a discount.

I’ve driven just about every configuration of the BMW M3 and M4 and they’re great cars. They’re fast, handle great, have grip for days, and are comfortable enough for everyday use. My only beef with them has been that grille design. If I owned an M3 or M4, this ADRO grille would be a must have.

Do you have any tip ? Send them to [email protected]

Andrew Tickell: Post office scandal has torn a small town in Scotland apart


If your employer produced digital evidence showing that you embezzled substantial sums of money from them, how would you prove that you did not? In principle, the burden of proof lies with the prosecutor. In principle, you do not have to prove your innocence. But faced with a seemingly unassailable printout detailing all the money the computer says is missing, what exactly will your defense attorney say?

A simple refusal is not enough. You could try to show that you haven’t lived on hogs, that you haven’t lived a life of luxury vacations and private jets. Unless you rip the source code, you look guilty as hell.

This was the predicament faced by over 730 deputy postmasters and postmistresses across the UK between 2000 and 2013. Designed by Fujitsu, the Horizon system was intended to fully digitize the transactions of the post office, registering all the money leaving a branch. . Conceived as a modernization and anti-fraud measure, Horizon would instead generate fraud on the criminal justice system on an unprecedented scale.

Horizon did not work. After the new accounting system was rolled out in 2000, deputy postmasters across the country began reporting problems and glitches in its operation. Money in store and money registered in the system do not balance each other. We’re not talking pennies and pounds here: Horizon has reported tens of thousands of people getting lost.

Until 2014, the Post claimed that “there is absolutely no evidence of systemic problems with the IT system which is used by over 78,000 people in our 11,500 branches and successfully processes over six million transactions every day”.

As subsequent litigation has now established, that was a lie. There was rampant evidence of “bugs, errors and flaws” in the Horizon software. It could have been just another story of incompetent public procurement – if the Post hadn’t treated Horizon’s evidence as gospel and used it to sue hundreds of its own postmasters in court for these phantom misses.

First, requests for money would be made. Sub-postmasters were contractually bound to make up any shortfall out of their own pockets. If they refused to pay, their branch would be closed the next day. But even as postmasters filled Horizon’s gaps, other audits often followed, identifying additional and larger sums of money missing. Some have been fired. Others have been prosecuted for theft, fraud and false accounting. Faced with seemingly irrefutable financial evidence, many postmasters pleaded guilty. Some have served substantial prison time.

What was the extent of Horizon’s prosecution in Scotland? Until this week, it was impossible to say for sure. When Sir Wyn Williams traveled to Glasgow in the spring of this year to hold hearings into the human impact of the postal scandal on Scottish deputy postmasters and mistresses, it was striking that none of the witnesses had not been prosecuted.

Their lives and their fortunes had been destroyed. Due to the Post Office’s false allegations of financial irregularities, many had accumulated substantial personal debts to cover shortfalls. Others spoke of the loss of pensions they had worked for for decades. Each lost their reputation in the communities they once served. But curiously, not a single postmaster who testified was taken to court by Scottish authorities.

This is a crucial difference in the anatomy of the post office scandal north and south of the border. In England and Wales, the Post Office has acted as alleged victim, investigator, plea bargainer and prosecutor in its Horizon cases. It was the Post Office that sent threatening letters to its alleged postmasters. It was the post office that embellished the indictments, accusing the post deputy masters of theft while promising that if they were willing to plead guilty to the lesser charge of false accounting, then business could be concluded. It was the Post Office that forced its former employees to cough up their savings to cover shortfalls, and it was the Post Office that insisted that Postmasters pleading guilty not mention any wrongdoing by Horizon in the pleas. mitigation made on their behalf. It was the devil’s business, but you can understand why so many postmasters agreed to the terms. What else were they supposed to do?

In Scotland, by contrast, the Crown Office and Procurator Fiscal Service has a functional monopoly over public prosecutions. La Poste is only a specialized reporting agency. Like HMRC, they can refer suspected crime directly to the tax prosecutor without police involvement, but the final decision whether or not to prosecute the suspect and why they should be prosecuted rests with independent prosecutors.

Which begs an obvious question: how many people in Scotland has the Crown prosecuted using Horizon’s evidence? So far, 75 convictions have been overturned in England and Wales, but the scale of the Scottish problem has remained fundamentally unclear.

This week, things got a little clearer. On Tuesday, the Scottish Criminal Cases Review Commission referred six cases to the Court of Appeal. They concluded that the convictions of Aleid Kloosterhuis, William Quarm, Susan Sinclair, Colin Smith, Judith Smith and Rab Thomson may have constituted miscarriages of justice.

In each case, the SCCRC concluded that “Horizon’s evidence was essential to proving the accounting deficit that led to the charges against them and that their prosecution was oppressive because the process was an affront to justice.” They also confirmed that five other cases are still under review.

The SCCRC cannot release its detailed reasons for referring the convictions to the Court, but the information they shared this week provides insight into where these prosecutions were brought and what kind of penalties these men and women faced. were accused of cooking the books. Of the six Scottish postmasters and mistresses, only Susan Sinclair pleaded “not guilty” at trial. The others pleaded, hoping to avoid jail. Of the six, four were given community sentences, while Judith Smith was admonished. Aleid Kloosterhuis was imprisoned for 12 months.

Campbeltown, Lochmaddy, Peterhead, Dunfermline, Selkirk, Alloa – reading the list of Sheriff Courts where these charges have been pursued, it is striking that these allegations have surfaced in rural and small town Scotland. One of the saddest dimensions of the scandal is how it stripped innocent people of their reputations, convincing former friends and neighbors that people were caught. Growing up in one, it’s easy to see how much more difficult it must have been in smaller communities, where everyone knows your name and anonymity is rare.

Digging through the fossil record – it’s striking that only one such lawsuit was reported in the media at the time – and it involved the only postwoman on the SCCRC list to have been sentenced to prison. In December 2012, the Daily Mail reported on the prosecution of Aleid Kloosterhuis. She was 54 when she pleaded guilty to stealing £20,000 from her Gigha post office branch. Originally from the Netherlands, Kloosterhuis moved to the island off the west coast of Kintyre with her husband and children. “She was welcomed into the community – but islanders were horrified to find that she had gradually siphoned off the profits,” the newspaper noted.

The discovery was attributed to “a surprise visit from the auditors of the Post Office”, but it was certainly not a careful reading of the books that drew Kloosterhuis into the net of suspicion – but the Post Office’s Horizon system. They expected to find £27,868 in cash and shares “but there was hardly any money in the safe”.

When sentencing Kloosterhuis, Sheriff Ruth Anderson pointed to the apparent breach of trust as an aggravating factor. “When you carried out the embezzlement, you were in a position of trust as an underpost of an island community.” In a grim echo of the destabilizing effect these convictions have had on the people and community caught up there, one resident described the conduct of Kloosterhuis as “harmful to the life and soul of the island”.

Robert Thomson – known as Rab – has since spoken to Scottish media about his case. He took over Poste Cambus in Alloa in the early 2000s. Thomson told BBC Scotland he had reported shortfalls from Horizon to Fujitsu, but that didn’t save him when a later audit claimed that he was short £5,700. Rab described the allegations as “the most embarrassing situation of my life”. It also embarrassed his elderly mother Margaret, from whom he had inherited the post office branch. The word got around. Ashamed, Margaret confined herself to the house. “I went to see mum one day and found her dead,” he said. He blames himself. “She didn’t want anything to go wrong with the family.”

The book about the Post Office scandal is a book of tragic stories like this – just ordinary people who got caught up in a nightmare, the trajectories of hundreds of lives forever changed. The mouth ulcer of this injustice will never really heal: the damage is done. But there can and must be justice and accountability for those who inflicted – and felt – this terrible wrong.

Travis Dye suffers season-ending injury in USC win over Colorado


The final dress rehearsal dragged on, with the final issues still being ironed out ahead of the back-to-back showdown in Crosstown next week, when Tuli Tuipulotu busted around the edge and closed the curtains on Colorado himself.

Little about the past month, apart from the number 8 affixed next to his name, had hinted USC was ready for the bright lights and big stage that awaited next week at the Rose Bowl. In consecutive games, California and Arizona had pushed the Trojans to the brink. Now Colorado, a Pac-12 doormat and one of college football’s worst teams, was pushing them too.

It wasn’t until Tuipulotu forced his way into a collapsing pocket and threw the ball away during Friday’s second quarter that USC found the courage to push back. He kept pushing and pushing and pushing from there, until his backups applied one final push for good measure in a Resounding victory 55-17.

USC defensive lineman Tuli Tuipulotu knocked down a pass from Colorado quarterback JT Shrout in the first quarter on Friday.

(Wally Skalij/Los Angeles Times)

After a frustrating first quarter, USC’s oft-maligned defense put on one of its most impressive performances in months, albeit against a team that has scored fewer than 128 other teams this season. He’s held Colorado to 158 yards over the past three quarters, taken three sacks and forced two turnovers.

Considering where their defense has been over the past few weeks, USC might have been buoyed by their easiest win in months, if their star running back hadn’t left the field Friday night on an injury cart.

Travis Dye had been one of the loudest voices in the Trojans dressing room all season, delivering a new pre-game talk every week to inspire the team. But as he lay on the grass during Friday’s second shift, cradling his left leg, the Colosseum crowd was silent. The USC sideline emptied as he was loaded onto a cart of wounded, and the crowd screamed as the cart rolled through the tunnel.

After, USC coach Lincoln Riley would confirm the worst: Dye will not return this season.

“It just sucks. There’s no other way to put it,” Riley said. “He was one of the key cogs in this team.”

And now, with its most critical stretch ahead, USC will have to carry on without the engine of its offense and the soul of its locker room. His first try? Matching the Pac-12’s best ground attack.

Trojans wide receiver Tahj Washington scores on a 61-yard touchdown against Colorado on November 11, 2022.

USC wide receiver Tahj Washington scores on a 61-yard touchdown catch in the third quarter.

(Wally Skalij/Los Angeles Times)

“Now we have a chance to reset,” Riley said, “and play these guys across town.”

It won’t be easy from here, even though USC made it look like this on Friday. Dye’s injury still weighed on the rest of Friday’s day, even as USC continued to roll without its running back. Whether he can move the ball as well next week without him would be another question.

If he has any hope of surviving UCLA and Notre Dame, after that Caleb Williams will almost certainly have to carry an even heavier load than usual. He wasn’t at his best on Friday, completing just 50 percent of his passes (14 of 26) for 268 yards and three touchdowns.

USC's Korey Foreman (0) gets excited after making a tackle for a loss to Colorado on November 11, 2022.

Trojans’ Korey Foreman (0) gets fired up after making a tackle for a loss to Colorado.

(Wally Skalij/Los Angeles Times)

It will also be up to Austin Jones to fill the void in the USC backfield. He finished with 113 all-purpose yards and a touchdown after replacing Dye. Both will need to be at their best against a stingy UCLA defense.

Nothing about USC was its best to begin with. Williams and the USC offense opened up haphazardly. Two of the Trojans’ first three workouts ended in threes and outs. The other ended with a Colorado interception snatched from the hands of receiver Brenden Rice.

The pick was just Williams’ second of the season – and only the second turnover for the Trojans this season. Still, he ended up scoring more points than any other USC player in the first quarter. On the next play, as the pressure eased, Colorado quarterback JT Shrout threw a pass from the end zone while still in the pocket. The intentional grounding was called and two runs were scored, courtesy of the USC defense.

After a frustrating start, the Trojans trailed Colorado, 3-2. Their offense was just eight yards and their quarterback completed just one for six passes for two yards. But those would turn around in a flash after that, as Williams hit Kyle Ford once to convert to third-and-long, then again. The spark was enough to launch the USC offense, which mounted a 12-play drive, topped off by a Williams guard for a two-yard touchdown.

Tuipulotu’s sack and forced fumble returned the ball to the USC offense. Just two minutes after his first score, Williams was left unguarded again, strolling around the end zone untouched for a second, extending a lead over Colorado that would quickly grow from there.

But the scoring streak was just subtext in light of Dye’s injury. As he left the field on the cart, his left leg in a cast following the USC win, he waved to the fans gathered around the tunnel. They howled in appreciation, knowing how much they had lost.

Slovakia supports Taiwan at the United Nations Framework Convention on Climate Change | Taiwan News


TAIPEI (Taiwan News) — The Foreign Affairs Committee of the Slovak National Council has adopted a resolution supporting Taiwan’s participation in the United Nations Framework Convention on Climate Change.

The resolution acknowledges that Taiwan’s exclusion from the UNFCCC prevents it from sharing valuable resources, expertise and experience with other nations to achieve the global vision of zero emissions, according to a press release issued by the office. representation of Taiwan in Slovakia. The committee expressed its full support for Taiwan’s “professional, pragmatic and constructive participation” in the convention.

Taiwan’s representative in Slovakia, Li Nan-yang (李南陽), said Taiwan is the world’s 16th largest economy and has the desire and ability to work alongside international partners to implement policies for net zero emissions and ensuring a sustainable environment for future generations.

Earlier this year, the National Council’s Foreign Affairs, European Affairs and Health Committees passed four resolutions advocating Taiwan’s participation in the World Health Assembly and the International Civil Aviation Organization.

Trigger your home automation routines with home buttons


Home automation systems are fine, as long as the person who built them is there to control them. Let’s face it, it’s often a complex web of interconnected systems, all tied to the specifics of their home – and someone unfamiliar with all of this might be a bit irritated if, on a cold day, the interface with the boiler is via a Python script, and something won’t work. Just say. Home buttons by [Matej Planinšek] on Hackaday.IO is a well-designed project, which aims to take some of the hacking out of such automation by providing an elegant interface to these automation routines, allowing anyone to switch and put one into action without hassle .

The PCB is based on the ESP32-S2-mini which deals with WiFi connectivity and integration with Home Assistant using the usual MQTT protocol. We expect integration with other flavors of home automation won’t be difficult to achieve. The center of the unit contains a simple E-Ink display, for that low standby power consumption. Specifically, the chosen unit is a Good Display GDEY029T94 2.9″ which this scribe can confirm is easy to interface and quite cheap to buy from the usual Chinese online sellers. This has been paired with six low-profile SKRB Clicky Alps series tactile switches, which sit on either side of the screen, and match a flex-like case on the 3D-printed front casing. Clean and simple.

The PCB design was provided in Altium format, which you can find on the project’s GitHub page. It shows a simple design, with some cool little details here and there. The internally mounted 186550 cell is supposed to last for at least a year, but when the time comes it can be charged via USB. A Xysemi XB8608AF protection chip (PDF) provides proper limiting for the 186550 cell, protecting it from overcharging, overdischarging and so on. Not that it is likely in this current configuration. A Sensiron SHTC3 humidity and temperature sensor is also present, hanging from the I2C bus, which makes sense for this application.

There are many home automation hacks on these pages, like this wheel interface, for example. If this all sounds complicated enough, how about starting with a Pico W?

Take Pokemon for a Walk


Emulating old computers or video game systems isn’t always about recreating childhood nostalgia or playing classics on hardware that no longer exists. Most of the time, this can be a great way to learn the mechanics of video game programming. Many older titles have source code available for anyone to browse and modify, and one of them is Pokémon Emerald. It was the first Pokemon game that [Inkbox] play, and added some modern features to it with this custom ROM file.

The first thing to add to this game was the ability for his Pokemon to follow his character on the overworld map. This is common in later games, but was not yet a feature when Emerald and Ruby were first released. [Inkbox] needed to import sprites from later games into the Emerald game file, convert their color palettes to match the game’s palette, and then get to work on the mechanics. Once it’s all done, Pokémon not only follow the player around the map, but are animated, moving in and out of their Pokéballs, and even jumping off ledges in a 32-bit believable fashion.

One of the good things about older games like these is that they’ve been around long enough to have source code or decompiled code, they often have extensive documentation, and the platforms they play on work are also well known. Pokémon Emerald is not alone in this regard; in fact, there is a huge Game Boy Advance homebrew scene that isn’t too hard to get involved in.

University thanks Wake County voters for their generous support


RALEIGH, NC (November 9, 2022) – Wake County will soon have innovative new training facilities for healthcare, life sciences, cybersecurity, and industrial professions, as well as a new permanent Western Wake Campus, thanks to the passage of the Wake Tech Workforce Forward obligation. Voters overwhelmingly approved the $353 million bond in Tuesday’s election, allowing the college to expand to meet demand for skilled workers in high-demand fields. The referendum passed with 70% support.

College staff and administrators thanked Wake County voters by taking to the streets with thank you signs during the morning rush hour today.

“We are so grateful for the outpouring of support from the people of Wake County,” said Wake Tech President Dr. Scott Ralls. “It’s clear that voters understand the critical role Wake Tech plays in preparing a skilled workforce for businesses in our region. It’s also clear that they appreciate the life-changing opportunities we offer Wake County residents to prepare for meaningful careers and continued career advancement.”

The approval of the bond makes possible the following strategic expansion projects:

  1. Perry Health Sciences Campus Expansion

The expansion of Wake Tech’s Perry Health Sciences Campus will include the construction of a 120,000 square foot facility. This essential new building will allow for the expansion of the college’s high-demand nursing programs and the addition of potential new programs in mental health, respiratory therapy, disability support and other areas. The new facility will include a “simulation hospital” allowing students of nursing and several disciplines to learn in a real setting. It will also house state-of-the-art laboratories for imaging programs.

  1. Western Wake Permanent Campus

Wake Tech’s Western Wake Campus will be moved from its current leased facility to a permanent campus in southwest Wake County. The 34-acre site is conveniently located at the intersection of NC Highway 55 and NC Highway 540 Triangle Expressway near US Highway 1. The initial construction of the facilities will provide permanent space for existing campus operations, including including university transfer programs. A new Entrepreneurship Center will be a small business resource center and home to the National Association of Community College Entrepreneurship. A new Workforce Development Center will include computer and game development labs and provide flexible industrial/biopharmaceutical training space to support the dynamic employment growth of Apex, Cary and Holly Springs.

  1. RTP Campus Cyber/Science Facility

Wake Tech’s RTP campus has become a major attraction for new and advanced technology companies growing in the Research Triangle region. The bond funds will support the construction of the third building on the RTP campus, to enable the expansion of life sciences and computer science programs, particularly in the area of ​​cybersecurity, where demand is high. It will also enable the continued advancement of education and industry partnerships that move our region forward.

The bond will also support needed investments in college-wide infrastructure, including technology and security enhancements and accessibility upgrades.

“Wake County’s population isn’t just growing, it’s aging,” Ralls said. “The bond funds will allow the college in our community to keep pace with this growth while preparing the much needed healthcare professionals who are critical to our long-term quality of life, as well as the skilled technicians we rely on every day. like to say Wake County is running on Wake Tech, and thanks to voter support, our workforce training engine will keep running.”

Wake County’s population is growing by approximately 62 people per day. Wake Tech serves more than 70,000 students each year, and this fall saw its highest enrollment in degree programs since the pandemic began.

Independent studies indicate that Wake Tech generates over $1 billion for the local economy each year, with every dollar invested in Wake Tech generating over $7 in additional revenue and social savings.

Wake Tech News Update Logo

Latest news from Wake Tech

Benefits of Implementing the OKR Framework in Your Business


In an ever-changing business world, it’s challenging to meet ever-increasing customer expectations while implementing the latest technologies and growing your business at a rapid pace.

OKR (objectives and key results) is an essential internal alignment system that connects people to strategy while assuring management that everyone in the company is pulling in the same direction and that their efforts are driving the business forward .

Even some of the biggest companies like Google and Microsoft use OKR methods because they are beneficial for aligning goals, effective employee engagement, transparent communication, and tracking and improving performance.

So let’s take a look at the top three benefits of implementing the OKR framework in your business.

  • Innovation, improvement and growth

OKRs help drive business growth through innovation and improvement. This implies that the OKR is not a list of activities that you perform in your business. Normal business operations are your day-to-day work, while OKR focuses on making changes, whether in your job or in the way you do it.

When working with OKRs, teams need to think about how they can help achieve business goals. What can they improve? What can they do better? Are they doing something that brings great value, and can they make it even better?

Getting great results requires setting goals that challenge you to think outside the box. While setting the most ambitious results, you leave plenty of room for creativity to figure out how to achieve them instead of just ordering people what to do without knowing what works and what doesn’t.

  • A clear direction for the company and the teams

OKR is an intense focus method that encourages your team to focus on results. The approach is not intended for normal business operations; therefore, it is not an alternative method to organize everything you manage. The main objective is to improve your business by identifying areas of improvement during the quarter. It is possible to determine what needs to be corrected or to develop ideas to do things differently.

The first step is to set the direction for the entire organization, then ask teams to create OKRs that align with overall business goals. Having an unambiguous goal for each team in your company is beneficial. OKRs help you decide on your primary focus for the quarter and ensure teams can deliver results that benefit the business.

The most successful organizations in the world have OKRs that are set quarterly. Three months is enough to get the desired results. After that, you’ll find out what works best and adjust your focus areas for the next quarter.

By reviewing your goals and key results every three months, you’ll have four opportunities a year to react to changes in the world, rather than doing an annual review only to realize you’ve been in the wrong direction over the past year. past year.

  • Liability and Ownership

Team OKRs should align with business goals and be part of their achievement. This implies that the business has created direction through goals and that teams need to take responsibility for implementing their OKRs to help the business move forward. Assigning someone an owner mentality is impossible because it automatically comes down to teams trusting each other.

To realize their full potential, teams need to be accountable for writing their OKRs as a collaborative team and decide how they put their energy and time most effectively: for example, what can they do to improve things or change? What can they do to improve? The OKR framework helps teams think about their work and what they could do to make their contribution more effective.

If you are considering implementing the OKR framework in your business, there are many companies available in the market such as https://okrquickstart.com that offer consultation and coaching to scale your business and achieve amazing results. .


Implementing an OKR framework in your business can be useful for tracking and measuring progress and setting ambitious but achievable goals. By setting measurable goals, you can ensure your team is striving to achieve something tangible and continually improve their performance.

Additionally, the OKR framework can be used to establish hierarchies of responsibility and accountability within your business. So, if you’re looking for ways to improve your team’s efficiency and effectiveness, consider implementing an OKR framework!

Related Articles


“We re-imagine, recreate and redeem cultural omissions and misrepresentations of blackness, for culture….” This post is made in Partnership with British pathe.

Get closer and personalize with the Bimota Tesi H2


Most people think of sportbikes when they think of great moving art on two wheels. This is especially true for people like me who like contemporary machines rather than two-wheelers designed in a neo-retro aesthetic. Even though the Ducati Panigale V4 and BMW S 1000 RR are some of the most exquisite motorcycles ever made, you could say they pale in comparison to the bike we’re talking about today.

In the motorcycle world, few people know the Bimota brand. On the other hand, once you have seen one of his works, you will probably not forget it. Sports motorcycles are the main product line of the Italian motorcycle company Bimota. The company, which had to close its doors in the early 2000s, was revived by none other than Kawasaki, who bought a 49% stake in it. Unsurprisingly, Bimota’s relaunched motorcycles were equipped with Kawasaki technology. However, there was a catch.

The Bimota Tesi H2, which was presented by one of the largest motorcycle distributors in the Philippines, Wheeltek, during the recent edition of the California Superbike School, is unlike any other existing motorcycle, as you can see from the pictures below.

Get closer and personalize with the Bimota Tesi H2
Get closer and personalize with the Bimota Tesi H2

The outrageous front suspension layout is probably what catches your eye first. In fact, a billet aluminum alloy swingarm serves as the front suspension instead of the standard telescopic forks seen on nearly every other motorcycle. This setup not only gives the Tesi H2 an extremely stunning, otherworldly look, but also gives it excellent handling by eliminating brake dive and reinforcing the front end. The Tesi H2 (214 kilos dry) is even lighter than the Ninja H2 (238 kilos dry) it was built on thanks to the lightweight construction of this system.

While we’re talking about the Ninja H2, it’s worth noting that the Tesi has the same 998cc inline-four engine as this bike, hence the H2 in its name. Thanks to the motorcycle’s ram-air technology, the compressor, which emits a characteristic roar as a result of the sonic boom created in its housing, generates an astonishing 238 horsepower. We don’t know if the Tesi H2 will be sold in the Philippine market at the time of this writing. However, it carries a surprising price tag of 64,000 euros in Europe.

Burhan says talks on Sudan’s new political framework are ongoing


Sudanese military leader General Abdel Fattah al-Burhan confirmed on Sunday that talks on a new political framework for the country were underway, but he warned the former ruling party in harsh terms not to interfere with the army or politics.

Burhan, head of the country’s Sovereign Council, led a coup a year ago that halted the country’s transition to elections after Omar al-Bashir was ousted after three decades of rule.

For the latest headlines, follow our Google News channel online or through the app.

Reuters reported on Friday that the military had compiled its views on a draft constitution, paving the way for steps toward a new deal with the country’s political parties.

Speaking to soldiers at a military base north of Khartoum, Burhan confirmed talks were underway.

“We will join everyone who wants to save this country,” he said, adding that he would not accept anything that leads to the breakup of the army.

Since the coup, members of Bashir’s banned National Congress Party have made a comeback in public life and public service. Analysts say the military allowed this as a way to build a new political and bureaucratic base.

On Sunday, however, Burhan denied that the army supported Bashir’s National Congress Party.

“We are warning those who want to hide behind the army, especially the National Congress Party and the Islamist Movement,” he said.

“Go away, 30 years is enough, give people a chance,” he later added. “Don’t hold out hope that the army will bring you

“All those who were part of the organization that led to the overthrow of the regime in 2019 have the legitimate right for us
stand with them to complete this period of transition to elections,” Burhan said, adding that other political groups have
also been included to increase consensus.

Read more: Protesters in Sudan reject UN post-coup mediation

Sumaya lands top tech job at Gymshark after free college bootcamp


The Department for Education’s Skills for Life initiative funds £4,000 courses that lead to web developer careers with average salaries of £45,000

As the ‘cost of living’ crisis continues to tighten its grip on UK finances, more and more of us are looking for opportunities to increase our earning potential and ease the burden of price increase.

With an average salary of £45,000 and job opportunities nationwide and beyond, a career in front-end web development could be the answer.

The new Skills Bootcamp offered by edX and the University of Birmingham, in front-end web development, is launching this month with the aim of nurturing the next generation of skilled web developers.

Rapidly changing technology is creating a huge gap between the skills working adults have and the skills employers need. edX boot camps bring together universities, workforce partners, employers and working adults to fill these digital skills gaps.

The best part? It’s completely free. The £4,000 course fee is fully funded by the Department of Education’s Skills for Life initiative. Skills Bootcamps are flexible courses that give people the opportunity to learn industry-specific skills and gain quick access to an interview with an employer.

During the 16-week part-time online course, students will learn about in-demand and market-relevant skills including HTML5, CSS3, JavaScript, jQuery, React.js, ES6, and Node.

Through a series of hands-on activities and immersive projects, learners will also gain experience with industry-standard programming practices such as agile development, version control, and technical project management.

Students will also benefit from career advice from edX’s Professional Engagement Network, which will help them chart a clear path to employment through resume and interview preparation, one-on-one coaching, job fairs, employment and more.

Sumaya Hassan lands senior tech job at Gymshark after taking free web developer course at University of Birmingham

Sumaya lands top tech job at Gymshark

Sumaya Hassan, who completed the University of Birmingham’s Coding Boot Camp in 2021, landed a cutting-edge tech job with global sportswear brand Gymshark after completing her program. The former care assistant is now a junior front-end developer at Gymshark’s headquarters in Solihull.

Sumaya said, “Coming from a background in life sciences, I completely changed careers and was curious about how I would find entry into the industry. I couldn’t be happier in my new role at Gymshark and I have the guidance and support of the Course Leaders during and after the course to thank for that.

“It was great to put what I learned during the course into practice in my new job. I can’t recommend a career in technology highly enough to anyone looking to change or hone their skills. »

How do I register for the Free Front End Web Development Skills Bootcamp at the University of Birmingham?

To be eligible for the Skills Bootcamp in Front-End Web Development, applicants must be aged 19 or over, live or work in England, be passionate about a new career in technology and have never attended a previous Skills Bootcamp . For more information on the Skills Bootcamp and to apply for the University of Birmingham program, Click here

Commerce Issues Guidance on Recent Advanced Computing and Semiconductor Manufacturing Controls for China | Pillsbury – Global Trade Law and Sanctions


On October 28, 2022, the U.S. Department of Commerce’s Bureau of Industry and Security (BIS) released tips on its October 7, 2022 Interim Final Rule (rule) that imposed new export controls on certain advanced computer integrated circuits (ICs), computer products that contain such ICs, and exported semiconductor manufacturing articles to the People’s Republic of China (PRC). Comments on the rule will be accepted until December 12, 2022. Our previous blog post on the rule can be found here.

The guidance offers several important clarifications, including with respect to the definition of a covered “facility,” the impact of the rule on deemed exports, and the scope of restrictions on “U.S. person activities.” An overview can be found below.

Installation Definition

The guidelines clarified that the term “facility” refers to the building where production of the restricted technology occurs. Subsequent steps, such as assembly, testing, or packaging, are not covered by the rule. The guidelines further clarify that if the same entity owns multiple buildings on the same corporate campus, each building will be considered a separate “facility” for the purposes of the rule. Thus, if production at the restricted technology level takes place at a single facility on a company’s campus, other facilities will not be subject to the same restrictions. However, in practice it is likely to be difficult for suppliers to obtain accurate information about the specific building in which their products will be used.

American person

The guidance addresses the controls of U.S. persons in EAR § 744.6(c)(2) that apply to persons engaged in the following activities:

  1. Permission to Ship, Transmit, or Transfer In-Country (In-Country) of Non-EAR Items Used in the “Development” or “Production” of Integrated Circuits to Manufacturing Facilities in the PRC that manufacture integrated circuits meeting the criteria specified in EAR § 744.6(c)(2)(i)(A)-(C) of the EAR;
  2. Deliver, by shipment, transmission, or in-country transfer, non-EAR items used in the “development” or “production” of integrated circuits to a manufacturing “facility” in the PRC that manufactures circuits devices that meet the criteria specified in EAR § 744.6(c)(2)(i)(A)-(C) of the EAR; Where
  3. Servicing, including servicing, repair, overhaul or refurbishment of non-EAR items used in the “development” or “production” of integrated circuits at a manufacturing “facility” semiconductor company located in the PRC that manufactures integrated circuits meeting the criteria specified in EAR § 744.6(c)(2)(i)(A)–(C) of the EAR.

Guidance Notes US persons must exercise due diligence to ensure that manufacturing facilities do not engage in prohibited activities. Proper due diligence includes “reviewing publicly available information, items’ ability to supply or service, proprietary market data and end-use statements” and adhering to BIS “Know Your Customer” guidelines in EAR § 732, Supp. 3, to determine whether a manufacturing facility in the PRC manufactures integrated circuits that meet any of the criteria set forth in EAR § 744.6(c)(2)(i)(A)-(C).

According to BIS guidance, given the policy objectives of the rule, the US person restrictions in EAR § 744.6(c)(2)(i)-(vi) do not extend to US persons engaged in administrative or clerical activities (for example, arranging shipping or preparing financial documents) without knowledge of a violation. In addition, these restrictions do not apply to persons who implement a decision to approve a shipment, transmission or transfer within the country subject to restrictions, unless it there is evidence of knowledge of a breach by such persons. Finally, the restrictions also do not apply to development or production activities that are not directly related to the supply of specific items or the servicing of specific items for advanced manufacturing facilities in the PRC. It’s unclear how reassuring these guidelines will be for American people working in Chinese companies, but it does at least indicate that the BRI’s intent is not to broadly target American national employees working in China’s semi- drivers.

We note that the controls in EAR § 744.6(c)(2) also apply to other types of activities of US Persons, beyond those discussed above, which are not addressed by the guidelines.

Deemed exports/re-exports

The guidance also aims to clarify the impact of the rule on exports and re-exports of goods.

First, it clarifies that under section 742.6(a)(6)(ii) of the Export Administration Regulations (EAR), Regional Stability (RS) controls placed on New and Revised Export Control Classification (ECCN) only not apply to deemed exports/re-exports. However, deemed export restrictions will still apply to Anti-Terrorism (AT) controls. Thus, a license is still required for deemed exports to persons from countries listed under AT control (Iran, North Korea and Syria.).

Second, the guidelines indicate that a foreign person who has lawfully received technology or software source code prior on the date of entry into force of the new ECCN does not need to apply for a new license or authorization since, according to the BIS, they return the knowledge of this technology or this source code. However, the foreign person must seek these approvals to receive any new software or controlled technology, even if these products are classified in the previous ECCN.


The guidelines also clarified that items that meet the parameters of 5A992 or 5D992 and also meet or exceed the parameters of 3A090 or 4A090, are subject to the licensing requirements of 3A090 or 4A090, in addition to being subject to classification, the license and reporting requirements of Category 5, Part 2. Additionally, except for items specified in EAR § 740.2(a)(9)(i), items that meet or exceed the parameters of 3A090 or 4A090 cannot use ENC license exception.

[View source.]

GE Aerospace extends contract with Tata Advanced for aircraft engine components


GE Aerospace and Tata Advanced Systems Ltd have extended their manufacturing agreement under which the latter will continue to produce and supply several commercial aircraft engine components to GE’s global engine manufacturing plants.

The long-term, multi-year contract is valued at more than $1 billion and will extend well beyond 2030, said Mike Kauffman, vice president and general manager, purchasing, GE Aerospace.

Engine parts will be manufactured at the Tata Center of Excellence for Aero Engines (Tata-TCoE) in Hyderabad.

The Tata Center of Excellence for Aero Engines was established in 2018 to manufacture CFM International’s LEAP engine components for wide body and narrow body aircraft in India.

“The capacity expansion work under this agreement has been underway for two years and now the capacity has increased tenfold,” Kauffman said, refraining from quantifying the capacity expansion.

“Our relationship with TASL has matured over the past five years. The Tata Center of Excellence for Aero Engines has grown in size and importance for us over time and is a great showcase of manufacturing in India, for the world,” said Kauffman.

“We continue to invest in developing the country’s skills base, technology and aerospace production capacity. As a leading commercial engine manufacturer, GE has helped us develop critical aircraft engine manufacturing processes here in India with the support of the GE engineering team,” said Mr. Sukaran Singh , Managing Director and Chairman and Chief Executive Officer of Tata Advanced Systems Limited.

GE operates 14 own or joint-venture manufacturing units in the country, including the multi-modal plant in Pune which manufactures aviation parts. GE’s aerospace supply chain partners in India include, among others, Tata Advanced Systems, Mahindra Aerostructures, Godrej & Boyce and Hindustan Aeronautics Limited.

Tata Advanced Systems Limited is a wholly owned subsidiary of Tata Sons, specializing in providing integrated solutions for aerospace, defense and homeland security.

Catch all the company news and updates on Live Mint. Download the Mint News app to get daily market updates and live trade news.

More less

Musk Meme Sees Dogecoin Skyrocketing $2 Billion; Shein will open a physical store in Japan


In today’s ExchangeWire news digest: a meme tweeted by Elon Musk sees the value of Dogecoin skyrocket by $2bn (~£1.7bn); Chinese retail giant Shein set to open physical store in Japan; and the FTC orders edtech giant Chegg to notify users of data breaches.

Musk’s tweet takes Dogecoin to a six-month high

One of the largest cryptocurrencies in the world, Dogecoin, whose value skyrocketed on Tuesday (November 1) after a tweet from Elon Musk. The tweet, a photo of a Shiba Inu adorned with the Twitter logo, garnered nearly 600,000 likes on Twitter and sent Dogecoin soaring to a six-month high of $0.14 (~£0.12).

The tweet is believed to refer to Musk’s reported plans to heavily integrate Dogecoin into Twitter as he takes over the company. The billionaire also recently confirmed Twitter verification is expected to come bundled with Blue, the company’s premium subscription, with a listed cost of $8 (~£6.95) per month.

Shein to open brick-and-mortar store in Japan

Fast fashion giant Shein is set to open a physical store in Tokyo on November 13. The Chinese retailer previously opened pop-up stores across Japan earlier this year, with the Harajuku-based store serving as Shein’s first permanent bricks and mortar.

The store will integrate technology into the shopping experience, allowing customers to shop online using QR codes, and will be used to host brand events and fashion shows.

Security breaches at Chegg exposed the data of 40 million employees and users

According to the FTC, Edtech giant Chegg’s security breaches exposed the personal details of 40 million individuals four times over a period of 4 years. The US watchdog noted that Chegg also failed to notify those users and employees of the data breaches, ordering the company to do so immediately.

Samuel Levine, director of the FTC’s Consumer Protection Bureau, said Chegg “took shortcuts with millions of sensitive student information,” adding that “today’s order compels the company to strengthen security measures, to offer consumers an easy way to delete their data and to limit the collection of information upstream.

New to ExchangeWire

A Brave New World: Staying ahead with an omnichannel strategy

Big Tech Finance Roundup – October 2022

PressBox Digest

Hivestack & Tulip Media Partner for Programmatic Digital Signage (DOOH) in China

IAS Research finds ads placed next to sustainability-friendly contexts increase brand

Want to see your latest press releases featured on ExchangeWire? Email [email protected] to learn more about our PressBox service.

Fact of the day

27 million euros – the amount of Dogecoin donated to fund the trip of the Jamaican bobsleigh team to the Winter Olympics in Sochi, worth approximately 30,000 USD (~£26,000).

Source: Investopedia

They’re not going to ban TikTok (but…) • TechCrunch


We’ve been hearing for years about how TikTok collects data globally and presents it to its parent company in China, and potentially from there to the powers that be. But despite renewed calls today from FCC Commissioner Brendan Carr, the popular app is highly unlikely to be banned outright. This does not mean, however, that he will be allowed to continue with impunity.

Commissioner Carr’s opinion appeared in a interview with Axios, during which he said he didn’t believe “nothing but a ban” would be enough to protect Americans’ data from being collected by Chinese companies and authorities. (To be clear, he is speaking his own position, not the FCC’s; I asked two other people at the agency to comment and received no response.)

This isn’t the first time Carr has voiced this idea. After BuzzFeed News reported data irregularities implied by leaked internal communications, it wrote in June to Apple and Google calling the app an “unacceptable national security risk” and asking companies to remove it from their app stores. They didn’t, and now we come back to the issue of federal action — first pondered by the Trump administration, which despite numerous actions restricting China’s reach in the United States has never managed to lock TikTok.

The reason is quite simple: it would be political self-sabotage. TikTok isn’t just a hugely popular app — it’s the life raft that a generation that ditched the noble ships Facebook, Instagram, and soon to be Twitter clung to for years. And the reason is that American companies are nowhere near replicating TikTok’s algorithmic addiction exploit.

TikTok’s success in sticking Gen Z to their phones isn’t necessarily a good or bad thing — that’s a different discussion. Taking its place in the zeitgeist for granted, it nevertheless makes a ban politically risky for multiple reasons.

First, that would be extremely unpopular. The vote of disaffected young people is extremely important right now, and any president, senator or representative who supports such a ban would be viewed sideways by young people. Already out of touch with technology and the priorities of the younger generation, DC would now also be seen as the fun police. Whether it pushes voters to the other side or simply prevents them from voting, there are no good results. Ban TikTok does not secure votes and it’s fatal before you even start thinking about how to do it. (Not to mention that it looks like the government is stepping in to give struggling US social media companies a boost.)

Second, there is no clear path to a ban. The FCC cannot do this (no jurisdiction). Despite the alleged threat to national security, the Pentagon cannot do this (ditto). The feds can’t force Apple and Google to do this (first amendment). Congress will not (see above). An Executive Order will not (too broad). No judge will (no plausible case). All routes to bans are impractical for one reason or another.

Third, any effective ban would be a messy, drawn-out, contested thing with no guarantee of success. Imagine that somehow the government forced Apple and Google to remove TikTok from their stores and remotely erase or disable it on phones. No one likes this look – corporations look too weak and too strong, letting authorities push them, then showing their power to reach out and touch “your” device. An IP-based ban would be easily circumvented, but would also set another nasty censorship precedent that, ironically, would make the United States look much more like China. And even if one or the other or both were tempted, they would be opposed in court not only by ByteDance, but also by companies around the world who don’t want the same thing to happen to them if they get hit. and the government doesn’t like it.

For these reasons and more, an outright prohibition by law, decision, or act of God is highly unlikely. But don’t worry: there are other tools in the toolbox.

If you can’t beat ’em, bother ’em

Picture credits: Bryce Durbin / Tech Crunch

The government may not be able to kick TikTok out of the country, but that doesn’t mean it has to be nice to let them stay. In fact, chances are they’ll do their best to make it outright unpleasant.

The company and service exist in a kind of loophole, from a regulatory standpoint, like most social media companies. The addition of Chinese ownership is both a complicating factor and an opportunity.

It’s more complicated because the US can’t directly affect ByteDance’s policies. On the other hand, as a “foreign adversary,” China’s ascendancy over private industry is a legitimate national security concern and policy can be shaped around it. This involves various more independent agencies that are free to set rules within their remit – the FCC cannot, in this case, litigate. But what about the Commerce Department? Homeland security? The FTC? Besides, what about states like California?

Rule-making agencies have a free hand — and like the tacit support of Congress — to expand their own fiefdoms to TikTok’s boundaries, with national security acting as a catch-all reason. If Commerce adds “connected software applications” to the supply chain security rules as it has proposed, suddenly the data going in and out of the application is arguably under its protection. (All of this would be stated in various definitions and repositories at the time of rulemaking.)

What if TikTok’s source code, user data, and other important assets were subject to regular audits to ensure they complied with cross-border data supply chain rules? Well, that’s a pain in the neck for ByteDance because it has to go through its codebase to make sure it’s not giving away too much. Having to prove that he manages the data as he says he does, to the satisfaction of US authorities who have given free rein to their whim, is not pleasant at all. And that’s only from a relatively quick rule change – imagine the FTC getting a new authority to audit algorithmic recommendations!

More importantly, it gives the US government a string to pull if ByteDance fails to comply. It’s one thing to say, “We think this company is mishandling US citizens’ data and we’re going to ban it.” It’s quite another to say, “An investigation by auditors found that ByteDance misrepresented its data handling techniques, and if not corrected within 90 days, it will be in violation of the law and removed. app stores.”

Neither Apple nor Google want to remove TikTok from their store, but again, it’s one thing to say, “The feds asked us”
and another to say, “We have to obey the law. It’s out of our hands.

If TikTok has proven to be unresponsive to the actions of the highest levels of government, that just means the job is being handed over to a small army of bureaucrats who would love to be the ones tying up this particular greased pig. This is not a rodeo that no company wants to participate in – American, Chinese or otherwise.

Mission Secure Launches Sentinel 5.0 Platform, Enabling Contextual and Zero Trust Security for Critical Infrastructure OT


announces technology partnership with Verve Industrial

CHARLOTTESVILLE, Va., November 1, 2022 /PRNewswire/ — Mission Secure, a leader in OT and ICS cybersecurity, today announced the release of its Sentinel 5.0 platform, a significant step in enabling Zero Trust security architectures for critical infrastructure. The Sentinel 5.0 platform provides dynamic, contextual cybersecurity policy monitoring and enforcement for operational technology systems.

“Zero Trust architectures are the most powerful and practical way to increase security and reduce risk for industrial cyber-physical processes,” says jens meggers, Executive Chairman of Mission Secure. “With Sentinel 5.0, we’re launching a game changer that enables granular enforcement of access policies from the physical signal to the cloud. It’s whitelisting on steroids: industrial strength, context, prevention and mitigation of intrusions.”

Why Zero Trust?

Zero Trust is a well-established IT cybersecurity principle that has yet to be widely adopted in industrial OT. It eliminates implicit trust in the network perimeter by continuously validating every step of the digital interaction. In the absence of Zero Trust architectures, industrial operators often rely on disjointed tool sets, such as firewalls, intrusion detection systems, and endpoint vulnerability scanning, without acquiring fully capable of managing and securing industrial operating environments.

A powerful policy driver

With Sentinel 5.0, Mission Secure launches a platform that allows operators to define and enforce granular policies based on a wide range of inputs, including network traffic, remote access attempts, versions and asset firmware vulnerabilities, as well as the actual digital or analog signal generated by the physics. devices.

While the Sentinel 5.0 platform includes standard features such as passive monitoring, asset discovery, and alerts, the core component of the platform is a fine-grained policy engine that enables highly sophisticated and specific to OT:

  • Creation of access control policies to define the conditions under which users or applications can send commands to industrial equipment.
  • Identify firmware status and vulnerabilities, as well as restrict access to only fully patched systems.
  • Alert and act on physical signal anomalies, and isolate systems that exhibit abnormal behavior.
  • Support root cause analysis by correlating network events with sensor outputs.

Mission Secure also announced a technology partnership with Verve Industrial, the leading provider of IT-OT asset inventory and vulnerability management solutions. “Going beyond perimeter detection to protect the most vulnerable and critical OT assets at the endpoint is a significant step towards securing the cyber-physical process,” said John LivingstoneVerve CEO.

“Zero Trust is a long journey for industrial operators,” said Chet Mroz, President of Mission Secure. “Sentinel 5.0 points a bold step into the future for our customers as they begin their journey.”

About Verve Industrial

Verve Industrial Protection has been providing reliable and secure industrial control systems for over 25 years. Its core offering, the Verve Security Center, is a unique, vendor-neutral OT endpoint management platform that provides IT-OT asset inventory, vulnerability management, and the ability to remediate threats and vulnerabilities from of its orchestration platform. Verve Industrial’s Design-4-Defense Professional Services helps customers ensure their OT environments are designed and operated securely. To learn more about Verve Industrial, please visit www.verveindustrial.com.

About MissionSecure

Mission Secure is a cybersecurity leader for operational technology and industrial control systems, helping customers gain visibility and control over their critical assets. With unparalleled threat detection and policy enforcement capabilities, Mission Secure enables effective Zero Trust architectures for customers in manufacturing, maritime, oil & gas and other industries. Learn more about www.missionsecure.com.

Media contacts:
John L. NeroJL Nero Communications; [email protected]; 401-486-3120
Devin McCrateMission secure; [email protected]; 312-945-8192

SOURCE Mission Secure

How the National Credit Framework can transform the education system


The new framework will allow students to move from school to school and board to board without having to obtain equivalency certificates issued by various school boards for admission to educational institutions. superior and employment in central or state government.

New Delhi ,UPDATED: Oct 31, 2022 5:23 p.m. IST

National credit framework

National credit framework

By India Today Web Desk: The Department for Education’s proposed report on the National Credit Framework (NCrF) is in line with the government’s drive to integrate academics into vocational and skills-based education. Simply put, the NCrF is an overarching framework for skills, retraining, upskilling, accreditation and assessment in education and training institutions, through which students can earn credit from university education regular as well as extracurricular activities such as retraining or skills upgrading. – refresher courses and keep them for use in their future careers.

In recent days, the University Grants Commission (UGC) has called for provisions to encourage undergraduate programs with multiple entry and exit options.

In such a scenario, a unified credits-based approach has become imperative, prompting the Department of Education to come up with the National Credits Framework, which will allow students to digitally deposit their credits into the Academic Credit Bank (ABC). Basically, the framework is a common mandate that schools, colleges, universities, and training institutions should follow when adopting the credit system.


While most of the universities in the country follow a choice-based credit system (CBCS), through which students can earn credit by earning a particular degree. Now, with the implementation of the NCrF, students will have the opportunity to integrate a wide variety of courses, allowing for interdisciplinary and intradisciplinary training. In a way, NCrF seeks to integrate all frameworks under one umbrella.

The new framework will allow students to move from school to school and board to board without having to obtain equivalency certificates issued by various school boards for admission to educational institutions. superior and employment in central or state government.

Per NCrF guidelines, students will need to score at least 40 points for completing a year of school education after completing 1,200 hours of “theoretical learning hours.”

Because theoretical learning hours are different from regular academic learning hours is that, in addition to time spent on classroom instruction, they also include hours spent in a range of co-curricular and co-curricular activities such as sports, yoga, performing arts, music, social work, CCN, vocational education, as well as on-the-job training, internships or apprenticeships.

This will help students not only focus on basic academic excellence, but also improve their skills to prepare for their future professional careers.

As the NCrF is implemented, students will have the opportunity to enroll in additional courses/subjects/projects alongside national schools and institutions as announced by the University Grants Commission (UGC) . However, even though students gain more experience through additional coursework, school board exams are still required and will also be considered when calculating total credit points.

This article is written by Ms. Alka Kapur, Principal of Shalimar Bagh Modern Public School.

Rocketize Token, Chiliz and Algorand: Decentralized Ecosystems You Can’t Miss


Rocketize is a memecoin focused on decentralization and satisfying its user community. The goal of its developers is to create wealth, as many crypto memes have done in the past.

Meanwhile, Rocketize Token adopts a system of transparency to achieve its objectives and ensures that the project is decentralized, not just in name. Starting with its developers, Rocketize has not created any particular crypto to store its tokens.

Most memecoins do this and call the wallet a developer wallet. Still, many sold the tokens from this wallet, leaving investors with worthless coins. As a result, Rocketize will not store its token, $JATO, or award any amount of it to any member of its team.

Additionally, Rocketize will adopt a different method for its DAO. It is a standard in the crypto industry for only investors with sufficient funds to participate in master projects. However, Rocketize changes this narrative by allowing any member of its community, the Atomic Nation, to participate in governance.

While governance votes will require a few JATO tokens, community members won’t need a large amount. In doing so, Rocketize keeps the JATO memecoin completely decentralized.

Rocketize vs. Algorand

Algorand is a proof-of-stake blockchain that offers fast transactions on a green network. “Green” means that Algorand does not emit carbon dioxide to operate its network.

Over 2,000 organizations use Algorand to deliver financial solutions in an easier, uncensored way. Meanwhile, the blockchain still has room to accommodate more DeFi services and businesses. Also, it provides resources that can help developers develop their ideas using open source code.

Algo is a cryptocurrency native to the Algorand blockchain. As of this writing, it is worth over $2.3 billion and has a market price of $0.33. Algorand aims to remain one of the top choices among blockchain networks, just as Rocketize aims to be one of the most valuable memecoins.

Rocketize vs Chiliz

Chillz is a crypto platform bringing sports to the blockchain world. It connects sports teams with fans using the Socios.com app. Chilliz was born out of the idea that blockchain and crypto offer a better way for a sports team to monetize their fan base and even reward their support.

So far, Socios.com has been an announcement and engagement tool for many sports teams. Juventus was the first football team to launch a fan token through the Chiliz network. Subsequently, Paris Saint Germain created the PSG token and listed it on Binance.

CHZ is the native cryptocurrency of Socios.com. Sports teams pay CHZ to deploy Fan Tokens on Socios.com. Similarly, fans use CHZ to purchase fan tokens for their favorite clubs.

Around 6 billion CHZ tokens are currently in circulation. Chiliz is worth over $1.1 billion in market capitalization at the time of this writing. Additionally, the market price of the coin is $0.2, an 80% drop from its all-time high.

Like Chiliz, Rocketize plans to create a versatile meme piece that can be used in the digital and real world.

Grab a Huge 60% Bonus

Again, Rocketize is a project centered around users and investors of $JATO. Therefore, the team rewards everyone who participates in the current presale with a chance to win up to 60% for the purchase of $JATO.

All you need to do is purchase a JATO token within the first 30 minutes of creating an account on the Rocketize platform. If you are wondering how to do this, you can follow these steps:

  1. Visit the Rocketize website
  2. Click Enter presale on the homepage
  3. You will see a page to create an account with Rocketize
  4. Enter your name, email and mobile number
  5. Select the crypto you intend to deposit from the available options and enter your purchase amount.
  6. Register your account
  7. Deposit the selected cryptocurrency and complete your purchase by converting the crypto to $JATO.

In addition to the initial bonus, there is an additional 8% reward for investors who buy $JATO in the first phase of the presale. In subsequent stages, Rocketize will reward buyers with additional 6% and 4% rewards in Stages 2 and 3, respectively.

The final thought

During the ongoing presale, Rocketize is selling JATO tokens at an affordable initial bid. After considering the huge possibilities of crypto meme projects and the potentials of the Rocketize DeFi ecosystem, you can decide to buy JATO tokens by following the steps above.

For more information, see the following links.

Presale: https://rocketize.io/buy

Website: http://rocketize.io

Telegram: https://t.me/RocketizeTokenOfficial


Investment in crypto assets is unregulated, may not be suitable for retail investors and the full amount invested could be lost
La inversion en criptoactivos no está regulated, puede no ser adecuada para inversores minoristas y loser la totalidad del import invertido

Did an engine problem cost Hamilton pole in Mexico?


The seven-time world champion was fastest in the first two parts of qualifying at Autodromo Hermanos Rodriguez but his hopes of securing a first pole position in 2022 were finally dashed in Q3.

Hamilton recovered from his opening lap deletion to the track limits take third place, 0.05s slower than Mercedes team-mate George Russell and 0.304s adrift of Red Bull’s Max Verstappen.

The Briton was heard reporting a problem with his engine during the latter part of qualifying and believes it cost him a critical time in the race for pole.

“It was generally a really good qualifying session,” said Hamilton.

“We had some issues towards the end with the engine in Q3 so I think there was definitely a bit of performance left on the table with that, unfortunately, but I did my best.

“Losing that first lap definitely made the last one very, very difficult. I had to be very reserved on that last lap just to make sure it was clean, because I was a tenth at that point.

“Unfortunately I couldn’t push as hard as I would have liked, but I still think it’s a great result, second and third.

“It’s not a bad position to start and hopefully we can sort out the engine problem for tomorrow.”

Asked to explain the engine problem in more detail, Hamilton said: “It started showing up in Q2 and then every pass in Q3.

“I was basically losing power coming out of corners, so I really think we were losing quite a bit of time in the last corner and most of the corners.

“I don’t really know what was going on, but it looked like an ignition problem. But I’ll check with the team.

Hamilton will line up from third on the grid, a position from which the last two races in Mexico City have been won.

Unusually, pole in Mexico is seen as a disadvantage due to the long run to Turn 1, which Hamilton will look to take advantage of on Sunday.

“Naturally it’s always a tough race here, with the track temperatures and the tyres, but these guys [Red Bull] have been quick all year,” Hamilton said when asked if he could fight for the win from third place.

“Even when we are at our best this weekend, we still lose to them in straight line speed, so it will definitely be difficult to pass tomorrow. But we will do our best. Turn 1 is an opportunity, so we let’s grab it.

Best spy shots of the week of October 24


Motor1.com sets up spy photos of upcoming vehicles virtually every day and sometimes more often than that. If you want to stay on top of what’s on the way, check out this list of all development vehicle previews from the past week.

These spy photos include a look inside the new BMW M5. It’s camouflaged, but we can see a large, single-bezel display that appears to be for instruments and infotainment. The controls are on the console. So far, reports indicate there’s a plug-in hybrid V8 under the hood.

Cadillac is preparing to refresh the CT5 sedan. This one has an updated nose with a revised front fascia and modified headlights. So far, there are no other obvious changes.

Earlier this week we got the first spy photos of the Maserati GranCabrio. It looks a lot like the GranTurismo, which makes sense because that model is the convertible version of the coupe. The front fascia is slightly different, and there are adjustments to the rear deck to make room for the folding roof. Later, official teasers revealed some more.

The Mercedes-Maybach EQS SUV will be the ultra-luxury version of the brand’s electric crossover. It features slight revisions to the front and rear. Expect there to be an opulent cabin as well.

We got a really good look at the Mercedes-Benz GLC Coupe this week as there were two galleries of it. This is the regular model with the conventional grille design and no exposed exhaust pipes.

This is the Mercedes-AMG GLC 63 Coupé, which is the top-of-the-line version of the model. It has a more aggressive front end, a more prominent rear spoiler and quad exhaust pipes with trapezoidal tips.

The Mercedes-AMG GT coupé will be the sporty counterpart of the new Mercedes SL-Class. It has a fixed roof, and this one is the 53 version with a plug-in hybrid powertrain. This would use the 2.0-liter four-cylinder with an electrically assisted turbo and an electric drive motor.

Quad’s Pledge Against Ransomware Could Help Strengthen Regional Software Supply Chains


The importance of the Indo-Pacific to the security of Australia and regional allies continues to dominate public discourse. Last month, the Quad Foreign Ministers of Australia, India, Japan and the United States issued a joint statement statement on ransomware, recognizing that vulnerabilities in cyberspace compromise the security of critical national infrastructure and economic continuity in the region.

This statement is an important recognition that ransomware is a transnational threat that cannot be mitigated by national policy alone. The increase in ransomware attacks on software supply chains demonstrates this. The multi-party approach highlighted by Quad’s statement is key to addressing vulnerabilities that enable this type of ransomware attack.

Ransomware is a highly profitable and disruptive cyberattack technique that serves both criminal and state actors. Companies in the information and communications technology sector are particularly at risk as they are critical infrastructure providers who also hold rich treasuries of data that can be leveraged or profitably exploited on the dark web.

Since the Covid-19 pandemic, ransomware attacks have increased dramatically around the world. The last annual report on the state of ransomwareby cybersecurity firm Sophos, reported a 78% increase in attacks worldwide between 2020 and 2021. Nearly two-thirds of organizations surveyed said they had been affected.

Australia is the most targeted ransomware victim in the Indo-Pacific region, and the third most cyberattacked nation globally. The probability of an attack is high and, as recently as September, the Australian telecommunications provider optus was successfully targeted in the largest nationwide data breach on record. Apart from critical infrastructure providers, ransomware targets are usually large organizations that have the ability to pay high ransom demands due to their extensive operations. Australian multinationals providing ICT products and services to national and regional customers that require regular software updates and installations fall into this category and are at high risk of being hit by supply chain attacks.

A software supply chain attack exploits the trust relationship between vendor and customer. A common scenario is the exploitation of a vulnerability that allows hackers to compromise vendor source code with malware. Software updates containing malicious code are then unwittingly installed by users, infecting their networks. This is also known as a downstream attack.

Effective cybersecurity programs require an assessment of third-party vulnerabilities; however, they cannot always identify or mitigate source code compromises in software because they are difficult to detect and can evade firewalls when hidden in trusted code. The detection and prevention of this type of attack is best handled at the source by the software vendor itself.

This is where the multi-stakeholder approach put forward by the Quad ministers comes in. Cyber ​​policy aimed at securing critical national infrastructure must recognize that third-party vulnerabilities, or links in the supply chain, are often the points most likely to be compromised. Governments should work collaboratively to identify linkages between critical infrastructure providers in their jurisdictions and organizations in the region. From there, each country’s national policy should reinforce the efforts of regional counterparts to ensure that baseline security standards, vulnerability reporting mechanisms, and ransomware mitigation and response practices are comparable, if not interoperable. .

The 2021 Kaseya ransomware attack is an example of how the effects of supply chain attacks can go beyond the intended victim. Kaseya was target by a Russian-based ransomware group called REvil that exploited a vulnerability in the company’s software. Kaseya provides “Virtual System Administrator” or VSA software products, remote monitoring and management products that use cloud technology to manage a range of business activities. The compromised VSA software had a high degree of reliable access to client systems. When the software was automatically updated, the ransomware infected customers in 17 countries. Customers included small businesses such as supermarkets, as well as schools and pharmacies. REvil then demanded a ransomware payment from Kaseya. While Kaseya was an American company governed by California law, the ransomware attack had downstream consequences in the supply chain globally.

A ransomware attack on an Australian company with downstream supply chain relationships like Kaseya’s would have significant ramifications for regional stability and Australia’s broader national security interests, particularly if the company were ransomed for an extended period.

State actors could easily leverage this technique for disruptive or coercive purposes, especially since sophisticated attacks can ensure that malicious code is programmed to stop working when uploaded to a network with language settings specific. This allows for more accurate and precise targeting by adversaries and mitigates the risk of cyber fratricide.

Economic productivity and supply chains will be disrupted in the region if businesses are repeatedly taken offline. Such attacks could also damage Australian vendors’ reputation for reliability and security, prompting regional companies to seek similar services from other major vendors in the region. The Australian economy would suffer and adversaries could have more control over digital commerce. Reputational damage could also extend to diplomatic partnerships.

While these concerns were framed in an Australian context, other members of the Quad are vulnerable to the same scenarios. The implications of a supply chain attack are therefore significant for Australia and regional partners. The importance of Quad’s ransomware statement should not be lost. Public pressure should be brought to bear on governments to be held accountable for the Quad’s call on states to take shared responsibility to help each other in the face of malicious cyber activity, especially when ransomware threatens infrastructure national critics.

As a starting point, the Australian Parliament should consider the proposed amendments to the Security (Critical Infrastructure) Amendment Bill 2021 in this context and use it to demonstrate Australia’s commitment to tackling regional cybersecurity risks to critical national infrastructure. Lessons learned from recent Optus and Medicare ransomware attacks can also be applied.

It is time for Canberra to strengthen its leadership in this area and help lead the formulation of robust, consistent and sustainable ransomware mitigation and response policies and practices that can be developed and emulated by regional partners. Only collaboration can manage the threat of instability posed by ransomware.

EMQ Announces Availability of EMQX Enterprise on VMware Marketplace


MORGAN HILL, Calif., October 27, 2022QEM, the world’s leading open source IoT data infrastructure provider, today announced that its cloud-native MQTT messaging platform EMQX Enterprise is now available on VMware Marketplace and deployable on VMware Cloud. This means that it is now easier for customers to purchase and deploy this highly secure and scalable “out-of-the-box” messaging platform to run their enterprise IoT applications.

As a growing number of companies move towards developing more agile and modern software applications, the use of containers and microservices has increased dramatically. VMware Marketplace is a one-stop-shop for VMware-verified and certified ecosystem solutions from independent software vendors that enable customers to find, test, purchase, and deploy software that runs on VMware-based clouds. With EMQX Enterprise in VMware Marketplace, developers have the ability to directly deploy IoT ecosystem solutions into VMware environments such as VMware Tanzu or VMware Cloud, while benefiting from features such as notifications, reporting and analytics.

EMQ serves as the trusted IoT database for global customers looking for flexible, scalable, and secure IoT solutions to navigate the multi-cloud era and build the future of IoT. EMQX Enterprise, built by EMQ, is the world’s most scalable cloud-native IoT messaging platform with an all-in-one distributed MQTT broker and SQL-based IoT rules engine. It powers high-performance systems that deliver sub-millisecond latency and reliable data movement, processing, and integration for business-critical IoT solutions. Meanwhile, EMQX Enterprise can seamlessly integrate IoT data with more than 40 cloud services and enterprise systems, including VMware Cloud, AWS, Google Cloud, Microsoft Azure, Confluent Kafka, MongoDB, Oracle, SAP, and databases. of time series.

CEMQ and VMware

“EMQ is one of the world’s leading providers of open source Edge/IoT messaging platforms. Based on the successful cooperation of VMware and EMQ on edge computing over the past 5 years, we are pleased to further extending it to Multiple Cloud Edge collaborations EMQ Enterprise EMQX Enterprise next-level messaging platform successfully launched on VMware Marketplace, meaning hundreds of thousands of enterprise customers across the world can easily adopt this Tanzu-based SaaS service and practice holistic message management in the Multi Cloud Edge era. This is a step towards digital transformation for related industries,” said Alan Ren, head of engineering and ecosystem for global research and innovation at VMware.

“We are delighted to partner with VMware and host our enterprise-level MQTT messaging platform on VMware Marketplace. Having EMQX Enterprise on VMware Marketplace enables our customers to build a highly agile IoT data infrastructure on VMware, meeting the needs of modern IoT applications and accelerating time to market,” said Feng Lee, Founder and CEO of EMQ. “EMQ has long advocated the adoption of cloud-native concepts. All EMQ offerings support flexible multi-cloud deployment options. Together with VMware, we look forward to delivering more innovative cloud-based services and bringing a higher level of value to our customers, helping them lead a smoother and more profitable digitalization journey.

Now, with the latest version 5.0 update, EMQX becomes the very first product to be implemented MQTT over QUICand ensures reliability IoT connectivity even in weak, lossy and irregular network environment. EMQ continuously delivers exciting new features that help customers quickly deploy EMQX Enterprise clusters on VMware Tanzu Kubernetes, VMware Cloud, and other traditional public clouds in the shortest possible time. EMQX is trusted by customers around the world across a wide range of industries, including Internet of Vehicles, Industrial IoT, Carriers, Finance, Energy and Smart City.

To get started with EMQX Enterprise on VMware Marketplace, please visit: https://marketplace.cloud.vmware.com/services/details/emqx-enterprise-1?slug=true.

About the EMQ
EMQ is the world’s leading provider of open source IoT data infrastructure software. Its core portfolio includes EMQX, the world’s most scalable and reliable open-source MQTT messaging platform, HStreamDB, the world’s first native streaming database, and Neuron, the lightweight industrial IoT connectivity server.

EMQX supports 100 million concurrent IoT device connections per cluster while maintaining extremely high throughput and sub-millisecond latency. Trusted by over 300 customers in critical IoT scenarios, including well-known brands like HPE, VMware, Verifone, SAIC Volkswagen and Ericsson.

EMQ’s global R&D center is located in Stockholm, Sweden. It has more than 10 offices in the Americas, Europe and the Asia-Pacific region. To learn more, follow us on Twitter @EMQTech or visit http://www.emqx.com.

About VMware
VMware is a leading provider of multicloud services for all applications, enabling digital innovation with business control. As the trusted foundation for accelerating innovation, VMware software gives businesses the flexibility and choice they need to build the future. Based in Palo Alto, Calif., VMware is committed to building a better future through the company’s 2030 agenda. For more information, please visit http://www.vmware.com/company.

India needs legal framework for closing mines and power plants


Removing the TPPs will also free up the large tracts of land available with them. According to the report, 8,850 ha of land will become available by 2030. Over the next five years, an additional 12,230 ha will become available. This will increase considerably to reach 45,273 ha in 2036-40.

Since the laws and regulations in India do not firmly establish cleaning and sanitation requirements, there is a risk of factory sites being left derelict. This is especially true if GENCOs are financially stressed and lack adequate resources to remediate or redirect/re-develop, says lead author Mandvi Singh of iForest.

There is another catch with land issues. Forest land is often diverted for TPP development. Referring to the Ministry of Environment, Forests and Climate Change, the report informs that approximately 11,435 ha of forest land has been diverted for TPPs since the enactment of the Forest Conservation Act of 1980. what will become of these lands?

Similarly, there are concerns about the livelihoods of people associated with these TPPs. It is estimated that 1.92 lakh formal and informal workers would lose their jobs by 2030.

The loss of jobs will gradually increase over the next few decades as more and more TPPs are dismantled. It is estimated that around 3.98 lakh formal and informal workers would lose their jobs in the next decade. Beyond 2040, another 2.48 lakh workers are likely to find themselves unemployed due to the closure of TPPs.

The report points out that there are no specific guidelines in labor codes or ensuing central or state policies and regulations to plan for a “just labor transition,” especially when the TPPS is dismantled.

The report also discusses many other challenges, including financial regulation and disposal of toxic materials. Dismantling a TPP will cost billions of dollars, but this is not taken into account in the financial calculations when setting up the TPP.

How to Fight Cyber ​​Threats to Aircraft – Airways Magazine


DALLAS – Information and Communication Technology (ICT) has greatly complemented the growth and advancement of the aviation sector in the areas of aircraft design, manufacturing, operation and navigation .

Modern aircraft – the Boeing 787, Airbus A350, Bombardier C-series and Gulf-stream 650 – are electronics-enabled, which means they have an unprecedented number of electronic flight systems .

These include cable digital flight, IP networks, commercial off-the-shelf (CoTS) components, wireless connectivity (Wi-Fi, Bluetooth), a global positioning system (GPS) and a in-flight entertainment. (IFE), among others.

Electronic and wireless systems reduce the amount of wiring in an aircraft, which reduces weight, helps reduce fuel consumption, increases the efficiency of flight operations, eases the workload of aircraft crews and improves the passenger comfort on board.

However, these wireless and electronic systems have vulnerabilities to cyber threats that could impact the safety of aircraft and passengers on board.

Flights at LGW will be capped at 825 per day in July and 850 in August. Photo: Gatwick Airport

Cyber ​​attacks in aviation

Aircraft cyberattack refers to the offensive manipulation of aircraft data, communications, functions, instruments and systems without authorization, potentially with malicious intent.

According to the EASA (European Aviation Safety Agency), there are an estimated 1,000 cyberattacks targeting aviation systems worldwide every month. Some of these cyberattacks include:

  1. Deliberate modification of flight plans and GPS navigation data after compromising protocols and security of ground system(s).
  2. Disruption of electronic messages transmitted through the aircraft by attaching small devices to aircraft wiring.
  3. Exploiting aircraft control systems and executing malicious instructions on aircraft equipment and/or avionics for automated sabotage. An attacker can issue instructions to manipulate engine readings, compass data, or/and airspeed instruments among other systems to provide false readings to the pilot or issue commands to the system to it behaves abnormally. This leads to the potential threats posed by hacking, opening up the possibility of remotely hijacking pilot controls.

In September 2016, CBS News reported that cybersecurity expert Mr. Robert Hickey, working with the US Department of Homeland Security (DHS), took just two days to remotely hack into a Boeing 757 at the airport. Atlantic City (New Jersey) International Airport via radio frequency communications without touching or entering the aircraft.

Additionally, on April 10, 2015, a passenger allegedly hacked an aircraft’s avionics through the in-flight entertainment (IFE) system and tweeted that he was able to access the aircraft’s thrust management system. plane and order one of its engines to increase thrust for a decent result. in temporary yaw.

ACA B38M at YVR | Boeing 737-8 MAX. Photo: Michal Mendyk/Airways

Fighting cyber threats from the air

In the fight against cyber threats and cyber attacks related to aircraft, aircraft and avionics manufacturers, airlines, aviation authorities, organizations and other stakeholders should collaborate in the development and implementation of cyber threat risk reduction and mitigation measures.

The following course of action can be considered vital in the war against aerial cyberattacks.

First, secure the critical supply chain, as malware and illegal hardware could enter the supply chain. Aircraft manufacturers and airlines should secure remote access for suppliers and implement certain access segregation measures, comprehensive auditing of aircraft and aircraft systems, production facilities, suppliers and vulnerabilities.

Second, implement layers of security. The aviation industry should implement a layered approach to cybersecurity that includes multiple defense mechanisms such as unauthorized physical access restrictions, two-factor authentication, encryption, proactive threat hunting, insider threats, as well as managed detection and response.

Third, reduce the time required to install aircraft avionics patches; maintain and regularly inspect system logs.

Finally, develop and implement specialized cybersecurity training programs for operators to support the proper use of protocols for using protection tools to secure aircraft systems and prepare them to fend off cyberattacks.

Featured Image: Irkout

A new measurement framework will change the way organizations measure the impact of their actions


Developed by expert economists at the social value consultancy and software organization, Loop, along with contributions from academic, public sector, and nonprofit institutions, the measurement framework and its methodology are available to any organization to assess the impact of its actions.

The new measurement framework includes over 800 metrics – 90% of which are monetized – all aimed at increasing the robustness and accuracy of forecasts and estimates.

Gerard Toplass, Group CEO of Loop’s parent organization, The 55 Group, said, “Social value is an ever-changing space that continues to expand to reflect the social, environmental and economic world in which we live.

Gerard Toplass, Group CEO of Loop’s parent organization, The 55 Group

“It is vital that this continues to be the case in order to increase the robustness and accuracy of forecasts and estimates.

“At Loop, we’re proud to use the National Social Value Standard framework because, with these updates, we believe it’s the broadest, most robust, and most accessible framework available.”

“Our Loop economists worked hard on the framework alongside the National Social Value Standard to ensure a more comprehensive and diverse range of measures and valuations were achieved.

“We are excited that the new social value measurement framework is rolling out and look forward to the future of social value.”

Loop, which uses the framework in its software, noted how it was able to use its expertise in the field to help develop the standard, with each outcome and grouping reviewed by Loop economists in line with the latest academic and government thinking.

The update includes streamlining the social value pillars into three impacts – social, environmental and economic – which the loop says creates a clearer and more compatible framework structure.

Many metrics have also been renamed or consolidated in an effort to improve consistency and make them more user-friendly.

They are now grouped under five headings to better structure and improve navigation: Jobs, apprenticeships and internships; Workforce welfare, training and skills; Supply Chain; Community, charity and other stakeholders; and Environment.

Ken Chalk, Senior Economist at Loop, said: “This is the most significant update to the framework in recent times, with the large-scale changes made now allowing future iterations to focus on minor tweaks.

“We decided it was time to develop this new version, as methodologies and understanding of social values ​​continue to mature.

“Whether it’s new methodologies being developed or a more sophisticated and adapted use of existing approaches, the goal is to increase the robustness and accuracy of the framework.

“The changes made are essential to ensure a more accurate and aligned with Her Majesty’s Treasury Green Book representation of social value, which can then help drive more effective creation of positive impacts.

“We are confident that the updated framework has resulted in a more comprehensive and diverse range of measurements and assessments, and we look forward to feedback.”

Loop was founded in response to the Social Value Act 2012, with the aim of providing a range of services to help businesses and public sector organizations measure the social impact they are creating.

The Rise of Arkansas


Positive economic trends are coming together simultaneously in different parts of the state. They point to the potential for a Golden Age in Arkansas if government, business and municipal leaders in this state can make the right decisions over the next five years.

That’s a big “if,” especially given Arkansas’ history of shooting itself in the foot.

Arkansas history students can list the stupid decisions and man-made disasters that have held this state back for nearly 200 years. There was the decision to secede from the Union in 1861. With vast areas covered in mountains and few slaves in those hills, Arkansas should have been a border state like Missouri or Kentucky.

There was Governor Orval Faubus’ fateful decision to bar nine black children from entering Little Rock Central High School in the fall of 1957. The central desegregation crisis became the biggest news in the world that year and retarded economic development for decades.

I could go on. To take advantage of this rare convergence of economic trends, we need to do a few things right.

For starters, we need to elect a better quality of people to public office. The kind of local leaders who once ran for office no longer want to be part of a mean, mean-spirited, and often just plain dumb political arena. When these people sit on the sidelines, fringe characters are elected.

I’m not just talking about the Arkansas Legislature, where the overall quality is the lowest in my life. I am also talking about municipal councils, county quorum courts and school boards.

The poor quality of elected officials could be the Achilles heel that prevents us from taking full advantage of this convergence. Good people have to leave the sideline and run. Good people who don’t show up should support qualified candidates financially. We have to do it right.

We need to realize that broadband access is to rural Arkansas of this century what electricity was to the century before. This is absolutely essential if rural Arkansas is to survive.

We need to realize that education is no longer just K-12. It’s kindergarten to 14th or 16th grade. Initially, we need to invest more taxpayers’ money in pre-kindergarten programs. Ultimately, we must stop starving higher education. We are never going to significantly increase the per capita income of the Arkansans until we do this. We have to educate well. There is no higher priority for the state government.

Community leaders must realize that economic development in the 21st century is no longer just about attracting manufacturing plants. It’s about attracting talented people. And you do it with biking and hiking trails, parks, vibrant downtowns, quality restaurants, and added quality-of-life amenities. Communities that plan to survive in the knowledge economy of the 21st century will be the ones that will.

The opportunity for a new era of Arkansas is here. Here are the emerging megatrends working in favor of our state:

No end in sight to Northwest Arkansas boom

Walmart is completing a corporate campus like this part of the country has never seen. Crystal Bridges is expanding. A medical school is on the way and Alice Walton will ensure that it is one of the best schools in the country. The University of Arkansas continues to grow. The business start-up scene is hot. Tens of millions of dollars are spent on quality of life assets such as mountain bike trails.

A think tank (Heartland Forward) inhabits northwest Arkansas. The region’s food scene is exploding, attracting national and international attention. A friend who grew up in southeast Arkansas and now lives in Washington, DC, recently returned for a Razorback football game. He was amazed at what he saw. Not one to exaggerate, he told me: “It really is becoming the best place to live in the countryside.

Central Arkansas becomes a logistics and financial hub

When Amazon built huge facilities at the Port of Little Rock and North Little Rock, it sent a strong message to other businesses. Today, Lowe’s, Dollar General and Tractor Supply are building large distribution centers. There are thousands of jobs that did not exist two years ago. And other major distribution facilities are likely on the way.

Meanwhile, financial institutions such as Bank OZK and Simmons Bank are transforming Little Rock into a regional banking center with hundreds of high-paying jobs. Other banks are making their presence felt. Go to the intersection of Chenal and Rahling west of Little Rock and watch the facilities being built by First Community Bank and Bancorp South. No one could have predicted this kind of growth in the financial sector ten years ago. It’s amazing to watch.

Steel Industry Grows in Northeast Arkansas

In January, US Steel Corp. (which previously bought Big River Steel near Osceola) announced it would locate a $3 billion plant in the area, creating 900 jobs with an average salary of more than $100,000. It will be the largest private capital investment in Arkansas history and the most advanced steel mill ever built. When operational, Mississippi County will produce more steel than any other county in America.

There will be four major steel mills operating in the county, as well as dozens of subsidiary companies. The steel boom in Mississippi County adds to the ongoing economic boom in the nearby Jonesboro-Paragould corridor that includes sectors ranging from manufacturing and education to health care and retail. Arkansas State University will continue to grow, including the hiring of Todd Shields as chancellor. Those who know Shields describe him as an academic superstar.

The golden triangle of Camden, Magnolia and El Dorado takes on new life

There is rapid growth in the defense industry, which already employs around 3,000 people near Camden. Companies with facilities there are replenishing stockpiles of weapons that were used to aid Ukraine in its war against Russia. Hundreds of additional employees are needed immediately. Defense experts say the trend for countries to build up their stockpiles of armaments could last for years.

At El Dorado, there is potential to extract lithium from brine for electric vehicle batteries. I am told that if these efforts are successful, it could equal the oil boom of the 1920s. The potential is there for the Golden Triangle to play a key role in the country’s energy and defense strategies.

In Magnolia is the growth of Southern Arkansas University at a time when many colleges and universities are struggling. SAU announced that it had a record number of registrations of 5,094 this fall, a 15% increase over the previous year. Retention rates are also on the rise.

Fighter planes arrive at Fort Smith

The US Air Force has chosen Ebbing Air National Guard Base as the preferred location for a training facility for foreign F-35 and F-16 pilots. Rob Ator, a retired Air Force colonel who is now director of military affairs for the Arkansas Economic Development Commission, said, “It’s like getting a 2,000 job project. It’s It’s like putting a Nissan manufacturing plant in the middle of Fort Smith.

Ator said it would be an “enduring mission” that could last 30 years or more. Tim Allen, president and CEO of the Fort Smith Regional Chamber of Commerce, calls him “an absolute game changer for Fort Smith.” US allies such as Singapore, Switzerland and Germany will now train their pilots in Arkansas.

Economic developments do not take place in one area. They are in West Arkansas, East Arkansas, South Arkansas, and Central Arkansas.

Are we going to capitalize on this unique moment in the history of our state? Or are we going to screw it up, as the Arkansans have so often done in the past?

Rex Nelson is editor of the Arkansas Democrat-Gazette.

How I created a Chrome extension to convert Reg US spelling • The Register


hands on The register began life in London in 1994 and today has journalists and other staff all over the world, including San Francisco, Sydney, Singapore, Berlin and beyond.

Previously, our vultures wrote in their local style: Americans used American spelling, Brits relied on British spelling, Australians were pretty much British style too, and everyone else did what they thought natural. If an article was, for example, written by the US team and published on the morning of the UK, the spelling would often be changed to British.

As we added more writers and editors around the world and reached more people around the world – now around 40 million unique readers per year – in all kinds of time zones, it became necessary for logistical and professional reasons to agree on a single consistent style for the entire site. After The register changed from a .co.uk to a .com during the pandemic, we chose the American spelling.

Why? Because it honestly reflects the true global nature of our readership. UK spelling may cause us to appear only in the UK. Yes, we were born in Britain, but today we welcome as many corporate techs as possible on the planet. We want our flavor of irreverent, informed tech journalism to spread everywhere, so we can do our part to challenge vendors, explain what’s going on, and bite the hand that feeds computing.

American spelling isn’t everyone’s cup of tea, though, or at least that’s the impression we’ve been getting from reading brick-centric notes thrown through our digital windows lately.

As an olive branch of that passionate segment of our readership with a preference for King’s English, this vulture decided to create a Chrome browser extension to change words in published articles from American spelling to English. British spelling.

It’s called Spellerizer, because I was going to be subtly stupid in hopes of setting myself apart from the sprawling, unrepentant stupidity that is the new normal of the internet. Also, the stupid name is a reminder that the extension doesn’t work very well. But hey, it’s free.

Translation, even between American and British spellings, is an art that requires consideration of context. Spellerizer isn’t that clever; it relies on a brute-force search-and-replace algorithm that pays no attention to the words around it. So if it sees “check”, it will change the US spelling to “check”, even though the proper UK spelling in this case is also “check”.

Really, I should have relied on a machine learning model to make more informed spelling changes. But it wouldn’t have been a weekend coding project. Feel free to submit improvements via GitHub.

My hope in creating Spellerizer is to demonstrate that it is reasonably easy to write a browser extension and to encourage those with modest knowledge of JavaScript to give it a try.

Of course, there are similar options, such as shell, Perl, or Python scripts to fetch, translate, and spit out pages. But the browser is a particularly important piece of software and worth customizing if you like writing code.

Spellerizer can be downloaded and installed from the Chrome Online Store or his GitHub repository. The former is a better option if you want it to persist and get updates – some people report that Chrome removes manually loaded (unzipped) extensions on browser restart for security reasons. However, this is not my experience.

Since I’ve never had an extension in the Chrome Web Store before, you can expect to see a warning – “This extension is not approved by Enhanced Safe Browsing”. – on the chrome://extensions/ post-installation page. Google Explain“For new developers, it usually takes a few months to gain trust.”

Spellerizer is not officially endorsed or supported by The register and its publisher Situation Publishing which makes no warranty as to its suitability or function. As the Chrome Web Store listing says, you probably don’t need it. But if you want it, if you really really want itmy editors are fine with the existence of the extension for now.

from google Chrome extension API documentation is a good place to get acquainted with the quirks of building a browser extension. Once you have a basic idea of ​​how the main components (the manifest, service worker, content scripts, and other extension-related web pages) relate to each other, it’s worth worth installing an extension like Chrome extension source reader (CRX) to view the extension’s source code from the Chrome Web Store before downloading.

It’s possible to view the source code of an extension that’s already installed, but it takes a bit more effort because you need to know the path to Chrome’s extension folder (chrome://version/ -> [Profile Path field]/extensions) and then recognize the correct 32-character identifier used for the extension’s directory name among others that may be present.

Spellerizer may be more complicated than necessary because I chose to implement internationalization – a way to replace visible text strings in the extension with translated text according to the language set by the browser. The localize.js The script gathers text values ​​from HTML page elements marked with the “data-i18n” attribute so what replaces translations taken from the messages.json case.

The extension, written using Manifesto v3works by loading the service worker, background.jsand showing onboarding-page.html during installation. Foreplay aside, it adds a listener function to the Spellerizer icon, which if you followed the instructions and pinned to browser barwill be visible without digging into the extensions context menu.

The listen function attached to the Spellerizer’s vulture icon triggers the content-script.js file, which does the heavy lifting. If you click on it while viewing a Register page, it retrieves the orthographic data file, spelling_data.json (made available by developer Heiswayi Nrird under MIT license), and runs through all DOM nodes – a tree structure used to organize the elements of a web page.

The approach I took wasn’t particularly sophisticated – I’ve since learned that there’s a more concise way to iterate over DOM nodes using a Surveyor object – but loops within loops do the job. The scanWords function (line 20, content-script.js) separates the display text associated with DOM nodes into individual words and compares each to each of approximately 1700 US/UK word pairs. If it finds a match, it replaces the US spelling with the UK spelling, preserving the case of the original.

If the script finds words to replace, it will update the extension icon badge with a number representing the number of words swapped. The badge disappears when you click on another browser tab. And if you recharge a Register page, all the changes made disappear because they are client-side only.

There is also an options page I added to test persisted data through the local storage API. Accessible via a ctrl-click on the Spellerizer icon, the options menu features a single checkbox labeled “World Peace”.

As you can imagine, this has no effect. Enjoy. ®

Biden’s executive order seeks to strengthen data privacy framework between European Union and United States | White & Case srl


After a two-year absence of a legal framework for the transfer of personal data from the EU to the United States, President Biden signed an executive order on October 7, 2022 on strengthening safeguards for intelligence activities on Transmissions to the United States (the “Executive Order”), which will usher in a new EU-U.S. Data Privacy Framework (the “Framework”). The framework will regulate how US intelligence agencies can collect data from EU citizens and create new mechanisms to deal with any allegations that personal information has been collected or processed in violation of US law or the framework. .

The framework, which was first announced as an agreement in principle by Biden and European Commission President Ursula von der Leyen in March 2022, aims to restore the legal regime governing data transfers from the EU to United States, after the previous regime, the Privacy Shield, was struck down by the Court of Justice of the European Union (“CJEU”) in 2020.

Although the order authorizes measures to implement this new framework under US law, ultimately the European Commission will now have to issue an adequacy notice to approve the framework.

Main provisions of the executive decree

  • Mandates that U.S. intelligence agencies may collect signals intelligence only for a defined national security objective, only when necessary to advance a validated intelligence priority, and only in a manner commensurate with that priority; U.S. signals intelligence activities must further consider the privacy and civil liberties of all individuals, regardless of nationality or country of residence;
  • Creates requirements for the processing of personal data collected in signals intelligence and extends monitoring to verify compliance and remedy instances of non-compliance;
  • Creates a multi-step redress mechanism for citizens of “eligible states” (apparently including the EU) and certain regional economic organizations to obtain a binding review of allegations that their personal information has been obtained or processed in violation of U.S. law or the Order, including:
    • A Civil Liberties Protection Officer (“CPLO”) in the Office of the Director of National Intelligence to investigate complaints and determine corrective action binding on the Intelligence Community, subject to a second level of review, below ;
    • The creation of a Data Protection Review Tribunal (“DPRC”) to issue independent and binding review of CPLO decisions. DPRC judges will be appointed from outside the U.S. government, must have a background in data privacy and national security, and will be protected from removal;
    • Directs the U.S. intelligence community to update policies and procedures to reflect the safeguards provided in the order, and directs the Privacy and Civil Liberties Oversight Board to review these policies and procedures annually.

US – EU Data Transfers – A Changing Landscape

In announcing the order, President Biden emphasized that a key objective of the framework is to provide legal certainty around transatlantic data transfers, in the context of the $72 trillion economic relationship between the United States and the EU.

US and EU officials have been negotiating the terms of the framework since the previous US-EU data privacy regime, governed by the Privacy Shield agreement, was struck down in July 2020 by the CJEU. In this decision, known as Schrems II, the CJEU overturned the European Commission’s 2016 adequacy decision approving the Privacy Shield for two main reasons: first, because it determined that the Privacy Shield data protection did not adequately protect EU citizens against US methods of collecting national security data, and secondly, because there were no adequate redress mechanisms for EU citizens. EU in the event of an alleged breach of privacy.

The new framework appears to directly address these issues through new restrictions on the collection of signals intelligence and the establishment of the tiered redress mechanism. Notably, the restrictions incorporate “necessary” and “proportionate” language often used in EU case law, define permitted and prohibited legitimate purposes for the collection of signals intelligence, and identify specific privacy and civil liberties safeguards. . In addition, the redress mechanism is a marked improvement over the mechanism in the old Privacy Shield Framework, which allowed individuals to go to a US State Department ombudsman. These mechanisms, among others incorporated into the Executive Order, reflect efforts by the United States to improve its approach to protecting the privacy of data subjects in the EU since Schrems II.

As the proposed new framework goes through the approval process, companies should plan to continue using these SCCs and BCRs until the new framework is actually implemented in such a way. that these are no longer necessary.

Next steps

With the US order now signed, the European Commission is expected to prepare a draft adequacy decision for consideration by member governments and the European Data Protection Board. As a result of these reviews, the European Commission is to issue an adequacy notice affirming that the new framework provides European citizens with data privacy safeguards, in relation to transfers to the United States, that meet the requirements of the GDPR. While it remains unclear whether EU authorities will view the new framework as sufficiently protective, following the announcement of the executive order by the White House, the European Commission (“EC”) issued a statement stating that she did not believe that the European Court of Justice would invalidate this agreement. The EC noted, “[t]The Commission’s objective in these negotiations has been to respond to the concerns raised by the Court of Justice of the EU in the Schrems II judgment and to provide a durable and reliable legal basis for transatlantic data flows. This is reflected in the safeguards included in the Executive Order. . . .”

On the US side, the Attorney General issued implementing regulations to create the DPRC. Additionally, Commerce Secretary Gina Raimondo said she would send various implementation documents from US government agencies to her EU counterpart. Secretary Raimondo also said the new framework will update the privacy principles that companies must adhere to under the framework (formerly known as the EU-US Privacy Shield Framework Principles) and that the Department of Commerce will work with framework participants to transition to the updated principles under the framework. The framework.

Businesses, including the more than 5,300 multinationals that previously relied on the Privacy Shield framework before its invalidation, are eager to see a new framework to streamline data transfers between the EU and US states. United. Many companies that needed to transfer personal data from the EU to the US States used other approved personal data transfer mechanisms, such as standard contractual clauses and binding corporate rules, to attempt to comply with the transatlantic transfer of personal data requirements under the EU General Data Protection Regulation (“GDPR”).

Meanwhile, Max Schrems, the Austrian privacy activist who launched the first challenges that overturned previous data transfer frameworks, has already indicated that he will challenge the new framework and has expressed skepticism that to the validity of the new DPRC as a tribunal and whether the EU and the US are truly aligned on what constitutes “necessary” and “proportionate” data collection and use by intelligence authorities.


The new framework fills an important gap and promises to give businesses greater legal certainty when transferring personal data from the EU to the US. transferred to the United States, further strengthening the development of the United States data privacy framework.

Does your digital transformation need some fine-tuning? Don’t leave operational tasks behind


Despite the well-meaning efforts of management, a key element of digital transformation is often overlooked. Neglecting to prioritize the automation of operational tasks can slow your progress. Dinesh Varadharajan, Kissflowactions what you need to know to get you back on track.

Picture it: you’re a Grammy-winning rock star ready to embark on your first stadium tour, a hallmark of success in the entertainment industry. The process of planning and executing a spectacular series of performances involves many stakeholders. What fans see on stage is not possible without painstaking operational effort behind the scenes.

In today’s business, total digital transformation is the pillar of success. But like a stadium visit, it is impossible to succeed without an efficient and transparent method of executing all operational tactics. It is only when you support a wide range of collaborative internal functions with technology that full digital transformation is made possible. So what’s holding things back?

Why many digital transformation initiatives are stagnating

Despite well-meaning management efforts, digital transformation most often fails – 70% of the time, according to McKinsey. A difficult process to bear, digital transformation fails for several reasons. At a high level, there is too often a misalignment between IT managers and business leaders. Digital transformation is over-emphasized on back-end infrastructure with little to no focus on forward-looking front-end business value. Adopting new technologies, new software, or basic IT modernization without defined business outcomes is not a recipe for success.

Moreover, as with any process considered transformational, digital transformation requires a change in culture. To optimize this change, a company’s culture must embrace and foster an environment that embraces continuous learning. Leaders should set the standard for internal communication initiatives that encourage cross-departmental collaboration, where IT and business teams work together. The relationship between these teams must be developed, nurtured and reviewed regularly to ensure that the synergy is not lost. Additionally, as change occurs, business leaders need to consider the longevity of the systems and processes they create. Are they adaptable in an even more digital future? Can they be easily taught to the next generation of business leaders?

Another reason digital transformation efforts fail is because business transformation is overlooked or never optimized. CIOs and other business leaders often focus on building or purchasing basic solutions to bolster their CRM, ERP, or data analytics capabilities. However, more granular operational level applications are left behind and never developed because IT does not see them as a priority. Digital transformation is not possible without business transformation (OT), but what drives OT?

Addressing “long tail” tasks – the key to business transformation

Neglecting to address OT as part of your journey to complete, end-to-end digital transformation leads to many manual processes for internal operations that waste valuable time and resources. When ignored, these “long tail” operational applications become the missing part of a true and complete digital transformation. It’s like organizing a concert tour without operational support for contracts, lights, sound, ticket sales, etc. In terms of operational transformation, what do we mean by long-tail applications?

At Kissflow, we call all of these operational projects together the long tail. If we view the work of an organization as a parabola distorted to the right, many “long tail” operational tasks are clogging the system with inefficient manual processes. Long-tail applications include approval management, creative requests, incident management, customer onboarding, IT help desk, and more. Neglecting to support these long-tail tasks can prevent your organization from achieving true operational efficiency (and subsequently, digital transformation), but how can you build and run these long-tail applications?

Achieve business transformation with low-code and no-code technology

Operational transformation can be achieved when long-tail operational tasks are automated or enabled through a collaborative application. However, the key to this step is to include the most valuable assets: people. When employees have command and control of operational tasks, they are empowered to contribute to operational change. The roadies and sound crew make this rock show a hit.

Traditionally, building solutions to automate work processes was tedious because it added to the IT backlog and required near-constant management. Today, C-suite personnel and IT managers can empower their business users (citizen developers) to build and implement custom applications tailored to their use cases. Low-code and no-code platforms open the door for business teams in the trenches to build apps for long-tail operations, freeing up IT teams to focus their efforts on higher-level strategy and helping to scale applications once the power of no-code has reached its limits.

Low-code and no-code tools allow teams of people without specific coding language expertise to contribute to real operational change. Platforms that use prebuilt templates in a design environment that doesn’t require advanced skills allow citizen developers to help an organization’s overall business transformation initiatives. With custom configurations available, teams will also feel empowered to utilize these tools to the fullest for their specific use cases.

Learn more: 3 reasons why businesses need to be prepared for digital transformation

Where digital transformation meets operational efficiency

Digital transformation cannot exist in silos. For successful digital transformation, companies need to transform their operations. Business transformation can only be achieved by actively eliminating and managing long-tail processes. LCNC platforms have become a key tool for business users to manage the long-tail bottleneck.

These employees take ownership of these processes and are invested in the outcome, making the transformation more collaborative and comprehensive. The unintended consequences of using LCNC platforms can also be quite surprising. Non-technical employees who aren’t bogged down by laborious manual processes will be happier and more fulfilled. They will be satisfied knowing that they are contributing to the transformation of their organization without relying on IT to drive the momentum. Real change happens when everyone is involved.

Operational tasks are the leg work needed to put on a great show. Whether you’re a marketer or an IT specialist, your input can be invaluable. In the end, the whole is greater than the sum of its parts. When business transformation is the structure that supports a larger digital transformation initiative, your transformation “turn” is bound to be a resounding success!

What best practices have you considered to refine your digital transformation strategies? Share with us on Facebook, Twitterand LinkedIn.


How GitHub Copilot Could Get Microsoft Into a Copyright Storm


An anonymous reader quotes a Registry report: GitHub Copilot — a programming self-suggestion tool formed from public source code on the Internet — was caught generate what appears to be copyrighted code, prompting an attorney to investigate a possible claim of copyright infringement. On Monday, Matthew Butterick, attorney, designer, and developer, announced that he was working with law firm Joseph Saveri to investigate the possibility of filing a copyright claim against GitHub. There are two potential lines of attack here: is GitHub improperly training Copilot on open source code, and is the tool improperly emitting other people’s copyrighted work – excerpt training data – to suggest code snippets to users?

Butterick has been criticizing Copilot since its launch. In June, he publishes a blog post arguing that “any code generated by Copilot may contain license or intellectual property violations”, and should therefore be avoided. That same month, Denver Gingerich and Bradley Kuhn of the Software Freedom Conservancy (SFC) said their organization would stop using GitHub, largely because Microsoft and GitHub released Copilot without addressing concerns about how the machine learning was dealing with the various open source. licensing requirements.

Copilot’s ability to copy code verbatim, or nearly so, surfaced last week when Tim Davis, professor of computer science and engineering at Texas A&M University, discovered that Copilot, when prompted, reproduced its copyrighted sparse-matrix transposition code. Asked for comment, Davis said he would rather wait to hear from GitHub and its parent Microsoft about his concerns. In an email to The Register, Butterick said there had been a strong response to news of his investigation. “It’s clear that many developers have been concerned about what Copilot means for open source,” he writes. “We hear a lot of stories. Our experience with Copilot has been similar to what others have found – that it’s not hard to get Copilot to issue verbatim code from identifiable open source repositories. as we expand our investigation, we expect to see “But keep in mind that verbatim copying is just one of many problems presented by Copilot. For example, a software author’s copyright in their code can be infringed without textual copying. Additionally, most open source code is covered by a license, which imposes additional legal requirements. Has Copilot met these requirements? We are investigating all such issues.” GitHub’s documentation for Copilot warns that the output may contain “unwanted patterns” and puts the responsibility for intellectual property infringement on the Copilot user, the report notes.

Bradley Kuhn of the Software Freedom Conservancy is less willing to set aside how Copilot handles software licensing. “What Microsoft’s GitHub did in this process is absolutely unconscionable,” he said. “Without discussion, consent or engagement with the FOSS community, they have stated that they know better than the courts and our laws what is or is not permitted under a FOSS license. ‘grant of all FOSS licenses, and, more importantly, the more freedom-protecting requirements of copyleft licenses.’

Brett Becker, assistant professor at University College Dublin in Ireland, told The Register in an email: “AI-assisted programming tools are not going away and will continue to evolve. Where these tools fit into the current landscape of programming practices, law, and community standards are only just beginning to be explored and will also continue to evolve.” He added, “An interesting question is: what will be the main drivers of this evolution Will these tools fundamentally change future practices, laws and community standards — or will our practices, laws and community standards prove resilient and lead to the evolution? tools?”

iPad Pro with M2 chip announced – capture ProRes video and use Davinci Resolve


Apple announced the new iPad Pro with the M2 chip, which they claim offers the ultimate combination of portability, versatility and performance. What probably interests our readers the most is the ability to use DaVinci Resolve.

Capture ProRes video and use Davinci Resolve

With the new media engine and image signal processor, combined with the cameras, users can capture ProRes video for the first time and transcode ProRes footage up to 3x faster. This means content creators can capture, edit and publish video from a single device in the field.

Screenshot 2022 10 19 at 11 54 04

You can also run several pro apps available for the iPad, including DaVinci Resolve, Adobe Photoshop, Affinity Publisher 2 iPad, Octane X, uMake, and more.

Now, DaVinci Resolve is not yet available for the iPad Pro. Apple has given no indication of its release or cost. It will be interesting to see if the iPad version will be able to run the full DaVinci Resolve suite or if it will be a stripped down version.

It’s also interesting to see Apple leaving a third-party program that can be used as a very capable NLE on its mobile platform when FCP isn’t available.

iPad Pro in Space Grey.

M2 chip

iPad Pro in 11-inch and 12.9-inch sizes.

The M2 features an 8-core CPU which is claimed to be up to 15% faster than the M1, with advancements in performance and efficiency, and a 10-core GPU, delivering graphics performance up to 35% faster. Combined with the CPU and GPU, the 16-core Neural Engine can process 15.8 trillion operations per second, which is 40% more than the M1.

The M2 chip also features 100 GB/s of unified memory bandwidth, 50% more than the M1, and supports up to 16 GB of unified memory.

Apple Pencil hover experience

Apple Pencil is now detected up to 12mm above the screen, allowing users to preview their mark before making it. It also allows users to draw and illustrate with greater precision. For example, with Scribble, text fields automatically expand as the pen approaches the screen, and handwriting converts to text even faster. Third-party apps can also take advantage of this new feature to enable entirely new marking and drawing experiences.

Faster wireless connectivity

A woman using an iPad Pro with Smart Keyboard Folio.

The new iPad Pro supports the fastest Wi-Fi connections with support for Wi-Fi 6E. Downloads are claimed at up to 2.4 Gb/s, 2x faster than the previous generation. Wi-Fi + Cellular models with 5G (sub-6GHz and mmWave) now support more 5G networks worldwide.

iPadOS 16

iPad Pro with Magic Keyboard connected to Studio Display using Stage Manager on iPadOS 16.

Along with major updates to Messages, new tools in Mail and Safari, the new Weather app, and more ways to interact with photos and videos with Live Text and Visual Look Up, iPadOS 16 also introduces powerful productivity features that enhance the iPad Pro experience. :

  • Manager is an all-new multitasking experience that automatically organizes apps and windows, making it quick and easy to switch between tasks. Later this year, Stage Manager will unlock full external display support with resolutions up to 6K, so users can organize the perfect workspace and work with up to four apps on iPad and up to four apps on the external display.
  • Desktop apps enable new features optimized for display on iPad Pro – making apps perform better with new elements and interactions, including consistent undo and redo, redesigned online find and replace experience, new document menu , customizable toolbars, and the ability to change file extensions, view folder size in Files, and more.
  • Reference mode enables the 12.9-inch iPad Pro with Liquid Retina XDR display to meet color demands in workflows such as review and approval, color grading, and composition, where accurate color and consistent image quality are essential. This means professional users, including photographers and videographers, can edit HDR images and video with all the realistic detail in their hands, and on-set cinematographers can preview content in a color profile. which represents the final capture.
iPad Pro customizing pages on iPadOS 16.
iPad Pro using Reference Mode in Frame.io on iPadOS 16.

Price and availability

iPad Pro in silver with a white Magic Keyboard and Apple Pencil, and space gray with a black Magic Keyboard.

The new iPad Pro is available to order starting today, October 18, at apple.com/store and in the Apple Store app in 28 countries and regions, including the WEavailable in stores from Wednesday 26 October.

The new 11-inch and 12.9-inch iPad Pro will be available in Silver and Space Gray finishes with 128GB, 256GB, 512GB, 1TB, and 2TB configurations.

The 11-inch iPad Pro is starting to $799 USD for Wi-Fi model and $999 for the Wi-Fi + Cellular model; the 12.9-inch iPad Pro begins to $1,099 USD for the Wi-Fi model, and $1,299 USD for the Wi-Fi + Cellular model.

Apple Pencil (2nd generation), available for purchase separately, is compatible with the new iPad Pro for $129.

Magic Keyboard is available in black and white for $299 for the new 11-inch iPad Pro and $349 USD for the new 12.9-inch iPad Pro, with layouts in over 30 languages.

The Smart Keyboard Folio for the new iPad Pro is available for $179 USD for the new 11-inch iPad Pro and $199 USD for the new 12.9-inch iPad Pro.

The Smart Folio is available in black, white and navy blue for $79 for the new 11-inch iPad Pro and $99 USD for the new 12.9-inch iPad Pro.

iPadOS 16, the powerful operating system designed specifically for iPad, will be available from Monday, October 24 and will ship free with the new iPad Pro. iPadOS 16 will be available as a free software update for iPad (5th generation and later), iPad mini (5th generation and later), iPad Air (3rd generation and later), and all iPad Pro models.

Customers can trade in their current iPad and get credit to buy a new one. When their device has been received and verified, Apple will credit the value to their payment method.

REGENT signs a partnership agreement with the city of Nice, France, to develop a coastal shipping framework


Nice, France–(BUSINESS WIRE)–REGENT, the pioneering electric glider company for sustainable high-speed maritime travel, today announced a memorandum of understanding with the city of Nice, France, to develop a new all-electric means of regional coastal mobility .

According to the MOU REGENT and the City of Nice agree to advance regulatory and infrastructural frameworks to bring electric seaglider technology to the region, in consultation with local stakeholders and industry – a significant step in Nice’s efforts to develop sustainably, attract new investment and increase the efficiency of regional travel for residents and tourists.

“We look forward to collaborating with Mayor Estrosi and having the opportunity to share our technological and network development expertise with Nice, in the south of France and along the European coast. The future of cabotage is on track for Nice,” said Billy Thalheimer, CEO and co-founder of REGENT. “In many ways, it’s the perfect city to develop a global brand for one of the world’s first electric glider networks, reducing the environmental impact of flights, cars and marine vehicles that use fossil fuels and making passenger and freight transport more accessible and affordable to support the local economy is an ideal solution for this timeless UNESCO World Heritage city.

Under the MoU, REGENT and the City of Nice will identify needed policy reforms, develop best practices for infrastructure zoning and recommend new laws to pave the way for future growth. In the agreement, the two parties will work with community organizations to identify transportation gaps and solutions to increase connectivity, especially in underserved areas, to increase equity and access. The MOU also includes a framework to create workforce development and education initiatives to strengthen the City’s ability to support job creation and build a more coastal mobility system. efficient.

With design approval from Paris-based Bureau Veritas in August 2022, REGENT is moving full speed ahead with the development and commercialization of all-electric seagliders, a new zero-emission mode of transport that combines the high speed of an aircraft with the low cost operation of a boat via hydrofoil technology in coastal areas. With $7 billion in pre-orders, the Providence, Rhode Island-based company is currently developing its full-scale 12-person sea glider that is expected to reach commercial markets in 2025.

Globally, REGENT is also building similar sea glider transportation networks in locations such as Hawaii and has a growing international customer base to increase global capacity for this innovative mode of transportation.


REGENT is pioneering the future of sustainable maritime mobility. REGENT is building seagliders, a new class of electric vehicles that run exclusively on water and will dramatically reduce the time and cost of moving people and goods between coastal towns. The Seagliders will service routes up to 180 miles at 180 mph with existing battery technology and up to 500 miles with next-generation batteries, via existing dock infrastructure. For more information, visit regentcraft.com or follow us on LinkedIn, Twitterand Instagram.

About the City of Nice (Nice Côte d’Azur Metropolis)

The city of Nice is the fifth largest city in France and the second on the Côte d’Azur. It provides connections to cities and islands in the Mediterranean, including services to Monaco and Corsica. It is part of the Nice Côte d’Azur Metropolis, which brings together some fifty other municipalities in the region and is responsible in particular for the development and promotion of maritime activities.

Front office BPO services market growth CAGR of 7.2%, restraints, mergers and forecast (2019-2028)


Front Office BPO Services Market Size

The Global Front Office BPO Services Market was valued at USD 151.56 Billion in 2018 and is projected to grow significantly at a CAGR of 7.2% from 2019 to 2028.

NEW YORK, NEW YORK CITY, USA, Oct. 17, 2022 /EINPresswire.com/ — The global front office BPO services market was valued at US$151.56 billion in 2018 and is expected to grow significantly at a CAGR of 7.2% from 2019 to 2028.

BPO services for the front office include services that deal with customer interactions, such as outbound and inbound sales, help desks or customer service centers, telemarketing, and customer service. Front office BPO services include document management services, such as finance and accounting.

In recent years, leading industries have seen a significant increase in the use of external organizations to perform their upstream business functions. This includes data management and troubleshooting. These industries can save time and reduce operational and labor costs by using front-office BPO services.

Although industries have great expertise in the design and development of their products, they are unable to provide customer service due to lack of bandwidth or access to resources available in-house. Industries are increasingly turning to BPO for front-office operations because they can leverage their global knowledge and access world-class capabilities.

Many industries are now focusing on outsourcing their operations to BPO in front offices to grow their business. This allows them to access new markets and bring their product base or service delivery points closer to their end users. Industries can reduce risk by having outside companies manage their business functions while realizing their potential benefits.

Get sample with latest trends and future advancements at: https://market.us/report/front-office-bpo-services-market/request-sample/

(Use company email id to get higher priority)

This report helps both major players and new entrants to analyze the market in depth. This will help key players to decide their business strategy and set goals. This report provides key market insights including Front Office BPO Services market size, growth rates and forecasts in key regions and countries, and growth opportunities in niche markets.

The Front Office BPO Services report contains data based on rigorous 1st and 2nd tier research using proven research methods. This report provides comprehensive information which helps in estimating each part of the Front Office BPO Services market. This report has been created considering several aspects of market research and analysis. These include estimates of market size, market dynamics, company and market best practices. Entry-level marketing strategies, positioning, segmentation, competitive landscape and economic forecasts. Industry-specific technology solutions, roadmap analysis, targeting of key buying criteria and in-depth benchmarking of vendor offerings.

The following major manufacturers are assessed in this report

Xerox Global Services
Hewlett Packard Enterprise Co.
Convergys Corp.
Sitel Worldwide Corporation
IBM Global Services
Williams Lea Group Limited
Ricoh Company Ltd.
Attento S.A.
Alliance Data Systems Corporation
TeleTech Holdings Inc.

Global Front Office BPO Services Market Statistics by Types:

Client management services
Document Management Services

Global Front Office BPO Services Market Outlook by Applications:

Health & Pharmaceutical
Retail and consumer goods
IT & Telecommunications
Aerospace and Defense
Services & Logistics
other vertical

Some of the major geographies included in this report are:

– North America (the United States and Canada and the rest of North America)

– Europe (Germany, France, Italy and Rest of Europe)

– Asia-Pacific (China, Japan, India, South Korea and Rest of Asia-Pacific)

– LAMEA (Brazil, Turkey, Saudi Arabia, South Africa and rest of LAMEA)

For instant access, purchase the report here: https://market.us/purchase-report/?report_id=26752

Highlights of the report:

1. Industry Trends (Historical 2015-2020 and Future 2022-2031)

2. Key regulations

3. Technology roadmap

4. Intellectual Property Analysis

5. Value chain analysis

6. Porter’s Five Forces Model, PESTLE and SWOT Analysis

Here are the questions the research paper will answer:

How is the Front Office BPO services market developing with regions like North America, Europe, Asia-Pacific, South America, Middle East and Africa?

What advanced technologies are responsible for the growth of the market?

What are the key applications of the Front Office BPO Services market? What growth prospects for market applications?

Where are the leading products in the Front Office BPO Services market?

What are the challenges that the Global (North America and Europe and Asia-Pacific and South America) must overcome to be commercially viable? Is their growth and commercialization dependent on falling costs or technological/application breakthroughs?

What is the outlook for the Front Office BPO Services market?

What is the difference between the performance characteristics of Front Office BPO services and established entities?

Inquire before purchase (use company details only): https://market.us/report/front-office-bpo-services-market/#inquiry

These are the reasons to invest in this report

1. The Front Office BPO Services Market provides analysis for the changing competitive landscape.

2. Analytical data and strategic planning methods are involved to help businesses make informed decisions.

3. 10-year assessment of the Front Office BPO services market.

4. It allows you to understand key product segments.

5. The Market.us team shed light on market dynamics such as drivers and restraints, trends and opportunities.

6. It provides regional Front Office BPO Services market analysis along with business profiles for several stakeholders.

7. It provides massive data about trending factors which may influence the development of the Front Office BPO Services Market.

See detail of Front Office BPO Services Market research report, click the link here: https://market.us/report/front-office-bpo-services-market/

Contact us :

Global Business Development Teams – Market.us

Market.us (Powered by Prudour Pvt. Ltd.)

Email: [email protected]

Address: 420 Lexington Avenue, Suite 300 New York City, NY 10170, USA

Tel: +1 718 618 4351

Website: https://market.us:

Market.us Business Development Team
Prudour Pvt Ltd
+1 718-618-4351
write to us here
Visit us on social media:

What every engineer needs to know in 2022


In an increasingly cloud-based and decentralized world, 77% of businesses are use or plan to use DevOps. At a time, 64% of leaders in various IT functions struggle to find qualified DevOps practitioners.

So, as the rush for a limited talent pool continues, it’s time for developers to get busy; they should learn DevOps as part of application development early on. A company and its end users can tolerate a bug or poor implementation at the application level. And while developers can usually learn on the job, with DevOps that’s impossible: a suboptimal solution, prone to vulnerabilities. Infrastructure support a product or service can seriously damage a business.

Additionally, developers looking to pursue DevOps should view the tools in combinations rather than individual items. For example, suppose you want to build a Java-language application on the Linux open-source operating system and deploy it to Kubernetes to automate deployment. The toolset used here is very different from a developer wanting to build and deploy an application to an individual Linux machine.

These are just a few of the reasons why DevOps is in high demand. But let’s dive deeper and see how engineers can improve their skills to fill the talent gap. (Also read: The best places in the world to work in tech.)

8 DevOps Skills Every Engineer Needs

IT managers and their developers may wonder how DevOps differs from their daily lives, so here’s what they should pay attention to and the skills they should consider strengthening this year:

1. Cloud infrastructure skills

Cloud operations and DevOps go hand in hand; the effectiveness of one depends on the other. The DevOps methodology is essential to keep production moving forward, but the cloud provides the platform to test, deploy, and release the code.

Developers with knowledge of cloud platforms, like AWS or Azure, would increase an organization’s ability to deliver high-speed applications and services, configure firewalls, and administer infrastructure.

2. Source code management

Storing the results of work and sharing them with colleagues is essential to the DevOps culture. Source Code Management (SCM) is a set of automation tools that track revisions made to a program to ensure that all team members stay on top of changes to source code and associated files. . Developers should get their hands dirty with Git ASAP, by trying out GitHub and GitLab.

3. Container Orchestration and Management

Developers need understand the concepts of virtualization and containerization to assess risk.

Virtualization allows developers to run multiple systems on the hardware of a single server. Containerization is more flexible, allowing multiple applications to be deployed anywhere: on an on-premises server or a virtual machine in the cloud, among other environments. For container orchestration of larger applications, Kubernetes is a popular open source out-of-the-box solution, and Docker Swarm works well for smaller applications.

4. Coding and scripting

Python, Ruby, and Go are some of the most popular DevOps scripting languages. Developers should learn at least one for automation scripts. Additionally, Bash is used for Linux and Shell for Windows.

In an increasingly Linux-based cloud world, Bash is a must. DevOps professionals will need to write programs in different languages ​​and manage the code using GitHub, for example. Fluency in each language means greater control over how DevOps enables efficiency. (Also read: The 5 programming languages ​​that built the Internet.)

5. CI/CD and automation

A DevOps automation skill set is closely related to coding ability.

Jenkins, for example, is an open-source continuous integration and continuous delivery (CI/CD) software tool written in Java. It is used to implement CI/CD workflows (called “pipelines”), package applications, run vulnerability scans, and build docker images. Another reason to revise your coding languages.

6. Observability and monitoring

Applications cannot run forever; they will have problems. In fact, they’re like loaves of bread: they’ll go moldy pretty quickly. A developer is responsible for monitoring the “mold” (health, resilience and reliability of the system) and doing iterations.

Monitoring tools like Prometheus and Nagios can be configured to send alerts if something goes wrong. To visualize the data stored in these types of tools, use Grafana or one of its alternatives. (Also read: How to Choose the Right Application Monitoring Tool.)

7. Cybersecurity Basics

Developers should know how to install firewalls, proxy servers, load balancers, and manage ports.

8. Planning, communication and collaboration

A standout developer must have “soft” skills, be organized and business-oriented, and have a high level of commitment to breaking down silos between development and operations teams.

In general, developers need to start communicating with business stakeholders, peers, and other departments in technical and business terms while viewing technology as a tool to drive business results.

Traditionally, the definition of DevOps was anything that made the development process more efficient. Five years ago, many chief technical officers (CTOs) thought it was enough to have development and operations professionals in the same room.

Today, DevOps has grown and become more complicated: the unofficial icon is an infinity symbol, which proves that it is an infinite and continuous process. It’s not like finishing a sculpture or an essay. Integrations require constant maintenance and consistent assessment of the product development lifecycle is vital.

DevOps is also left to the discretion and knowledge level of particular developers or IT teams to implement as they see fit. They come up with their own instrumentation preferences, policies, and practices, which invariably leads to inconsistencies, fractured systems, huge technical debt, software license duplication, and developer turnover. (Also read: How Remote Work Impacts DevOps and Development Trends.)

This type of downfall often happens when developers and engineers look at DevOps only as a CI/CD pipeline. While this enables fast and reliable code delivery with a collection of tools, it forgets why DevOps was born.

DevOps isn’t just a set of tools: it’s a results-driven model for quickly delivering high-quality code that impacts the business. This requires cultural philosophies, practices, coding/scripting, and a full Software Development Life Cycle (SDLC) separate from commercial feature development.

DevOps Challenges

The mad rush to adopt DevOps is due to the obstacles and challenges that developers are currently facing, such as:


Dev and Ops teams speak different languages: Developers want to quickly produce code for new features to push production, while Ops teams like to maintain stability, make sure projects run smoothly and are more reluctant to make changes.

DevOps is a mechanism that ensures this miscommunication is somewhat removed, bridging the gap between rush to production and slow approvals with built-in deployment plans.

Lack of cybersecurity training

Developers often lack the training to create secure systems. Operations teams tend to focus more on security and in some organizations there is also a dedicated security team.

If developers push an application into production and the operations team approves it, but security does not, the cost of patching vulnerabilities is exorbitant. This amplified the need to “shift left.”

It’s not just a security lock pushed in at the end; security should be built into every layer of the product ecosystem. (Also read: What is DevSecOps?)

Lack of regulatory and compliance training

Not only do applications need to be secure and perform well, but they also need to be built in a prescribed way, as required by regulators. Organizations that had to inject HIPAA, HITRUST, or SOC2 after the fact may be painfully faced with the need to build apps the first time.

Cost of manual development

Manual tasks make development costly and prone to friction. There’s a lot of manual work involved – from maintaining a server, to testing apps, to backing up.

The idea is that the code is natively bug-free, but it’s not. When testing (functionality, regression, load, stress, security, and performance) is done manually, it’s just inefficient engineering.


DevOps would not be complete with a simple deployment of tools; the secret lies in the combinations of technologies. Learning how they interact with each other is essential for developer success and long-term maintenance. IT managers who need DevOps skills fast should assess what knowledge their developers already have from the list above and what areas their team should focus on.

But at the end of the day, DevOps doesn’t have a standard playbook or step-by-step implementation guide that guarantees results. It is a highly specialized space with a large number of sub-specialties. Thus, it is never the work of a single person and requires robust orchestration between different specialists. In reality, it’s about continuous learning and improvement, just like it’s about CI/CD. (Also read: DevOps managers explain what they do.)

How the Account Aggregation Framework Will Help Reduce the Severity of Rising Loan Scams


With many fintech companies offering easy credit, determining a loan applicant’s creditworthiness becomes increasingly difficult unless all data is available from all sources the person has taken out loans from.

Even though digital lending has eliminated the need for physical paperwork, consumers are more likely to abandon a loan application if asked to produce bank statements, even if this is done digitally. According to statistics, 70% of loan applications are abandoned along the way because they are too time-consuming. Additionally, scanned bank statements are more susceptible to tampering because data changes are harder to detect, even with a screen scraping program. It would still require a human agent to verify specific facts and eliminate cases of fraud, which will slow down the process and scare away good borrowers.

To address the issue, the Reserve Bank of India (RBI) has authorized the establishment of an Account Aggregation (AA) framework. It would collect data from all loan providers to assess the legitimacy of loan applicants, thus reducing the number of loan scams. Before discussing the benefits of the system for consumers, it is essential to understand how the AA framework works.

What is Account Aggregator (AA) and how does it work?

The Account Aggregator (AA), Financial Information User (FIU), and Financial Information Provider (FIP) are the three main components of the system. An AA is a new type of NBFC that the Reserve Bank of India (RBI) has certified to manage customer authorization for financial data sharing. The AA is established following an inter-regulatory agreement entered into by the RBI, the Securities and Exchange Board of India (SEBI), the Insurance Regulatory and Development Authority (IRDAI) and the Pension Fund Regulatory and Development Authority ( PFRDA) through the Financial Stability and Development Board (FSDC).

Financial information providers can digitally send consented data to financial information users (FIUs), including banks, lending agencies and NBFC financial information providers (FIPs). Institutions that oversee user data are known as FIP Financial Information Providers. These are primarily banks, mutual funds, pension funds, and some NBFCs that serve as the source of personal or business data that FIUs can obtain through account aggregation requests.

What are the benefits of the account aggregator network?

The account aggregation framework will help in the collection and consolidation of all disparate financial data, facilitating access to credit for individuals and businesses. The most crucial feature of this framework is the authorization of the parties involved. The network of account aggregators is meant to alleviate the current credit bottleneck of the Indian economy, which is caused by a lack of organized data exchange channels. Formal loans can be channeled through the network, allowing for higher consumption and investment.

Additionally, it can help financial institutions more effectively assess a borrower’s creditworthiness, make better lending decisions, and avoid bad debts and non-performing assets. This mechanism should also increase the number of borrowers for these financial institutions.

Users benefit from the framework as it will streamline the loan application process which was previously time consuming. As financial organizations gain access to their personal financial data, individuals can expect better tailored financial products.

Additionally, by integrating secure digital signatures and end-to-end data sharing, AA will help eliminate fraud typically associated with physical data sharing. Borrowers are fully aware of what they are agreeing to throughout the process and can revoke their consent at any time, ensuring that misuse of data is avoided on both sides.

Simultaneously, AA’s previous option was analyzing bank statements, which is both expensive and error-prone when done manually. Moreover, the most common type of fraud consists of individuals who simply fabricate bank statements in order to obtain a loan. These problems will disappear with AA because the data will come directly from the bank or financial organization.

Additionally, because account aggregators combine data from different sources, they ensure that a wider range of criteria is considered when signing up, reducing the risk of fraud. Early in the risk assessment process, bad borrowers are screened out and transaction costs are reduced. As a result, lenders can be more liberal with loan amounts granted to genuine borrowers.


The digital lending industry is poised for a transformation that promises speed and scale, with 22 million new loan applications per month. More importantly, account aggregators will drive much of the technological innovation and policy reform that will help lenders attract, analyze and approve more prime consumers.

Adopting the AA framework streamlines the process and reduces the cost of loans and asset management for consumers, thereby greatly reducing the risk of loan scams.



The opinions expressed above are those of the author.


Two suspected hit-skip drivers arrested: Orange Police Blotter



Property damage, hit-skip: Park Avenue

Police responded to the intersection of Orange Place and Park for a report of a post in the roadway at 7:46 a.m. on October 8, noting upon arrival that it was attached to a pedestrian traffic light that appeared being hit by a car.

While driving through the area, an officer found a 2012 Smart car in a nearby Pinecrest parking lot, unoccupied and showing front driver’s side damage consistent with a post, as well as a flat front passenger tire, with both passenger side rims bent.

The license plate went to a woman from Pepper Pike and when police attended her home at 10.43am she said she thought she had just hit the curb and she didn’t think he needed to tell anyone after the accident.

She was cited for failure to control and leaving the scene of an accident.

Property damage, hit-skip: Boulevard Chagrin

LJI Collision management reported on October 5 that their sign had been hit overnight by a gray vehicle, based on the piece of fender left at the scene. Another check of an identification number on the fender patch showed it belonged to a 2015-2019 Nissan Murano SUV, with personnel securing CCTV footage that led police to a Cleveland Heights man , 65, who was cited for failing to control and leave the scene of an accident.

Flight: Harvard Road

Police responded to Cooper’s Hawk Winery around 9.30pm on October 8 after a Concord Township woman was going to pay her bill when she realized that her wallet – containing ID, insurance and several credit cards credit – was missing from her purse.

She told police she and a friend arrived at 6 p.m. and went to sit at the high tables in the bar by the patio door, and she hung her purse on the back of her chair. At one point, she said she felt movement and noticed a couple sitting behind her.

While still in the basement, the Concord wife began receiving multiple alerts on her phone beginning around 9 p.m. from credit card companies indicating attempted fraudulent charges at Walmart ($999 ) and Macy’s ($3,000). Credit card companies denied these transactions and winery management planned to check the security video for suspicious activity.

Mandate served: Orange Place

Patrol officers were notified via investigative monitoring equipment of a 2019 Audi driving south on Orange Place at 2:45 p.m. on October 8, with the owner showing a criminal drug warrant through the office of the Cuyahoga County Sheriff.

Police checked the area and found the unoccupied car parked in front of Wasabi Steakhouse. Upon returning to the car around 4 p.m., police arrested the 34-year-old Oakwood Village man and transported him to the county jail.

Learn more about the Sorrow Solon Sun.

Software specialists vs cloud giants


Good morning! Industry-specific SaaS companies achieve unicorn status by building software for underserved markets. And cloud giants are taking notice.

Flipping the SaaS narrative

There’s an age-old idea in the software industry that if you want to be big, you have to build a company that can meet the needs of every business. But a litany of enterprise software vendors are overturning that thesis by relentlessly focusing on niche industries — and winning, writes Protocol’s Aisha Counts.

There is a growing list of industry-specific software vendors, often referred to as vertical software companies, which have gone public with eye-popping numbers.

  • ServiceTitan, for example, has found success by creating a software platform that spans marketing, human resources, and finance for plumbers, electricians, and other business ventures. It is now worth a estimated at $8 billion.
  • But it was not always easy to convince investors that there was a market for software aimed at commercial industries, as field service companies were often overlooked by investors and an industry-specific focus was seen as limiting by growth-obsessed venture capitalists.
  • “The orthodoxy back then was that you draw a box around a software category, then you do really well in that category, and then you try to sell it to as many customers as possible,” the co-writer said. founder of ServiceTitan. Vahe Kuzoyan

The success of vertical software has pushed SaaS giants to launch industry-focused clouds in manufacturing, healthcare, financial services and more.

  • It is a recognition by these companies that to compete and win against the next generation of startups, they will need to deepen their expertise.

But vertical software vendors say they’re not worried on the Salesforces and Microsofts that settle in their space.

  • They know that the big SaaS giants lack the knowledge to compete meaningfully in their industries. And the truth is, it just doesn’t make financial sense for horizontal players to focus on one industry.

Read more: How vertical SaaS companies are taking market share from cloud giants

A boiling chip industry

Over the past year, it has become increasingly clear that the good times for the chip industry are coming to an end. The situation doesn’t look likely to improve anytime soon, writes Protocol’s Max Cherney.

The situation looks grim as we approach next year, at least as TSMC executives say. “We probably expect [in] 2023, the semiconductor industry is likely to decline,” CEO CC Wei said on the earnings call. “But TSMC isn’t immune either.”

  • For a conservative, low-key company like TSMC, this is about as strong a warning as the tech industry is likely to receive.
  • And to wrap that up, TSMC said Thursday it plans to cut spending on new factories and tools to $36 billion from $40 billion to $44 billion.
  • So far, the decline in demand and the adjustments made by TSMC are due to the rapid drying up of the consumer chip market.

There is potentially good news for chipmakers. Data center sales and automotive markets haven’t started to decline…yet.

  • TSMC gets demand forecasts from those customers, and Wei made it clear that there haven’t been enough significant changes to those plans to cause company executives to make major adjustments to their 2023 plans. .
  • But Wei said the company isn’t ruling out the possibility of a correction or lower demand next year, so taking a more conservative approach. “They might have a correction as well, but we haven’t seen that yet, to be honest with you,” he said.

Protocols Special Report: Securing the Enterprise

There is no respite from the wave of cyberattacks against businesses. But to stop hackers, many companies will need to evolve their strategy. Presented by At the bay.

Read the protocol’s special report

The long road to electrification

The electric vehicle transition is already underway, but it will need to accelerate to keep within reach the Paris Agreement goal of limiting global warming to 2 degrees Celsius. To speed things up, automakers and governments have set targets to phase out the sale of gas-powered vehicles. However, these objectives vary from country to country and from car manufacturer to car manufacturer.

Some automakers set their own targets. BMW and Ford, for example, want 50% of all sales to be electric by 2030. Mazda has pledged 25% of its vehicles to be electrified by 2030, while the rest of its offerings will be hybrids. .

  • Others have more aggressive goals: Volvo, GM and Honda want their entire lineups to be zero emissions by 2030, 2035 and 2040, respectively.

Many countries have set targets for the sale of electric and zero-emission vehicles, including some of the largest automotive markets. They have also established charging infrastructure plans with the aim of making electric vehicles more accessible to the masses.

To have maximum impact, electric vehicles need to reach the rest of the world, especially emerging economies. Two- and three-wheel options are spreading everywhere, especially in Asia, and are already making a dent in oil consumption. But the United States and other wealthy economies are exporting dirty used cars, which will make the transition more difficult.

Read more: The long road to electrification

People are talking

Mark Zuckerberg admits he missed a giant change in social networks, which helped TikTok succeed:

  • “[Meta was] kinda slow at that because it didn’t fit my model of a social thing, it felt more like a shorter version of YouTube to me.

Early-stage startups can struggle with pay transparency laws, said Matt Schulman, Founder and CEO of Pave:

  • “I bet 95% of 20-person startups don’t even have the notion of pay bands at this point.”

make moves

Cariad, Volkswagen’s software unit, spends over $2 billion on a 60% stake in Horizon Robotics, a Chinese technology company.

Nutanix is consider selling, according to the WSJ. The cloud company would target private equity or other industry players as potential buyers.

Take-Two closes its doors Reading Points, the studio behind mobile game Dots, resulting in 65 job cuts. He acquired the studio in 2020 for $192 million.

Two senior Amazon executives left the company. Tom Taylor was vice president of Amazon Alexa and Gregg Zehr was president of hardware research and development. They both spent over a decade in the business.

Fintech CEO Andrei Cherny Suctionwithdraws as the company faces delays in its SPAC merger. Olivia Albrecht, director of corporate sustainability, returns to her role.

Health technology company Noom is cut 10% of its staff, that is about 500 people. The company’s financial director Mike Nounan left the company for a role at Tripadvisor earlier this year.

NYDIG Crypto Broker fired a third of its staffor about 110 people, according to the WSJ.

In other news

Netflix launches its new ad-supported level in 12 countries next month. Pricing for the new plan will vary from country to country.

Instant employee data was exposed by a breach at Elevate, a third-party document analysis company.

Google could cope antitrust charges Next year on its digital advertising business. The company risks being sentenced a fourth time in the EU to a fine of more than one billion euros.

Meta has filed a request to dismiss an FTC complaint on his acquisition of Within, saying the agency’s anti-competitive claims are “pure speculation.”

Elon Musk is under investigation by federal authorities for his “conduct in connection” with his takeover bid on Twitter.

Alphabet, Amazon and Meta disguised their lobbying attempts as they tried to influence the outcome of the EU’s Digital Markets Act and Digital Services Act, according to complaints from members of the European Parliament.

Apple launches a savings account at Goldman Sachs. Apple Card holders will be able to open a “high yield” savings account connected to their mobile wallets.

FTC officials trade stocks more heavily than those of other major US agencies, according to the WSJ. They are invested particularly strongly in technologyand stocks held often overlap with the agency’s work, the newspaper added.

Nintendo settled a job CONTESTATION with a former employee who alleged that the company terminated them for union activities. The company will pay over $25,000 in arrears.

Not your average phone booths

Google is experimenting with a prop from old sci-fi movies: holographic video chats. The Starline project, first announced last year, is a video call booth that uses specialized cameras and sensors to create a realistic experience for callers. Now it’s expanding its real-world testing with a early access program in several technical offices, including Salesforce, WeWork and T-Mobile.

Protocol Event: Securing the Enterprise

In today’s global landscape, all businesses operating on the Internet have to deal with cybersecurity threats, not just huge tech companies. In this event, we look at current best practices for securing large and small and medium-sized businesses, providing viewers with a true landscape of threats and insights they can use to make decisions about which strategy best supports their goals. commercial. Presented by At the bay.

look now

Thoughts, questions, advice? Send them to [email protected], or our tips line, [email protected] Good day, see you Sunday.

BAE Systems Viper MLV II reduces vulnerability of F-16 aircraft to cyberattacks


BAE Systems has launched the Viper Memory Loader Verifier II (MLV II), a new version of a maintenance capability that will reduce vulnerability to cyber attacks on F-16 aircraft.

“Our first generation Viper MLV has 20 years of proven reliability and durability in harsh flight line environments,” said Carl Huncharek, director of the F-16 product line for BAE Systems. “This new product release will include cyber-enhanced aircraft mission capabilities, with an open system architecture that reduces life cycle costs.”

In addition to flight-critical capability to load and verify software on the aircraft, the Viper MLV II supports mission data file uploads, flight and fault data downloads, and software updates. third-party application.

Viper MLV II supports more than 100 onboard systems for the F-16, including mission and flight critical systems such as radar, electronic warfare, mission and flight control computers, recorders crash-resistant data carriers, engine control systems, navigation and communication systems. .

Two nations are fielding the Viper MLV II through Foreign Military Sales for the F-16 Block 70/72 aircraft, commanding six systems with follow-on potential for 15 additional systems. The system is fully compatible with the entire F-16 fleet and will use existing interface cables. While the Viper MLV II will be positioned for all new F-16 deployments, BAE Systems also continues to support current equipment.

The system is field proven, with more than 700 systems in use by the US Air Force and more than 25 allied nations. The Viper MLV II will be developed and produced at BAE Systems’ facility in Fort Worth, Texas.

The Beauty Health Company: Compelling Long-Term Growth Story (NASDAQ: SKIN)


Group4 Studio

On the occasion of its 2022 investor day (webcast here), the Beauty Health Company (NASDAQ: SKIN), a provider of skin treatment solutions, presented a new medium-term financial plan until 2025 which was reviewed favorably even against the optimistic Pre-event on street perspectives. Still, there were signs of caution in the numbers as management opted for a fairly wide range to account for potential headwinds ahead. Since the mid-term guide also does not factor in the benefits of potential increases in M&A or product launches (e.g. the Glow ‘n Go home launch), there is ample room for the line upside down. The current valuation multiple may seem high at first glance, but the potential for double-digit revenue and earnings growth, supported by significant addressable market opportunities and operating leverage advantages, should see SKIN grow in its valuation.

Data by YCharts

Medium-term P&L expectations reinforce underlying growth potential

Over the next three years, SKIN has guided revenue doubling to $600-700 million (20-27% CAGR), supported by an addressable market opportunity of over $250 billion in the domain. skin and hair. Geographically, Europe, the Middle East, Africa (EMEA) and Asia-Pacific are the main growth regions compared to the United States – compared to the low % of penetration of teenagers in the Americas, the company has a much lower double-digit presence in EMEA and ~1% in Asia. As these targets are also on an organic basis, mergers and acquisitions or new product launches present no potential upside in the numbers, leaving plenty of upside opportunities here.

Medium term targets

The beauty and health company

The revenue growth target supports an equally strong Adjusted EBITDA guidance through 2025. With the expansion of margins charged at entry, SKIN is expected to achieve margins of 18-20% by 2023 (well above today’s

International expansion as a key growth engine

The growth plan for the next three years is based on the planned expansion of the international business segment, which is expected to contribute more than 50% of total revenues by 2025. After allocating investment dollars to build a sales infrastructure and new international HydraFacial Experience Centers, as well as an international launch of Syndeo in 2023, SKIN is well positioned to further accelerate its expansion in EMEA and Asia-Pacific.

Syndeo Outlook

The beauty and health company

Partnerships will also be a key lever in its planned expansion – the company recently expanded its partnership with Sephora, with plans to launch in Singapore (a twelve-door opportunity) in the coming month. If successful, SKIN will launch across Asia-Pacific in September 2023, presenting a >200 doors opportunity. In the medium to long term, Sephora alone offers an opportunity of ~2.7,000 stores worldwide (note that SKIN is currently in nearly every North American store), while opportunities to also leverage its Lower cost “Perk” treatment has an added benefit.

Sephora partnership

The beauty and health company

Additionally, the recently announced partnership with Organicell will enable the company to generate a new revenue stream through its anti-aging/anti-inflammatory booster. Given the short development timeframe (approximately six months) and the potential to expand its processing areas, the successful execution of this “build and expand” strategy should result in significant customer expansion and increase in customer spending over time.

Additional benefits of mergers and acquisitions

SKIN also remains disciplined on the M&A front, with its criteria ranging from financial growth to strategic considerations such as differentiated products/services with high customer satisfaction (measured by Net Promoter Score). This is largely consistent with past management views, but in light of webcast comments delaying an acquisition timeline (“opportunistic rather than temporal philosophy”), I suspect that any M&A catalyst will take time to materialize. That said, SKIN has a healthy cash balance to deploy, and given the current assumption of no M&A in the mid-term forecast, any acquisition through 2025 would be an additional upside against targets. financial. Despite the capacity of the company’s balance sheet, small tech add-ons are likely to be the main focus at this point, especially with the company looking to improve upon the core Hydrafacial platform.

Philosophy of mergers and acquisitions

The beauty and health company

A compelling mid- to long-term growth story

As investors increasingly focus on the earnings potential of growth companies, SKIN’s new medium-term plan to triple adjusted EBITDA by 2025 (implying 25-30% margins) will be well received by investors. Execution so far has been strong, with key partnerships established with companies like Sephora and Organicell, while the transition to localized manufacturing in Asia-Pacific is already well underway. Assuming management continues on this path, net sales CAGR of 20-27% and EBITDA margin expansion of 10-15% should be within reach over the next few years. Net, SKIN appears well positioned given its differentiated product offering, addressable market opportunities and operating leverage potential, justifying the current valuation.

Contrast Security Expands GitHub Coverage with New SCA GitHub Action


More than 73 million developers currently use GitHub, and rightly so, since GitHub has become a necessary part of any software company in need of a web presence. And while GitHub offers some level of security in its toolset, its scanning speed and accuracy capabilities ultimately fall short when compared to other security tools on the market. This forces many users to rely on a third-party integration available on the GitHub marketplace for additional assistance in securing their continuous integration/continuous deployment (CI/CD) pipeline against vulnerabilities such as Apache Log4j 2.

As modern web development management becomes more complex, security coverage is a growing concern for Application Security Officers (AppSec), DevOps, and developers, who all want to ensure that code released to their repository is secured from all source code and open-source vulnerabilities before it is sent for deployment.

That’s why Contrast Security is expanding its SCA coverage with its all-new GitHub Stock feature, marking Contrast Security’s first step in delivering a superb SCA experience to developers and AppSec teams. New GitHub Stock Feature scans without any agent dependencies, allowing developers to scan their code before public release and automatically withhold it from deployment to prevent the introduction of vulnerable libraries into the main branch. In the CI/CD pipeline, the Contrast agent can now be deployed to get richer data on SCA usage.

Curious about our new GitHub action?

Contrast built its SCA feature to equip developers with fast and accurate security for real-world applications. That’s why Contrast has made this GitHub integration available not only in our enterprise version of Contrast SCA, but also in Contrast’s new free developer security move, CodeSec. Powered by the same Software Composition Analysis (SCA) analysis engine as the enterprise version of Contrast SCA, CodeSec allows developers to rely on the same level of performance and accuracy as our enterprise customers — free!

Test the latest from Contrast SCA GitHub Stock function for yourself with CodeSec!

To learn more about this new GitHub Contrast action:

Orlando Villanueva

Orlando Villanueva

Senior Product Marketing Manager, CodeSec, Contrast Security

More than 73 million developers currently use GitHub, and rightly so, since GitHub has become a necessary part of any software company in need of a web presence. And while GitHub offers some level of security in its toolset, its scanning speed and accuracy capabilities ultimately fall short when compared to other security tools on the market. This forces many users to rely on a third-party integration available on the GitHub marketplace for additional assistance in securing their continuous integration/continuous deployment (CI/CD) pipeline against vulnerabilities such as Apache Log4j 2.

As modern web development management becomes more complex, security coverage is a growing concern for Application Security Officers (AppSec), DevOps, and developers, who all want to ensure that code released to their repository is secured from all source code and open-source vulnerabilities before it is sent for deployment.

That’s why Contrast Security is expanding its SCA coverage with its all-new GitHub Stock feature, marking Contrast Security’s first step in delivering a superb SCA experience to developers and AppSec teams. New GitHub Stock Feature scans without any agent dependencies, allowing developers to scan their code before public release and automatically withhold it from deployment to prevent the introduction of vulnerable libraries into the main branch. In the CI/CD pipeline, the Contrast agent can now be deployed to get richer data on SCA usage.

Curious about our new GitHub action?

Contrast built its SCA feature to equip developers with fast and accurate security for real-world applications. That’s why Contrast has made this GitHub integration available not only in our enterprise version of Contrast SCA, but also in Contrast’s new free developer security move, CodeSec. Powered by the same Software Composition Analysis (SCA) analysis engine as the enterprise version of Contrast SCA, CodeSec allows developers to rely on the same level of performance and accuracy as our enterprise customers — free!

Test the latest from Contrast SCA GitHub Stock function for yourself with CodeSec!

To learn more about this new GitHub Contrast action:

The transport and automotive sector to influence the digital twin


NEWARK, Del, Oct. 11, 2022 (GLOBE NEWSWIRE) — The global digital twin technology market currently stands at US$9.5 billion and is expected to reach US$72.65 billion by 2032 with a CAGR robust by 22.6% from 2022 to 2032.

Digital twins technology includes XR (extended reality, cloud, Internet of Things (IoT) and AI (artificial intelligence). They are widely used to digitally represent real-time data. In other words , digital twins help create predictive models and assess the likelihood of success of various physical prototypes before deployment.The post-Covid era is more about adopting digital twin technology in multiple applications far beyond production – such as telecommunications, healthcare, real estate and retail.

Organizations that opt ​​for the digital twin can easily access behavioral data from connected products (IoT, in particular), which helps product engineers as well as designers identify future problem iterations. Overall product performance could be improved.

Get a sample copy of the report @ https://www.futuremarketinsights.com/reports/sample/rep-gb-4267

In telecommunications services, digital twin technology extends support for telecommunications service providers in designing complex network architectures and upgrading existing network infrastructures to accommodate new solutions. such as FTTH (Fiber to the Home) and Software Defined Networks.

Healthcare staff, using digital twin technology, are able to view data from infected patients to perform treatment simulations. Commercial and residential sectors prefer to present 3D models of smart city projects.

The transportation and automotive vertical holds the largest market share in the digital twin technology market owing to the growing use for simulation, design, MRO (maintenance, repair and overhaul), the making and the consequences. The digital twin makes it easy to visualize a race car engine to assess the importance of servicing components that are at risk of damage or burnout. The digital twin could also be used after the fact to gather feedback.

In the aerospace sector, the digital twin is used in the design and development of products with ML (Machine Learning), AI (Artificial Intelligence), cloud computing and IoT (Internet of Things). The aerospace vertical uses digital twins to develop one or more critical systems such as thermal protection system, avionics, energy storage systems, propulsion and airframes.

At the same time, the fact that cloud-based digital twins require online storage for asset information, leading to privacy and security concerns. Moreover, there is a shortage of qualified professionals, which makes it difficult to design an appropriate cybersecurity strategy.

Read the full report @ https://www.futuremarketinsights.com/reports/digital-twin-technology-market

Key takeaways from the digital twin technology market

  • The transport and automobile sector holds more than 15% market share due to the growing demand for automobiles. This could be explained by the growing adoption of electric vehicles everywhere.
  • Asia-Pacific is expected to grow at a CAGR of around 40% in the digital twin technology market, led by South Korea, Japan, India and China.
  • North America and Europe are in the mature stage of the digital twin technology market.

Competitive landscape

  • Microsoft Corporation in May 2021 entered into a collaboration with Aera Technology to integrate the latter’s cognitive operating system with the former’s twin technology to create a virtual representation in the automation process.
  • IBM Corporation entered into a long-term partnership with Siemens AG in June 2020 to announce the availability of an advanced solution combining elements of the former’s Maximo portfolio with the latter’s Xcelerator. The goal of this solution is to enhance SLM (Service Lifecycle Management) assets to establish a digital common thread between equipment manufacturers, project owners and product design to increase manufacturing capacity.
  • ANSYS, Inc. in March 2021, entered into a collaboration with ENGIE, so that the former’s twin technology will be used by the latter to develop a high-fidelity platform to provide 3D CFD (Computational Fluid Dynamics) results in real time.
  • Dassault Systèmes, in April 2021, renewed its partnership with Bouygues Construction to power the construction industry using a 3D experience platform to increase productivity.
  • Autodesk Inc., in April 2021, launched Autodesk Tandem (a virtual twin tool) to streamline real-time data flow between AEC (Architecture, Engineering, and Contracting) teams and building owners. The end result would be a dual technology model.
  • Microsoft in March 2022 announced its strategic partnership with Newcrest to adopt Azure as the preferred cloud provider globally and also work on digital twins with a sustainability data model.
  • Google Cloud, in January 2022, introduced a supply chain digital twin to provide manufacturers and distributors with precise operations visibility.

Visit for personalization @ https://www.futuremarketinsights.com/customization-available/rep-gb-4267

What does the report cover?

  • Future Market Insights offers an exclusive perspective and various real-time insights into the Digital Twins Technology market in its latest study, presenting a historical demand assessment from 2016 to 2021 and projections for 2022 to 2032.
  • The research study is based on application (manufacturing process planning and product design) and by end user (automotive, chemical, agriculture, oil and gas, and research and development).

Key segments profiled in the Digital Twin Technology market study

Per application:

  • Manufacturing process planning
  • Product design

Per end user:

  • Automotive
  • Chemical
  • Agriculture
  • petroleum gas
  • research

By region:

  • North America
  • Latin America
  • Asia Pacific
  • AEM
  • Europe

Additional Support for Purchasing This Report @ https://www.futuremarketinsights.com/checkout/4267


1. Summary

1.1. Global Market Outlook

1.2. Demand Side Trends

1.3. Supply-side trends

1.4. Analysis of the technology roadmap

1.5. Analysis and recommendations

2. Market Overview

2.1. Market Coverage / Taxonomy

2.2. Market Definition / Scope / Limits

3. Market Context

3.1. Market dynamics

3.1.1. Drivers

Check out IMF’s extensive coverage at Technology Domain

NFT Analytics Tools Market: Global Non-Fungible Token (NFT) Analytics Tools Market Revenue Totaled ~US$124.7 Million in 2021. NFT Analytics Tools Market is Expected to Reach ~506 US$.2 million by 2032 growing at a CAGR of 13.7% from 2022 to 2032.

Silicon-on-Insulator (SOI) Market: The Silicon-on-Insulator (SOI) market report recently released by Future Market Insights reveals that global Silicon-on-Insulator sales in 2021 held steady at US$1.1 billion.

Seismic Survey Equipment Market: The recently released Seismic Survey Equipment Market Analysis Report by Future Market Insights reveals that the global seismic survey equipment market sales in 2022 are estimated at 1. 6 billion US dollars.

Cloud OSS BSS Market: The recently released Cloud OSS BSS market analysis report by Future Market Insights shows that the global Cloud OSS BSS market sales in 2021 stood at US$24 billion.

Automatic Fingerprint Identification System (AFIS) Market: The increase in criminal and terrorist activities has increased the value of automatic fingerprint identification systems. Automated Fingerprint Identification System is a biometric identification method that uses digital imaging technology to collect, store and analyze fingerprint data.

About Future Market Insights, Inc.

Future Market Insights, Inc. is an ESOMAR certified business consulting and market research firm, member of the Greater New York Chamber of Commerce and headquartered in Delaware, USA. Recipient of the 2022 Clutch Leaders Award for high customer score (4.9/5), we have partnered with global companies on their business transformation journey and helped them achieve their business ambitions. 80% of the Forbes 1000 largest companies are our clients. We serve global clients across all leading and niche market segments in all major industries.

Contact We:

Future Market Outlook Inc.
Christiana Corporate, 200 Continental Drive,
Suite 401, Newark, Delaware – 19713, USA
Such. : +1-845-579-5705
For sales inquiries: [email protected]

Google AI’s new audio generation framework “AudioLM” learns how to generate realistic voice and piano music by listening to audio alone


Audio signals, whether human speech, musical composition, or ambient noise, involve different levels of abstraction. Prosody, syntax, grammar, and semantics are some ways to dissect and examine speech.

The problem of generating well-organized and consistent audio sequences at all three levels has been solved by combining the audio with transcriptions that can direct the generation process, such as text transcriptions for speech synthesis or MIDI representations for the piano. However, this method fails when it comes to representing non-transcribed audio characteristics, such as the speaking qualities needed to help people with speech difficulties.

Language models have shown that they can model high-level and long-term structures for various types of content. “Textless NLP” has recently been advanced regarding the production of unconditioned speech. In particular, without textual annotations, a transformer trained on discretized speech units can generate meaningful speech. The model is only trained on proper speech and synthesis is only possible with a single speaker. Thus, the diversity and the acoustic quality are still constrained.

A new search from Google presents a new framework called AudioLM for audio production that can learn to make realistic speech and piano music just by listening to audio. AudioLM surpasses earlier systems and pushes the boundaries of audio production with applications in speech synthesis and computer-aided music due to its long-term consistency (e.g., syntax in speech) and high fidelity. Using the same AI principles that guided the development of our other models, we created a system to detect synthetic sounds generated by AudioLM.

AudioLM uses two distinct types of audio tokens to address these issues. In the first step, w2v-BERT, a self-supervised audio model, is used to extract the semantic tokens. These tokens heavily downsample the audio signal to model long audio sequences while capturing local dependencies and long-term global structure.

It is possible to achieve high audio quality and long-term consistency by training a system to generate semantic and acoustic tokens. A low level of fidelity is present in the reconstructed audio when using these tokens. To overcome this restriction, the team uses a neural codec SoundStream to generate acoustic tokens that capture the nuances of the audio waveform and enable precise synthesis.

AudioLM is a music-only model that follows training using audio only. To represent an audio sequence in a hierarchical way, from semantic tokens to fine acoustic tokens, AudioLM combines different Transformer models. Similarly, a textual language model is taught, each step learns to predict the next token based on the tokens that preceded them.

  1. In the first phase, semantic tokens are used to model the overall structure of the audio file.
  2. Second, the complete semantic token sequence is introduced and the previous coarse acoustic tokens into the coarse acoustic model as conditioning, allowing the model to predict the next set of tokens. In this step, acoustic qualities are modeled, such as those of the speaker in a speech or the sound of a musical instrument.
  3. The final audio is refined by applying the fine acoustic model to the coarse acoustic tokens. Next, they recreated an audio waveform by feeding a series of acoustic chips into a SoundStream decoder. Once trained, AudioLM can be conditioned to short audio clips, allowing it to produce smooth loops.

To verify the results, human evaluators listened to audio samples. They judged whether they heard a natural continuation of a recorded human voice or a synthetic voice generated by AudioLM. Their results show a success rate of 51.2%. This means that the ordinary listener will find it difficult to tell the difference between speech generated by AudioLM and real human speech.

Researchers investigated the possibility that people mistake the brief speech samples generated by AudioLM for real human speech and took steps to reduce this risk. To do this, they developed a classifier capable of accurately identifying the synthetic speech generated by AudioLM (98.6% of the time). This shows how simple audio classifiers can easily identify continuations produced by AudioLM, despite their (almost) indistinguishability for some listeners. This is an essential first step in protecting AudioLM from abuse, and future work could investigate technologies such as audio “watermarking” to further strengthen security.

The study authors believe their work will pave the way for future applications of AudioLM to a wider variety of audio and the incorporation of AudioLM into an encoder-decoder framework for conditioned tasks such as text-to-speech and speech-to-speech translation.

This Article is written as a research summary article by Marktechpost Staff based on the research paper 'AudioLM: a Language Modeling Approach to Audio Generation'. All Credit For This Research Goes To Researchers on This Project. Check out the paper, project and reference article.

Please Don't Forget To Join Our ML Subreddit

Tanushree Shenwai is an intern consultant at MarktechPost. She is currently pursuing her B.Tech from Indian Institute of Technology (IIT), Bhubaneswar. She is a data science enthusiast and has a keen interest in the scope of application of artificial intelligence in various fields. She is passionate about exploring new technological advancements and applying them to real life.

Rams’ struggling offense faces dominant Cowboys defense


INGLEWOOD, Calif. — The Rams’ low-scoring offense has a patchy offensive line, a lukewarm running game and few answers for the wave of opposing rushers that has already sacked Matthew Stafford 16 times this season.

Pretty much the last thing the Super Bowl champions need to see this Sunday is Micah Parsons, DeMarcus Lawrence and the fearsome Dallas Cowboys defense at SoFi Stadium.

“From back to front, it’s all really impressive on tape,” Stafford said. “I’ve got great players, I’ve got a really solid scheme, it helps those players accentuate what they do well. They’ve done a great job after the setter, affecting the pocket in the games I’ve seen It will be a big challenge for us, really on all levels.”

While Stafford and the Rams (2-2) need a win to bounce back from a Monday night loss at San Francisco, the Cowboys (3-1) can cement their strong start under coach Mike McCarthy with a win over the road against the defending champions. The Dallas defense is doing most of the work, and it could be feasting on a Los Angeles offense that could play on the third strings at all three inside positions on the offensive line due to injuries.

Those absences have affected everything Sean McVay tries to do offensively, and Dallas’ pass rush presents an ominous challenge to Stafford’s health and the Rams’ efficiency.

“Obviously people take issue with our run defense because frankly they probably don’t want to deal with our pass rush in third-and-five or so,” McCarthy said. “So we have to stay focused on our run defense. I think that will be our biggest challenge going forward. If I was playing against our defense, that’s how I would do it.”

The Rams might find it tough: They’re 30th in the league with just 68.5 rushing yards per game.

The game is a reunion of the first regular season game ever played in 2020 at SoFi, the multi-billion dollar football palace built by Rams owner Stan Kroenke and defended by Cowboys owner Jerry Jones, whose company Home Legends manages stadium operations.

This rematch also once looked likely to mark the return of Cowboys quarterback Dak Prescott after a broken right thumb, but Cooper Rush’s 3-0 start as his replacement reduced the urgency of Prescott’s return. Instead, the Cowboys are expected to face Aaron Donald and Jalen Ramsey with Rush behind center again and the Dallas defense taking the game on his shoulders.


The Rams would drop below .500 for only the second time in McVay’s career with a loss. McVay has never had a losing season and Los Angeles has never been .500 after six games in one season during his tenure.

“All you can do is keep fighting,” McVay said. “I believe in these players, I believe in these coaches and I believe in people who are resilient and able to react. And every week is a new week. I want to start seeing improvements.”


Dallas running back Ezekiel Elliott knows all about the importance of finding Donald, the three-time NFL Defensive Player of the Year, before the snap.

“At running back, he always knew where he was, especially in that passing game,” Elliott said. “A lot of times this week you’ll see me checking on him before heading down that road. Like two years ago.”

Elliott specifically remembers the moment Donald “lifted me off the ground and threw me” in the Rams’ 20-17 win at SoFi in 2020.

“I still made the pass,” said the two-time running champion, who has a reputation as one of the best defenders in the league. “It was like a 20-yard gain, so it was a winning moment. But…”.


Cowboys defensive coordinator Dan Quinn and his Los Angeles counterpart Raheem Morris have been close since their days together at Hofstra. They coached with the Falcons from 2015 to 2020 before landing high-profile coordinator jobs that could lead them back to head coaching gigs.

“Dan and Raheem are very close, so it’s more of a process than a pattern,” McCarthy said of what the Cowboys can learn about the Rams from that connection. “The most important element for this week is to understand the game, the sequence and the way he looks at the game.”


Quinn also reunites with Rams linebacker Bobby Wagner, one of the star defenses he coached in Seattle when the Seahawks went to back-to-back Super Bowls in 2013-14.

Wagner was the primary tackle on the 2013 title-winning team with defense, dominating Denver in a 43-8 Super Bowl victory. After Seattle’s loss to New England the following year, Quinn was hired as Atlanta’s head coach.

“Sometimes we talk, ‘He’s a quarterback who’s seen it all. And so I would say on the other side of that, that’s what you expect from Wagner,” Quinn said. who can deceive (him).


Cooper Kupp is coming off a career-high 14 receptions against the 49ers, and he leads the NFL with 42 catches in four games. Dallas’ pass defense has been excellent, allowing just 171 yards per game, but Kupp produced three monster games (and a quiet outing against Arizona) in his freshman year after winning the player award. AP NFL Offensive of the Year.

When asked for the key to stop Kupp, Quinn replied, “Who, man. If there was a key, few people unlocked that door.”


AP professional football writer Schuyler Dixon contributed to this report.

Copyright © 2022 by The Associated Press. All rights reserved.

Lakewood Township man’s rare classic car set to fetch $1million at auction – Reuters


LAKEWOOD TOWNSHIP – Tom Maruska is certainly not shy about a challenge when it comes to restoring classic vehicles.

But his last project, a one-of-a-kind 1956 Mercury XM-Turnpike Cruiser, is in a class of its own.

The vehicle was badly rusted and completely disassembled, in addition to still having its wheels attached, when Maruska purchased it in 2018 from another car enthusiast in Ojai, California.

Nonetheless, he recognized the potential of the old show car, enough that he shelled out $100,000 for the distressed automobile and the multiple bins of uncataloged parts that had been removed from it. Before purchasing it, he sorted through enough of the mixed components to assume that the majority of the original and most critical parts were still there.

Tom Maruska paid $100,000 to buy this unique, rusty 1956 Mercury XM-Turnpike Cruiser from its owner in Ojai, California.

Contributed / Tom Maruska

Much of the damage to the vehicle occurred while it was left parked outside at a Detroit lot, where it was vandalized and then exposed to the elements for years, long before another car enthusiast classical seizes it, with the intention of restoring it himself. But he never succeeded and knowing Maruska’s interest in the vehicle, he agreed to sell it to her.

Maruska arranged for the car to be driven back to his home in Minnesota, then began the arduous task of ringing the body and putting a complicated mechanical puzzle back together.

1956 Mercury XM-Turnpike Cruiser in Lakewood Township Shop
Tom Maruska took this Mercury XM-Turnpike Cruiser to his Lakewood Township shop to begin restoring it.

Contributed / Tom Maruska

It didn’t help that there were few references to consult. The one-off concept car had been custom designed and assembled to take to the motor show circuit and gauge public interest in it before inspiring an actual, heavily dressed production model with fairly similar lines in 1957.

But this wasn’t Maruska’s first rodeo.

He had restored a 1954 XM-800. (XM stands for “Experimental Mercury.) This car, too, never made it to production and didn’t even have a working engine when it was first rolled out. times to gauge public reaction to the design, which was only fueled years later.After falling into the talented hands of Maruska, the restored and functional vehicle sold at auction in 2010 for $429,000 .

As for the XM-Turnpike Cruiser that Maruska plans to auction in January, he said it “should cost north of $1 million. At least, I hope it does.”

Several prominent classic vehicle auctions in the Phoenix area attract car collectors from around the world at the start of the year. Maruska has yet to decide which auction to attend, but said he has received several inquiries expressing interest in his XM.

Car sitting in a driveway.
The 1956 Mercury XM-Turnpike Cruiser featured rear fins, chrome exhaust pipes running through the quarter panel, and brake lights on the back of its roof as well as on the rear fins.

Steve Kuchera/Duluth News Tribune

Maruska noted that the market for restored classic cars has heated up in recent years, fueled in part by ultra-wealthy buyers willing to pay top dollar for something unique.

For this very reason, Maruska has avoided opportunities to show the vehicle, knowing that a “contest virgin” will be more valuable to many collectors looking to turn heads and make an impression.

Maruska has now brought 22 tired old vehicles back to their former glory, including a dozen Thunderbirds, and that number continues to grow, as does its reputation. At 73, he said he has no plans to give up on his painstaking restoration efforts, although he admits to being a bit slower to get back upright when rolling his vine under a undercarriage these days.

A whitewall tire.
A whitewall tire on Tom Maruska’s 1956 Mercury.

Steve Kuchera/Duluth News Tribune

Maruska said he always enjoyed working and considered it a hobby, although serious and expensive, which also kept him active.

“Otherwise I would be sitting around the house watching TV, eating crisps and getting fat,” he said.

Over the past three and a half years, Marsuska, who previously owned and ran a flooring business, estimates he’s put in at least 6,000 man-hours restoring his latest XM.

Probably the biggest challenge was fixing and replicating rusted parts of the car. In all, 13 sheets of 18-gauge sheet steel, 4 feet by 8 feet, were restored.

Rusty Undercarriage of 1956 Mercury XM-Turnpike Cruiser
The undercarriage of the 1956 Mercury XM-Turnpike was rusted after years of exposure to the elements.

Contributed / Tom Maruska

Although some publications suggest the vehicle had a 1955 Mercury convertible chassis, Maruska discovered that it was actually built on a 1954 F-250 chassis. The hand-built car was so beefy it sported 11 blades in its rear spring suspension, instead of the three-leaf spring found in typical vehicles of the time.

The folks at Mercury certainly didn’t skimp on the chrome either when they designed the Turnpike Cruiser. Maruska said he was lucky to have acquired all of the original detail parts with the vehicle, but needed to have them rechromed.

Luckily they were brass, not steel, which would have corroded with the body of the car. He hauled some 220 pieces to AIH Chrome in Dubuque, Iowa for plating at a total cost of about $80,000.

The vehicle features a unique pair of butterfly windows – plexiglass panels in the roof of the car that automatically tilt when triggered by an open door to aid in entry or egress.

Interior of the car.
The interior of Tom Maruska’s 1956 Mercury.

Steve Kuchera/Duluth News Tribune

Although the original windshield is long gone, the previous owner knew people in the automotive industry who created a clay model of the swept-up piece of glass, which was then used to produce a plaster cast which Maruska inherited when he purchased the vehicle. With the help of this mould, Maruska was able to get a new, custom-produced windshield.

The side glass was flat and he was able to get it cut locally at Zenith Auto Glass in Duluth.

The car’s other curved windows were Plexiglas, although they were badly discolored after decades of exposure to the elements. Maruska said that for years he had relied on one store to supply custom plexiglass, but the owner had passed away.

A car sitting in a driveway.
Tom Maruska’s 1956 Mercury XM-Turnpike Cruiser is a one-of-a-kind concept car, designed to gauge consumer interest at auto shows.

Steve Kuchera/Duluth News Tribune

Left to his own devices, Maruska decided to tackle the job himself. He made plaster molds of the old windows and then used them to fashion new duplicates.

“I got two free electric stoves on Craigslist and took them apart and put them together to make an oven big enough to put these butterfly roof sections in,” he said, showing the end result.

Maruska acknowledged there was a learning curve involved and said he went through quite a bit of plexiglass before dialing in the exact temperature and technique needed to accurately replicate the original windows.

The car has its original 292 cubic inch engine, but was rebuilt at Midwest Engine in Duluth. And Maruska redid the transmission himself.

Man opening a car hood.
Tom Maruska opens the hood of his 1956 Mercury on September 29 to show off its 292 cubic inch engine.

Steve Kuchera/Duluth News Tribune

However, he modified the engine compartment a bit. All components except the engine itself had been painted to match the original bodywork.

“Everything was orange in there, and I just couldn’t do that,” Maruska said.

The original vehicle was missing a few parts, including an air cleaner and intake, as well as a pair of carburetors and valve covers. Maruska replaced the Thunderbird valve covers but removed the bird emblems, replacing them with those from a 1957 Turnpike Cruiser to restore the vehicle to its original appearance. Other parts he fabricated and replaced as needed to restore the engine bay to its original look, minus the orange paint.

Maruska is already moving on to new projects, including a 1965 Corvette and a 1964 Amphicar, his fourth restoration of the German-built amphibious car.

Man next to a car in a garage.
Tom Maruska looks at a future restoration project, a 1964 Amphicar, an amphibious automobile made in West Germany, on September 29.

Steve Kuchera/Duluth News Tribune

One of Maruska’s meticulously restored Amphicars sold for over $124,000 in 2006, setting a record auction price that remained unheard of for over 15 years until April of this year when someone another sold one of the original vehicles for $161,700.

IFC Transfers its Global Impact Investing Framework to the Global Impact Investing Network


A global framework for integrating impact into investments will now be hosted by the Global Impact Investing Network, following a transfer agreement with the International Finance Corporation, the organizations announced in a joint statement on Friday.

IFC, part of the World Bank Group, is the world’s largest development institution focused on the private sector in emerging markets.

Signatories to the Operating Principles for Impact Management, including Neuberger Berman, Albright Capital Management and A$2 billion ($1.3 billion) pension fund Christian Super, Sydney, have approved the transfer of the secretariat which should be completed by the end of the year.

The Impact Principles Framework now has 163 signatories in 38 countries with a total of $470 billion in impact assets. “Now is the time for Secretariat hosting to get closer to the market, and the GIIN offers this increased proximity to hundreds of market participants around the world,” said Susan Lund, IFC Vice President for economy and private sector development, in the communiqué. .

The framework aims to ensure that impact considerations are integrated throughout the life cycle of an investment and has become a market standard for impact investors. The transfer to the GIIN “is an important signal of the growing cohesion of the impact investing industry that the GIIN has always strived to foster,” said Amit Bouri, co-founder and CEO of GIIN, in the communicated.

“We believe that impact investors and signatories to the Impact Principles will benefit from having the generally accepted impact frameworks, methodologies and benchmarks in one place.”

The original arrangement of running them through an independent secretariat will continue and operations will remain unchanged, the organizations said.

“As demand for impact investing offerings soar and regulation emerges, growing alignment around industry standards will ensure much-needed investment capital is directed towards scaling up the most effective and deliver the strongest results to address our world’s most pressing challenges,” said Bouri.

Schumacher crash damage ‘pretty frustrating’ for Haas


Haas team principal Guenther Steiner said it was “quite frustrating” that the team had to change Mick Schumacher’s chassis again after he crashed during Japanese Grand Prix practice.

Schumacher spun nose-first into a barrier at Dunlop on his way back to the pits at the end of the session in the rain.

“It’s disappointing because we just went out to do a race start so we get data for Sunday,” Steiner told the official F1 channel, “then on the way to the race start Mick crashed the car, aquaplaned and crashed into the barrier and damaged the car quite heavily.

The accident prevented Schumacher from taking part in the second practice session, as the team decided to replace its chassis as a precaution.

“The whole front part is broken,” explained Steiner. “But we also have to change the chassis because we don’t know if there is a crack or not and you can’t take any risks with the chassis.

“There is nothing changed, except that maybe we could have been out in FP2 for 10 minutes, but that is not important. It is better to be 100% sure that the car is in good condition tomorrow. So we have to change the chassis and the whole front part and the front wing and the nose.

Haas has already changed Schumacher’s chassis twice this year following his heavy crashes in qualifying for the Saudi Arabian Grand Prix and at the Monaco Grand Prix. Steiner admitted the damage costs were mounting for his team.

“This is the third time now that we have had potential damage to the chassis,” he acknowledged. “I say potential because we have to X-ray it and see if it’s cracked or not. But it’s quite frustrating.”

Schumacher’s car will be back on track for final testing tomorrow, Steiner confirmed.

“Tomorrow morning, the car will be there. The guys will have a late night but they will fix the car again and we have all the parts, no problem. So it will be there. »

Announcement | Become a RaceFans supporter and go ad-free

2022 Japanese Grand Prix

Browse All 2022 Japanese Grand Prix Articles

How the Team Fortress 2 community brought it back from the brink


Sometimes something terrible happens to something beautiful. A speedrunner sneezes three hours into a perfect no-hitter run and gets tagged. Your favorite MMO comes to a halt, ending an entire world. The corporate overlords of the least corporate RPG ever get rid of its creators (opens in a new tab). Something terrible happened to something beautiful when Valve let Team Fortress 2 fall apart. For years it was nearly impossible to play a casual game of TF2 without being overwhelmed by automated snipers shooting anyone in sight, sending hate speech and even dropping links to child pornography.

Not content with killing everyone on the map, bots began to evolve.

The bots owned TF2. It was really, really bad. Fed up with years of neglect, the community finally decided to do something about it.

And they might just have #SavedTF2.

One of the most influential shooters of all time, Team Fortress 2 has a long and storied history. Developed over nine years from the bones of an old Quake mod, it was one of the first class-based FPS games and remains one of the most popular. Released in 2007 along with Half-Life 2 and the surprise hit Portal in the legendary Orange Box, it’s a big part of why Steam has become the juggernaut it is. TF2 is still a regular on Steam’s most played charts, even though it’s been five years since its last content update.

It’s not just a lack of updates that has turned TF2 into a bot-infested wasteland. In April 2020, Valve confirmed (opens in a new tab) that the source code of TF2 and CS:GO had been leaked. Despite a post from the official Team Fortress Twitter account reassuring players that they had nothing to worry about, almost immediately players began noticing a disturbing trend. Although cheating has long been a problem in TF2, it was generally the kind of problem that plagues many online shooters – wall hacks, aimbots, etc. But it was different. Automated robots picking the sniper class would join the games, guns pointing skyward and start killing everyone.

It didn’t stop there. Bots have become increasingly toxic. Not content with killing everyone on the map, they began to evolve. They spammed horrible statics on comms. They posted links to all sorts of questionable nonsense in the chat. They changed their names to match those of real players, banded together and voted against real humans who joined the game. They made the game literally unplayable.

Frustrated, players took to social media and posted video after video of the situation. Unable to play on official Valve lobbies, players migrated to community servers like Uncle Dane’s Uncletopia and hunkered down for what would end up being a long, long winter. Gone are the good times of the Jungle Inferno update (a glorious month for Pyro Networks), gone are the easy and windy sniper festivals of 2Fort, gone are the sticky demomen jumping off cliffs. What had once been Valve’s greatest multiplayer game was adrift, and no update arrived to right the ship.

Dedicated community members have tried to make the most of it. Even at the worst of the crisis, TF2’s average monthly player count never dipped below 65,000, although there’s some question as to how many of those were, well, the bots. Resilient fans found ways to keep playing, patiently waiting for some sort of update from Valve. A tweet, a blog post, a patch. Anything. But players didn’t receive any updates in 2020 or 2021, and instead were left with a burning question:


call to arms

Why were these robots so prevalent? Why didn’t Valve do anything about it? What was that in for those sociopathic bot wranglers who saw fit to ruin everyone’s fun? In a video published in February 2020 (opens in a new tab) which now has over a million views, YouTuber Toofty interviewed a number of cheaters to answer these questions. “It’s not a conspiracy theory,” he told me. “It’s kind of mundane after all. They were going into the comments section of my YouTube channel and openly talking about cheating. It wasn’t long before I found some good leads I could follow.”

Cheaters gave a number of reasons, none of which were very satisfying, which ultimately boiled down to one thing: they thought it was fun. Some claimed to have a grudge against certain developers, or only use hacks to combat certain strategies, but most just thought it was funny to get people up to speed. “I was hoping for a crazy, awesome hacker with a program, but instead I just found bored and sometimes lonely kids messing around.”

Boring, sure. But in most cases, people like this are a minor irritation – they mess up a game or two, ruin the casual server, and then end up getting banned or bored. Valve’s negligence, however, left them unleashed.

More than two years after the source code was leaked, an idea has begun to crystallize. On May 7, 2022, a YouTuber named SquimJim posted a video (opens in a new tab) calling on the community to contact Valve via email, even providing a form letter. A group of content creators known collectively as the Chucklenuts (after Scout’s legendary voice line, or maybe his adorable squirrel?) saw it and decided to take it a step further. They brainstormed and came up with the idea of ​​a peaceful protest – an outcry from the community that loved the game so much. email to make their voices heard.

#SaveTF2 was born.

I asked ElMaxo (opens in a new tab), one of the founding members, on the process. “SquimJim made a video, and we ended up adding it to a Discord to tell him about it, and it kind of grew out of that. Weezy (opens in a new tab) had the idea to launch it, and we were all really in agreement. The worst we did was try.” The YouTubers called on their audience to respectfully contact Valve and ask them to deal with the situation, post positive things on Reddit, tweet with the hashtag.

On May 7, 2022, they released their call to action, posted a bunch of heartwarming videos, and got #SaveTF2 trending at #1, breaking 400,000 tweets. They didn’t have to wait long for the universe to respond.

Two days later, in the first tweet from the official account since 2020, Valve said “TF2 community, we hear you! We love this game and know you do too. We see how this issue has grown and we are working to make things better.”

Action followed soon after. In June and July, Valve pushed out a number of Team Fortress 2 updates. It fixed an exploit where players could use cheats on secure servers. He fixed the Ap-Sap and its cursed sound spam. This changed it so that both teams could have a simultaneous kick vote, which helped eliminate any bots that players may have identified. Slowly the bots became less frequent, to the point that while researching this story, I haven’t once had a game ruined by them (just by my inability to hit the wide side of a barn).

Then the final domino, at least for now, fell. On August 19, Valve took the TF2 servers offline. The server message read “Item and matchmaking servers will be down for approximately five minutes for reasons.” Players started reporting VAC bans targeting bots, and it looked like thousands of accounts had been banned in a big purge. The crisis was finally over.

(Image credit: Vanne)

(opens in a new tab)

I asked Maxo how it felt. “It’s crazy,” he said. “Just the whole movement that emerged from a 15 year old game. It was beautiful to see the community come together so well, people who haven’t played in years. It was really beautiful to be honest If you ask anyone about #SaveTF2 they’ll credit ShorK for putting it together so well He did all the posters and got everyone together, did so much work behind the scenes to make it all work . It was really special.”

Since the updates began in June, concurrent users of Team Fortress 2 have skyrocketed. From 68,000 in May to 130,000 in September, fans of rocket jumps, sticky traps and back-stabbing snipers poured in. There is still some uncertainty – players are still seeing a few bots in games, but not as much as before. Fighting cheaters in games seems to be one of the constants in the world, along with taxes and me missing headshots.

Things are stable for now, but the community is still holding its breath. They have already been burned. Hopefully this marks a new start for TF2. Maxo, at least, believes him. “I think TF2 is going to experience a renaissance. I think it’s going to go even higher. It’s going to get big again!”

Surf the wave of sustainable development until full electrification


Ferdinand Porsche once said, “The perfect racing car crosses the finish line first, then crumbles into its individual parts.” What a catch, right? Well, in the 90s, that’s the best they could hope for.

Let’s go back to the 1990s of Formula 1 (F1). The era was marked by extreme competition between racing teams. There was more freedom in the engine that you could run, meaning teams could choose between V-8, V-10 and V-12. Meanwhile, you also had in-race refueling, meaning riders had more flexibility in how much fuel they could carry each race. Of course, you have to consider that the fuel is heavy, which means the lap times are higher when running these loads. The teams had to make this difficult choice to optimize tire, fuel and engine performance. Believe it or not, Michael Schumacher won the 1995 season in a powerful Benetton chassis with an even more powerful V-10 engine.

As Formula 1 has evolved, sustainability has become a bigger part of the picture. The environmental push and government pressure meant that automakers could not justify spending hundreds of millions of dollars to compete in Formula 1 if the base engine had no use in road vehicles. Because of this, Formula 1 engine rules became more standardized, moving from V-12s to V-10s and eventually settling on V-8s. However, the environmental pressure still existed and we finally reached our first wave of electrification. This is where the trend was set for what was to come in terms of electrification and sustainability.

KERS and the first wave of electrification

The first wave of electrification in Formula 1 came with the introduction of KERS or Kinetic Energy Recovery System. It was one of the first hybrid drivetrains introduced in a modern vehicle. Many of today’s concepts, such as regenerative braking, originated from this system in Formula 1. The current system was essentially a seven-second battery boost that Formula 1 drivers had access to during a lap. The system was connected to the two wheels at the rear, generating electricity when drivers pressed the brakes. This meant that less pressure was put on the brakes.

In other words, they could be smaller. It also meant that the braking technology could be significantly improved with modern electronics. However, for many people looking for the ultimate in durability, that still wasn’t enough and more changes still needed to be made to Formula 1.

Full hybrid systems and more durability

Before the hybrid system, Formula 1 teams used V-8 engines from Mercedes, Renault or Ferrari. However, only Ferrari had substantial use of V-8 engines. Mercedes was looking to switch to smaller engines because that’s what they had in their production vehicles. Renault was in the same seat, which meant that they could not further justify the development of their V-8 engine. The teams decided that the V-6 engines would be a perfect middle ground between the V-8 or a four-cylinder hybrid system. This V-6 engine again attracted Honda to the sport, as they had an application for an engine of this size in their road vehicles.

Teams also wanted to play with more complex hybrid regeneration systems, which meant introducing the MGU-H and MGU-K instead of the traditional kinetic energy harvesting system. The MGU-H recovers waste heat from the exhaust and transforms it into electricity which is stored in a battery. The MGU-K does the same but with the braking energy stored in the battery like the previous kinetic energy recovery system. The main difference is that this system has been extended to give power for about 33 seconds instead of seven. This system is a great test bed for advancing our machines towards more power density and sustainability. It even has an all-electric spinoff to further develop electric powertrains.

From Formula 1 to our road vehicles

Despite the challenges of electrification and sustainability, many of the technologies we use today in our road vehicles come from Formula 1. It is essential to see how Formula 1 will solve these design challenges, because these technologies will carry over to future road cars.

Formula E and full electrification

Formula E is the push towards the electrification of motor racing. It uses a single chassis supplier with teams designing their drive controls. Battery capacity has a maximum limit, and it is up to teams to work within those limits. The central view of Formula E is sustainability, as they understand the importance of tackling global issues like climate change while preserving the heart and soul of motor racing. Currently, the main objective of this sport is to optimize the use of energy within the constraints set out in the rules and regulations. This is because we have now reached a significant bottleneck in our path to electrification.

Batteries and the weak link

The bottleneck we have encountered is our ability to store electrical energy in portable devices. Battery technologies rely on chemistry that makes them insufficient for most users’ needs. While a battery is good enough for the average smartphone user, it’s not good enough for someone who needs a vehicle that can go 500 miles before refueling in just a few minutes. . Because of this reality, sustainability and electrification will only advance at the speed that our battery technology allows. Without this impressive battery technology, companies struggle to achieve specific sustainability goals. However, one solution the teams have found to improve things slightly is to work on electronic control of the electric motors. Instead of trying to fit more batteries into a smaller case, these companies focus on using battery power as efficiently as possible.

Optimization of energy consumption is essential

Optimizing energy use is the current key for anyone working on the push towards electrification. By focusing on complex electronic and software algorithms, you can achieve better performance with the same hardware. However, stakeholders and users must use design software that allows them to achieve these sustainability goals. This is where the push towards sustainability as a key driver of design software comes from.

How Cadence contributes to electrification and sustainability

Cadence understands that the best electronics are those that optimize for energy consumption while still being powerful enough for the end user. This is why electrification and sustainability are major considerations when building design software for businesses. Cadence will continue to focus on sustainability when considering how its end users will use its software. This means focusing on efficiency and maximizing power density. Find out how Cadence’s tools are helping companies achieve their sustainability goals today in our Corporate Social Responsibility Sustainability Report.

Steve Brown

(All posts)

Steve Brown is Director of Marketing Communications at Cadence.

Statement from Governor John Rankin CMG – October 4, 2022


Today, I am pleased to share with you my first quarterly review of the “Framework for Implementing the Recommendations of the Commission of Inquiry Report and Other Reforms” (“the Framework Document”), led by the government of national unity. The Quarterly Review is a key part of the framework document that has been agreed between the UK and the Government of National Unity to monitor the implementation of IOC recommendations.

This review has been sent to UK Ministers for review and I will hold a press conference once I have received their response.

The quarterly review includes a summary of progress against deadlines for implementing the conflict of interest recommendations. It highlights a number of key areas, including: investigations and audits; policy and governance reviews; appointments to statutory boards; reform of assistance grants; contract tenders; and law enforcement reform. As required by the framework document, it also includes an assessment of the political culture manifested in the daily management of government.

I hope you will take the time to read the review in its entirety. Significant progress has been made in some areas to date, and I am pleased with the constructive engagement and partnership I have had with the Prime Minister and Cabinet. So far, most of the framework’s deadlines have been met on time and I am confident that those that have been delayed have been for legitimate reasons. I am pleased that UNICEF has agreed to support the review of assistance grants which is currently underway, and that Her Majesty’s Inspectorate of Constabulary of the United Kingdom has agreed to lead the review of the law enforcement and the judiciary. These are examples of where the delay in starting reviews was justified to ensure we found the right reviewers through the right processes.

However, in the quarterly review, I noted a number of areas of concern where progress has been less than expected and where I have been disappointed with the level of commitment to reform. These include amendments to the Register of Interests Bill that would restrict access to the register and would make it available to the public only in the most limited way; the resistance encountered to some of the nominations for the Constitutional Review Commission which went against the importance for the Commission to be representative of all of the BVI; and continued bidding waivers presented to Cabinet with insufficient justification.

The overriding objective of the IOC and this reform program is to improve governance, accountability and transparency for the benefit of all people in the British Virgin Islands. It is essential that the areas of concern I have highlighted are addressed and that new governance issues do not arise.

Much work remains to be done. Over the next few months, we will begin to see the results of the various ongoing reviews, audits and investigations. The next step will include reviewing these findings and the actions required as a result. Some are likely to involve difficult discussions and other necessary changes to past practices.

I will continue to work with the Prime Minister and the BVI government to ensure that the necessary steps to improve governance are taken.

As Governor, I remain committed to ensuring that change in the territory is deeply rooted and that there is a continued and sustained effort to improve governance, transparency and accountability for the benefit of the people of the islands. Virgins.

Hulu DVR not recording some shows, problem persists


Hulu offers its users a Cloud DVR service, where live TV subscribers can record unlimited news, sports, shows, movies, and live events.

As long as a user’s Live TV subscription is active, these recorded videos will remain on their Cloud DVR for up to 9 months.

Hulu DVR not recording some shows

According to multiple reports, Hulu users are reporting that their Cloud DVR is not recording certain shows for them (1,2,3,4,5,6,seven,8,9).


Hulu users have enabled cloud recording for some shows, allowing them to watch them later. However, these shows are not recorded for them due to an issue.

By checking their “My Stuff” section, users say they can see that these shows are set up for recording. However, they do not appear in their recorded shows list.

This isn’t the first time Hulu subscribers have encountered this problem as it has appeared many times before (1,2,3,4).

Hey @hulu @hulu_support something failed recording today. It’s in my recordings but I can’t play it. This continues to occur intermittently and is not acceptable. Can I do anything to recover the recording? It is not the first time.

@hulu_support why am I spending over $70 a month on a service that has the worst front end app than all the others. Shows that are marked to record, do not. You can’t stop a show and pick up where you left off. How long have you been in the industry? Get good developers and fix it

This has been a particularly frustrating issue as users have missed a few games or episodes of their favorite shows because of it.

Troubleshooting methods such as setting up recording for a show, logging in and out of their account, and restarting their devices also don’t seem to work.

The Hulu team has acknowledged the problem

Luckily, the Hulu team is aware of the DVR not recording issue and is trying to fix it. However, no official ETA for a patch has been provided.

Hulu Support

At the moment, there is also no workaround to fix this problem. So the only option for Hulu subscribers is to wait for an official patch.

That being said, we’ll keep an eye out for any new developments regarding the Cloud DVR issue and update this article if anything relevant comes to our attention.

REMARK: You can also check the Hulu bug/issue tracker.

PiunikaWeb began as a purely investigative tech journalism website with a primary focus on “breaking” or “exclusive” news. In no time, our stories were picked up by Forbes, Foxnews, Gizmodo, TechCrunch, Engadget, The Verge, Macrumors and many more. Would you like to know more about us? Head here.

Why did Google shut down its translation app in China?


Search engine giant Google has shut down its translation app for China. Its webpage now shows a photo of a generic search bar that redirects to Google’s Hong Kong translation site, Bloomberg reported.

A spokesperson for the tech giant said Google Translate in mainland China has been discontinued due to low usage. In 2010, Google pulled its search engine out of China due to the mainland regime’s censorship of internet content.

According to a New York Times report in 2010, Google had said that hackers in China stole some of its source code and even broke into the Gmail accounts of some Chinese human rights defenders.

The Mountain View-based search provider’s other services, such as Google Map and Gmail, are also blocked by the Chinese government. Chinese local search provider Baidu and social media platform Tencent dominate the local internet landscape. It had made its translation service available to users in China in 2017 through a dedicated website and smartphone app.

According to a CNBC ReportGoogle had considered re-entering the Chinese market with its search engine, but scrapped the plan following backlash from employees and politicians.

American companies are now caught up in recent tensions between the United States and China over the Taiwan issue. According to a Bloomberg report, Google’s rival Apple is now trying to reduce its reliance on China and has now started manufacturing some iPhone 14 models in India. Its supplier Foxconn Technology recently agreed to a $300 million expansion of its production facilities in Vietnam.

According to the report, US companies had directly invested $90 billion in China by the end of 2020 and added another $2.5 billion in 2021, according to data compiled by China’s Ministry of Commerce. The actual toll is higher as analysts predict some companies routed some investments through Hong Kong or through tax havens like the Cayman Islands and the Virgin Islands.

(With Bloomberg entries)


    Follow the latest breaking news and developments from India and around the world with the Hindustan Times Press Office. From politics and politics to economics and the environment, from local issues to national events and global affairs, we’ve got you covered.
    …See the details

Back in the day: the fire of 1879 destroyed 1/8 of the square


I have shared information in this column about several fires before, but one of the largest in Monroe occurred on Thursday evening May 22, 1879 when the wooden buildings that occupied one-eighth of the public square were destroyed. It was estimated to be a loss of $40,000 and was only partially insured. Photos of buildings similar to those that were destroyed can be seen at the top of page 36 and bottom of page 40 in Monroe’s Illustrated History.

At around eleven o’clock that night, the large three-story brick block, which belonged to John H. Bridge, was discovered on fire. It had been occupied by Bloom & Adams, hardware and tools, Edward Ruegger, grocery store, and Mr. Fuelemann, jeweler. Shortly after the alert was raised, hundreds of villagers rushed to the scene. “The fire-fighting apparatus was immediately on the ground and quickly got to work; but the bursting of the pipe at a critical moment forced an abandonment at this point, where, at one point, it was thought the fire could be extinguished. The flames spread quickly and the large block of bricks was doomed.

The goods come out of the first floor of the building and pile up pell-mell in the street, as is often done during fires. The hook and ladder and engine companies did what they could to prevent the fire from spreading. “A southerly wind was blowing briskly and the flames were carried into adjacent buildings to the north, and thwarted all attempts to halt its ravages. Thomm & Miller’s meat market was licked in a short time, as were Rusch’s tobacco shop, then DS Young & Co’s grocery store, and Adam Vogt’s saloon, and the boot store and Adam Schmidt’s shoemakers took their regular turns to try and satisfy the Fire King, who at one point threatened to take the entire east side. Through tireless efforts on the part of a few men, the Mack & McCracken warehouse at the rear of the Bridge block was saved, and by this the destruction of many other wooden structures, including the stores of Scannel, the South Transport Workshops, and many others were spared the flames.

“The Sentinel office and Foster’s furniture store, along with the row of wooden fire traps to the east, were only spared by the winds, which blew steadily from the southeast.”

They kept a steady stream of water on the blaze until the fire was extinguished on the walls of JB Treat’s store. Men and women then took hold with will and worked well and efficiently to save the goods which had piled up in the streets. “But hundreds of men stood with their hands in their pockets, looking like a bunch of lunatics, without raising their hands to help put out the fire or save property.

“To add to the confusion on one or two points, very indiscreet people were peddling free whiskey, which absolutely prevented some firefighters from occupying important positions, and doing what they could to turn good workers into mobs. Fortunately, this dangerous business was shut down fairly quickly.

The next morning, in broad daylight, men were in the field cleaning up the remains of goods and equipment and housing them. The work of tearing down the dangerous walls continued throughout the day.

The editor added: ‘A good steam fire engine with plenty of good pipes would have saved enough goods on this occasion to pay for itself. It’s a tough thing to get the average man to work on the brakes, and it was killing business trying to pump water up the hill through 600 feet of pipe hour after hour.

A man was seen carrying a double handful of pewter rattles from Young & Co’s down the street to the foundry and carefully setting them down. A burly man carried a box full of lamp chimneys across the street and then dropped them “so violently that they broke everything to break”. The ladies distinguished themselves by doing “more efficient and more preserving work” than many able-bodied men who were too selfish to work. The teachers at the school were particularly brave.

There were lucky people whose injuries could have been much worse. John Sissons was grabbed from the ground where he had fallen just in time to miss a falling wood. Hilmar Stephany had his cork hat crushed on his head by falling wood and nearly lost his mind. CE Adams nearly lost his right hand by having it wedged between beams, one of which had fallen at an angle on the other. A quick jerk saved him, “but the longest finger had its end gripped most mercilessly.”

JD Bebee and his son, Charles, were in the back section of their shoe store when the walls of the Bridge block fell to the north. Some of the bricks fell within two feet of them. Mr. Bebee had just moved from Jackson Street to Rusch’s building when the fire caught up with him.

Sheriff Morse passed by Monticello when the fire was at its height and could see the reflection distinctly; his way back was well lit. Buildings five blocks west of the blaze were set on fire by the flying debris and “required vigilance and great effort to keep them safe”.

“The biggest crowd that has gathered in Monroe in a long time came on Saturday. Many came to trade, some to see the neighborhood burned, and a few to get drunk.

People suffered serious casualties in this fire, which was by far the largest ever seen in Green County at the time. Business interruption was also a big drawback for these enterprising companies. On the bright side, the editor said: “The appearance of the city will be improved in some respects, as no wooden buildings will again be allowed on the site of those who burned down. Mechanics and other laborers will be put to work, and with the help of insurance companies, the burden of loss will be made bearable.

— Matt Figi is a Monroe resident and local historian. His column will appear periodically on Saturdays in The Times. He can be reached at [email protected] or 608-325-6503.

Lorgat: SA20 needs a transformation “frame”


Former CSA CEO Haroon Lorgat has said the number of black African players bought at the recent SA20 auction is a “cause for concern”.

The ASC’s first attempt at a T20 franchise tournament, the Global League T20, never got off the ground as ASC infighting ousted Lorgat in late 2017, the tournament postponed to 2018 and then scrapped.

However, a GLT20 player auction was held, with a total of 17 black Africans picked up by the eight franchises.

Only six black Africans were bought by the six SA20 franchises on September 19, all bowlers – Kagiso Rabada (pre-bought by MI Cape Town), Lungi Ngidi (Paarl Royals), Sisanda Magala, Aya Gqamane (Sunrisers Eastern Cape), Malusi Siboto (Joburg Super Kings) and Junior Dala (Durban’s Super Giants).

Proteas T20 World Cup captain Temba Bavuma was unsold twice for his base price of R850,000. The opening batsman was the only member of the 15-man Proteas T20 World Cup squad not to be bought by one of the six franchises, with a versatile player Andile Phehlukwayo – a traveling reserve – is also absent.

The top black African batsman in last season’s CSA T20 Challenge was Khaya Zondo, who scored 179 runs (the ninth-most) with a strike rate of 112.29. It became unsold at a base price of R175,000.

There are no quotas or transformation targets for SA20 private franchises.

“It is worrying that there has been a regression rather than a progression, as one would naturally expect there to be growth over the years from the investments made,” Lorgat said. News24 Sports asked about the declining representation of Black Africa at the GLT20 auction.

“I don’t want people to think this is a case of sour grapes or an opportunity to fight back. I want our league to succeed because it is essential for the future of South African cricket.

“But the numbers speak for themselves. In my mind, 17 black African players were drafted into the T20 World League in 2017 and five years later that number has dropped to six. Obviously, something is wrong.

“It must be concerning. Something is not working or something else is at stake.

ALSO READ: SA20 not involved in selection decisions – Smith

“There should have been a framework in place. We’ve done it in the World League, although some of it is unwritten.

“These were not all written guidelines, but we had invested almost a full day with the team owners before the draft to educate and enlighten them on the need for the transformation of South African cricket. The environment in which we were evolving was relevant.

“I vividly remember the owners being so impressed with our transformation discussion that they sought to invest in more hubs. As part of the terms and conditions of their license, they had to invest $25,000 in at least least one hub in their city.

Goodbye TINA – GuruFocus.com


Fixed income instruments of various maturities have yielded next to nothing over the past 10 years. A reading of the charts below illustrates the lack of meaningful bond yields available to income-oriented investors who have been forced to buy stocks and bond substitutes to meet their investment goals.

But the days of low bond yields are now over. An unprecedented six-month spike in interest rates dramatically changed the risk/return calculus of fixed income securities.

After more than a decade of paltry zero-rate fixed-income returns, short-term bonds can now offer investors a modest return and low commensurate risk. The two-year Treasury note now bears a rate of 4.21%, providing investors with a safe haven from the current turmoil that has rocked the market.

It’s hard to believe that the two-year note was yielding just 0.21% a year ago and a paltry 1% in January.

As the yield curve charts indicate, the US Federal Reserve’s continued and steep rate hikes over the past six months have decimated bond markets, with prices and yields moving in opposite directions. Even though Fed Chairman Jerome Powell was adamant that the central bank would continue its regime of rate hikes sufficient to rein in runaway inflation, the time could still be right to enter the short end of the bond market. .

As yields rise, the decline in prices for longer-term bonds is disproportionately greater than for fixed-income vehicles with shorter maturities. Longer bonds are more sensitive to changes in interest rates. Given the duration risk, the inverted yield curve favors a position at the short end of the maturity ranges.

With a current yield of 3.75%, the 10-year note does not sufficiently compensate investors for the dramatic increase in maturity; and bearing a yield of 3.7%, the 30-year note is even less attractive.

At 4.2%, the risk-free two-year note now provides more of an income cushion to help cover any further price declines.

The most important issue currently for bond investors is what the average rate will be as well as the “terminal” rate of the federal funds for the next two years. With a yield of 4.2%, the outlook for two-year bonds is favourable. Moreover, some analysts estimate that the bond market has already priced in a terminal rate of around 4.3%. If this is indeed the case, any further rate hikes would have negligible impact on prices at the short end of the yield curve.

The advantageous rates of fixed income securities are not limited to the Treasury market. Short-term corporate bonds also present opportunities for those seeking a safe harbor that can provide cash reserves with higher current yields than money market funds.

A review of the charts below clearly indicates that credit spreads between risk-free Treasuries and higher quality corporates have widened significantly over the past six months, providing investors with adequate compensation for the additional default risk. presented by an impending recession. Just six months ago, the risk/reward paradigm was skewed, with investors receiving no meaningful compensation for the additional risk taken on with lesser quality companies.


Recently, the spread on one- to three-year short-term investment-grade corporate bonds was about 75 basis points above corresponding Treasuries, resulting in yields close to 4, 5%.

Short-term ETF bond funds offer investors an easy way to participate in the higher yields available at the start of the yield curve. One option would be the Vanguard Short-Term Corporate Bond ETF (VCSH, Financial), an index fund covering the entire short-term corporate market. Its current yield is 4.22% with a spend rate of 0.04%.

For individual issues, investors can consider Home Depot shares (HD, Financial) 2025 Bond with a YTM (Yield-to-Maturity) of 4.25%.

If bond markets have already priced in policy easing in early 2023 with a terminal fed funds rate of around 4.3%, I think the yield/price dynamics of short-term bonds would make this a reasonable addition to the portfolio. of any defensive investor.

Founder Series: Top Tips for Protecting Your Ideas | Orrick, Herrington & Sutcliffe LLP


Orrick’s Founder Series offers monthly advice to UK startups on key considerations at each stage of their life cycle, from incorporating a business to possible exit strategies. The series is authored by members of our market-leading London Technology Companies Group (TCG), with contributions from other members of the practice. Our Band 1-rated London TCG team closed over 310 growth financings and tech M&A deals totaling US$26 billion in 2021 and led the European venture capital tech market for 26 consecutive quarters (PitchBook , Q2 2022). The First payment provided advice to founders on the process of setting up a limited liability company, the second installment provided advice to the founders on building their team, and the third installment provided advice to founders on motivating their team.

Beyond its employees (which we explored in the last two episodes of the series), a company’s intellectual property (or “IPs“) is often its most valuable asset, especially for companies in the technology sector. It is crucial to ensure that you own the rights to your intellectual property and to take the appropriate measures to protect your intellectual property rights. In this article, members of our Technology Transactions group offer advice on ten key issues to consider when looking to protect your intellectual property.

  1. Ownership of employee work product. As pointed out in the second installment of the series, startups should seek to put in place written contracts with their founders and employees, which provide for the transfer to the company of all intellectual property created by them. While the general position in English law is that intellectual property rights created by an employee in the course of their employment automatically vest in the company, the establishment of a stand-alone written agreement to assign intellectual property increases clarity and reduces the risk of future disputes over intellectual property ownership.
  2. Ownership of contractors’ work product. The general rule that applies to employees does not apply to third-party contractors and freelancers. Intellectual property created by third parties will belong to those third parties unless properly assigned to Company under written agreement. You must therefore enter into a subcontract containing appropriate intellectual property attribution provisions with any third-party subcontractor that the company engages to develop its intellectual property.
  3. Keep track of your IP development. It is important to keep traces of drawings and drafts (ideally signed, dated and marked “confidential”) which bear witness to the development of your intellectual property. If a dispute arises and you need to enforce your rights against someone using the same or a similar IP address, these records may be helpful in resolving the dispute. If you choose to register your IP, complete records are also helpful when preparing your IP registration application.
  4. Brands MT / ®. Trademarks or trademarks are the signs used by companies to distinguish their products or services, such as names, logos, slogans and designs. Such a mark can be protected by UK trade mark registration and can be renewed indefinitely in 10 year increments. Registering your marks gives you a monopoly over them in the territories where they are registered for the goods and services covered by the registration (provided these marks are actively used). Registering your marks also makes it easier to take enforcement action against third parties who attempt to copy your marks or use marks very similar to yours. A trademark can be licensed or assigned by its owner and is therefore a valuable business asset. Although you may still be able to file claims regarding your unregistered trademark rights, this relies on the common law doctrine of “passing off” and can be a long, difficult and potentially expensive process.
  5. Don’t confuse trademark registration with other filings. As mentioned in our First payment, it is a common misconception that registering a name with Companies House or a domain name for a website grants trademark protection. The processes are unrelated and the marks must be registered separately with the appropriate intellectual property office(s).
  6. Copyright ©. Software (among other creative works) may be copyrighted. Unlike trademark rights, in the UK copyright protection arises automatically when an eligible work is first created. Copyright protection gives the owner the right to prevent others from copying and improperly profiting from an original work for up to 70 years from the death of its author. You may be able to use the copyrighted work of others under license, but it is important to understand the terms of that license.
  7. Beware of open source software (OSS). Some licenses provide that if you combine the OSS with your proprietary (closed source) software, you are obligated to distribute your software on the same terms – usually for free – so it is essential that you understand the license terms of any OSS you you use.
  8. International intellectual property protection. If you trade overseas (or intend to do so in the future), you may want to consider obtaining intellectual property protection in those jurisdictions. This will help protect your intellectual property as you continue to expand globally and will be something investors will keep an eye on.
  9. Use Non-Disclosure Agreements (NDAs). NDAs are contracts that impose confidentiality obligations on parties to ensure that information exchanged between them remains confidential. Using NDAs is an effective way to protect against leaking or sharing your company’s confidential information (including intellectual property, such as trade secrets and proprietary source code) with competitors. NDAs can be used at different stages of a company’s growth, including with third parties you provide access to new products and designs at the R&D stage of IP development. NDAs can also be put in place before entering into in-depth discussions with potential customers and suppliers and with potential investors when raising funds (although early-stage investors in the UK may be reluctant to conclude NDAs for fundraising purposes).
  10. Protect your IP in contracts. Contracts with customers and suppliers should contain intellectual property ownership and licensing provisions of appropriate scope. Here are some of the key considerations in this context:
  • Clients: Strong provisions are required in contracts with customers who use company-owned intellectual property so that you can retain control and ownership of the intellectual property. The terms must clearly state the scope of the license granted to the customer, including whether it is exclusive, sublicensable, transferable and/or limited in time or geographically.
  • Suppliers: If your startup uses the IP of another company, this must be formalized by a written license or an assignment of IP. Unauthorized use of a third party’s intellectual property rights may result in an infringement action by the third party owner against your business.

NeuShen Therapeutics closes pre-A funding with approximately $20 million

  • Closing of the pre-A financing round led by LAMPAM Capital
  • Dual in-house small molecule discovery and AAV-based gene therapy platform targeting neurological and psychiatric disorders

SHANGHAI, Sept. 29, 2022 /PRNewswire/ — NeuShen Therapeutics, Inc., a biotechnology company focused on developing innovative treatments for central nervous system (CNS) disorders with dual platforms of AAV-based gene therapy and small molecule discovery, announced today the closing of a pre-A series funding of approximately $20 million led by LAPAM, a China-based venture capital firm. NeuShen was founded by a group of industry executives who have extensive global experience in central nervous system (CNS) drug development. The new capital will be used to expand the team and catalyze CNS drug discovery internally in the US and China.

“The success of this fundraising is a testament to our team’s ability to accomplish CNS drug development and re-ignite our discovery engine to build a pipeline with AAV-based small molecule and gene therapy programs. said Joan Shen, MD, Ph.D., CEO and Founder of NeuShen. “CNS disease is an area with huge unmet needs. Our company has had a very clear goal from day one, which is to develop new therapies to relieve the burden of patients with CNS disorders. months, we have developed an achievable R&D strategy and established a substantial core team with experienced CNS drug hunters Significant progress has been made in building the internal small molecule pipeline and new AAV gene therapy programs In addition, multiple collaborations and partnerships were discussed and established.

CNS disorders are increasingly recognized as leading causes of death and disability worldwide, while diagnosis and treatment have lagged far behind. Urgent action is needed to meet the growing challenges. “By bringing breakthroughs and lessons learned from other disease targets such as ophthalmology, oncology and hematology, we believe that AAV-based gene therapy represents a new opportunity in the treatment of brain disorders. SNC. My colleagues and I at the Horae Gene Therapy Center look forward to working with Neushen to explore these treatment opportunities. NeuShen’s team’s experiments in neuroscience will be key to achieving this,” noted Dr. Guangping Gao , Professor, Director, Horae Gene Therapy Center, UMass Chan Medical School Collaborations between NeuShen and UMass are currently under discussion, which will include several CNS gene therapy projects.

“We are very pleased to partner with NeuShen from the beginning. Lapam Capital has a strong commitment to healthcare, and we believe the CNS therapeutic area will attract more investment, given the huge unmet needs and scientific advancements in the field. We highly value Dr. Joan Shen and her management team for their expertise. Lampam Capital is confident in NeuShen’s ability to be a leading player in the development of innovative therapies for CNS diseases. said Mr. Zhihua Yu, Managing Director of Lapam Capital.

“Dr. Shen has brought together a preeminent group of scientists, clinicians and drug developers to build a global biotech developing new drugs for unmet needs in CNS therapeutic areas. TTM Capital is delighted to support Neushen in building of its multi-modality pipelines to help patients around the world,” said Ms. Lilly Zhang, Founder and Managing Partner of TTM Capital.

About NeuShen Therapeutics

NeuShen Therapeutics is a biotechnology company focused on the research and development of innovative drugs to treat CNS disorders, applying dual research platforms including AAV-based gene therapy and the discovery of small molecules. With operations in Shanghai, China and Boston, MA, NeuShen has a world-class team and is honored to be advised by an outstanding Board of Directors and Scientific Advisory Board.


About Lapam Capital

Beijing-based Lapam Capital is one of China’s leading healthcare venture capital firms. Lapam currently manages five RMB funds and one USD fund, with over RMB 10 billion under management. Lapam Capital focuses on investing in fast-growing early to mid-stage companies that have innovative pharmaceuticals and medical devices. It has invested in approximately 60 biopharmaceutical companies and 10 medical device companies to date, including Betta Pharma, RemeGen Co. Ltd., Clover Biopharmaceuticals, Yahong Meditech, Stemirna Therapeutics, Binhui Biotech, ImmuneOnco Biopharmaceuticals, Biostar Pharmaceuticals, Aibo Medical Robot Co. .Ltd. .and many other companies with great potential. Lapam Capital has a professional investment team with more than 20 years of R&D and management experience in the international and domestic biopharmaceutical industry and can provide comprehensive value-added support to invested companies.

About TTM Capital

TTM Capital is an investment company specializing in the healthcare sector in China and around the world. We focus on early-stage and growth-stage companies, including the pharmaceutical, biotech and medical technology sub-sectors.

The TTM Capital team is comprised of seasoned, globally minded investment professionals with extensive industry experience, who work together to deliver superior and consistent returns for the firm’s investors. We are committed to accumulating industry experience over time, with the goal of developing an ecosystem of expertise to build transformative healthcare businesses.

Quote Show original content to download multimedia:https://www.prnewswire.com/news-releases/neushen-therapeutics-closes-pre-a-financing-with-20m-301636539.html

SOURCE NeuShen Therapeutic

October 2022 – Minnesota Women’s Press


Post-school shooting guide, technical shortcomings

The United States has a recovery guide for school shootings

Principals who have been affected by school shootings have created a recovery guide. As retired Columbine superintendent Frank DeAngelis said, superintendents across the country are reaching out to traumatized educators who are also part of “a club no one wants to be a member of.” The Principal Recovery Network, a group of current and former school leaders who have experienced gun violence at school, has created a 16-page guide on what to consider before reopening a school and how to look after the mental health of students and staff.

Source: the74million.org

Lack of technological education

Data source: code.org/promote/mn

Only 24% of high schools in Minnesota offer computer programs. There are currently 13,327 IT jobs open in Minnesota, offering an average salary of $92,494. Less than a quarter of Minnesota’s 1,806 AP computer science tests were taken by female students in 2020; most of the tests were taken by white men.

Source: code.org/promote/mn

Good news for bad news in schools

There are 103 schools in Minnesota that have graduation rates below 67%. The good news: The Minnesota Department of Education is expanding the Collaborative Minnesota Partnerships to Advance Student Success (COMPASS) program. This will help teachers and school leaders improve literacy and math rates, as well as assess school climate and mental health.

Source: education.mn.gov

Governor Hochul Announces Long Island Investment Fund’s First Prize of $10 Million to Feinstein Institutes for Medical Research


Included as part of Governor Hochul’s enacted budget for fiscal year 2023, the Long Island Capital Investment Fund focuses on projects that will support and grow the regional economy, improve communities, and have lasting economic impacts on Long Island. . The $10 million award from the Fund to the Feinstein Institutes for Medical Research will support the renovation and construction of 26 new, two-story, state-of-the-art research labs as well as the hiring of 10 new principal investigators and 60 research staff. These upgraded labs will advance research efforts to develop new therapies for cancer, diabetes, obesity, lupus and other conditions

Empire State Development President, CEO and Commissioner Hope Knight said: “The Long Island Investment Fund represents a strategic investment to further strengthen the region as a powerhouse of the life sciences industry, which is an important driver of New York State’s economy. The Feinstein Institutes play a vital role in life-changing medical and therapeutic discoveries. that can improve our everyday life. ESD is proud to support the growth of visionary life science companies like the Feinstein Institutes, whose work is crucial to building a healthier and stronger Empire State.

Empire State Development Council Chairman Kevin Law said: “Under Governor Hochul’s leadership, New York is making smart investments to catalyze economic growth on Long Island. The Long Island Investment Fund will help the region prosper and strengthen New York’s leadership in the global innovation economy. The Fund’s $10 million award to the Feinstein Institutes reaffirms our commitment to the growing life sciences ecosystem that will support the advancement of breakthrough medical discoveries. »

The Feinstein Institutes are the world’s scientific home for bioelectronic medicine, a burgeoning field of science that uses technology to read and modulate electrical activity in the body’s nervous system. The new, modernized laboratories of the Institute of Bioelectronic Medicine will support discoveries to find cures that will reduce the need for drugs, reduce painful side effects and restore life to those who suffer. Early discoveries have emerged from his labs, opening up new treatment options for patients with diseases such as rheumatoid arthritis, diabetes, paralysis and even cancer. Clinical studies in bioelectronic medicine have already shown results with paralyzed people: recent research using a spinal cord stimulation patch on the skin has allowed participants to regain their ability to move and feel.

The renovation of the Institute of Bioelectronic Medicine includes a wet laboratory space, several tissue culture rooms, cold rooms, workstations for researchers and a brand new biosafety level 3 facility to allow new research on the infectious diseases and other complex viruses, such as COVID -19. The expansion also supports the hiring of 13 new Principal Investigators and 100 new research staff.

Feinstein Institutes President and CEO Dr. Kevin Tracey said: “At the Feinstein Institutes, scientific advances are made every day. With the right facilities and tools, we can help advance those advances even further. We are grateful to the Governor and Empire State Development for funding our new space, and we look forward to continuing our groundbreaking medical research that will benefit our communities on Long Island and beyond.”

Northwell Health President and CEO Michael Dowling said: “This new facility and its resources, made possible by Governor Hochul and Empire State Development, will allow our researchers at the Feinstein Institutes – the home of Northwell research and the global scientific home of bioelectronic medicine – to continue their mission. discovering new treatments to cure disease and improve the health of the communities we serve.”

Local stakeholders sought to guide water planning in South Carolina’s Saluda River Basin


September 26, 2022

The Middle Saluda River flows quietly under a bridge in Jones Gap State Park in northern Greenville County. Two public meetings are being held – one in Columbia and one in Greenville – to discuss surface water management in the Saluda River Basin over the next 50 years. (Photo: SCDNR/Greg Lucas)

The SC Department of Natural Resources (SCDNR) has announced the dates for two public meetings to provide citizens with an overview of a new water planning framework that will guide surface water management in the river basin. Saluda over the next 50 years.

The meetings will also serve as venues to engage volunteers interested in serving on a board that will develop and implement the plan for the Saluda River Basin. Meetings are planned in Colombia at Saluda Shoals Park on Tuesday, November 1 and in Greenville at the Roper Mountain Science Center on Thursday, November 3. Both meetings will take place from 6:00 p.m. to 8:00 p.m.

In March 2018, the SCDNR established the State Water Planning Process Advisory Committee to help draft a “framework” document that will guide the development of individual river basin plans for each of the eight major basins. state rivers. The Planning Process Advisory Committee includes representatives from a wide range of organizations, including SC’s Department of Health and Environmental Control, SC’s Water Resources Center at Clemson University, Systems municipal and rural water utilities, conservation groups, power companies and agricultural interests. In 2019, the group completed a report, the “South Carolina State Water Planning Framework”, which outlines the river basin planning process and the intended content of a river basin plan.

“The planning framework represents a foundation for the development of regional and state water bodies, which are essential to our continued economic growth and the protection of the resources and environment we all share,” said Ken Rentiers, Deputy Director of the Land, Water and and Conservation Division.

Each river basin plan will be created and overseen by a river basin council, a working group made up of stakeholders with interests in the basin. River Basin Councils in the Edisto, Broad and Pee Dee river basins have already been established and planning activities in these basins are underway. The Saluda River Basin has been selected as the next basin to implement the new planning framework. Planning efforts and advice in the other four basins will follow as funding becomes available.

At its most fundamental level, a watershed plan will answer four fundamental questions:

  1. What is the water supply and demand currently available in the basin?
  2. What water uses are currently permitted and registered in the basin?
  3. What will be the demand for water in the basin throughout the planning horizon (50 year planning period) and will the available water supply be sufficient to meet this demand?
  4. What water management strategies will be used in the basin to ensure that available supply meets or exceeds projected future demand?

As stated in the planning framework, “The answer to the fourth question is central to the water planning process and benefits greatly from cooperation and consensus among all stakeholders in the basin. A successful and equitable watershed plan considers the effects that all water users have on each other and on the resource.

Public participation is essential to ensure that future generations of South Carolina have a safe and well-managed supply of our most essential natural resource: water. You can download a copy of the “South Carolina State Water Planning Framework” and learn more about the Planning Process Advisory Committee and the research behind this initiative.

Meeting locations and times:

Colombia—Nov. 1, 2022, 6-8pm

Saluda Shoals Park – Center of the River

5605 Bush River Road

Columbia, South Carolina 29212

Directions via Google Maps

Greenville—Nov. 3, 2022, 6pm-8pm

Roper Mountain Science Center

Environmental Science and Sustainability Building, Room 201

Greenville, SC 29615

Directions via Google Maps

New 5G front-end solutions improve 5G network coverage and quality


26-09-2022 | NXP | Semiconductors

NXP Semiconductors now offers its new, more powerful BTS7202 RX FEM and BTS6403/6305 pre-drivers for 5G massive MIMO at up to 20W per channel. Developed and implemented in its SiGe process, the devices operate with modest current consumption to reduce operational costs for MNOs. They also offer improved linearity and lower noise figures to support better 5G signal quality.

As 5G networks continue to be built across the world, MNOs are increasingly using 32T32R solutions to improve massive MIMO coverage in less dense urban and suburban areas. The use of 32T32R solutions requires the use of more powerful devices that increase the power level per channel to achieve the total power needed to provide strong 5G signal coverage.

“With 5G networks beginning to become denser, higher power solutions are crucial to ensure network consistency and signal quality,” said Doeco Terpstra, Vice President and General Manager, Smart Antenna Solutions, Radio Power, NXP. “Our customers recognize that the higher power solution offers network operators a way to meet the power requirements of 32-antenna solutions without compromising network quality.”

The new pre-drivers provide a complete, easy-to-implement solution for 5G base stations, complementing its power amplification solutions for 32T32R radios. The BTS7202 RX FEMs provide a switch capable of handling up to 20W of power leakage from transmission lines, reducing system complexity. The BTS6305 pre-drivers also combine a balun to save cost.

DraftKings promo code unlocks $200 NFL Sunday bonus


For the biggest NFL Week 3 boost, look no further than this DraftKings promo code. New users can turn any team into a massive underdog, at least when it comes to payout.

Use this DraftKings promo code to receive a 40-to-1 odds boost on NFL Week 3. Bet $5 on any team and if they win, win $200 in bonus money.

Of course, picking a winner is half the battle, but it’s hard to deny the value of this promotion. This 40-to-1 odds increase will give the odds of every NFL team a boost. That said, there are a few highly favored teams that will receive a ton of attention.

Getting started with DraftKings Sportsbook is a stress-free process. New users can sign up, deposit, and download the app in no time. Here’s a deeper dive into the registration details.

Click here to unlock this DraftKings promo code and secure NFL 40-1 odds. Bet $5 on any team to win $200.

Bet $5, win $200 with this DraftKings promo code

This DraftKings promo triggers a 40-to-1 odds increase for new players this weekend. All it takes is a $5 bet on any NFL team for the chance to win $200 in bonus money.

Take a look at Cowboys-Giants to see the true value of this DraftKings promo. The Cowboys are -105 on the moneyline. In order to win $200, existing users would have to wager $210. Giants contributors (-115) would have to risk $230 to win $200. Remember that new users can get the same payout on a $5 bet.

Whoever picks a winner will receive eight $25 free bets. These can be used on any NFL Week 3 game, College Football, MLB, Soccer, Tennis, Golf, UFC, and more.

DraftKings Promo Code: How to Sign Up

This is a simple and streamlined registration process. In fact, there is no need to physically enter a DraftKings promo code when signing up with any of the links on this page. Here’s a step-by-step guide to help new users get started:

  • Click on here to automatically activate this promo code. You do not need to manually enter a promo code to redeem this offer.
  • Create an account and deposit $5 or more to qualify for this bonus. PayPal, online banking, credit cards, and debit cards are common methods of depositing funds.
  • Download the DraftKings Sportsbook mobile app. This is available to anyone with an iOS or Android device.
  • Place a $5 bet on any NFL team to win $200 in bonus money.

This promotion is available in select states for players 21 or older (New York, New Jersey, Connecticut, Pennsylvania, Arizona, Colorado, Indiana, Iowa, Kansas, Louisiana, Michigan, Tennessee, Virginia, West Virginia, and Wyoming) .

Other boosts and bonuses

This odds boost is a great way to start, but it’s not the only way to bet on the NFL this weekend. New and existing users can enjoy the same escalated play betting on any NFL Week 3 game. This will provide bettors with a 100% increase in profits on that same game bet.

Click here to unlock this DraftKings promo code and secure NFL 40-1 odds. Bet $5 on any team to win $200.

Best cars for snow with high IIHS safety scores


Some cars are better equipped for winter than others. Kelley Blue Book says things like all-wheel drive, LED headlights, and safety features like blind-spot monitoring. Mirrors and heated seats also contribute to driver comfort and improve visibility in bad weather. Looking for the best cars for snow with high safety scores from the Insurance Institute for Highway Safety (IIHS)? Check out options from BMW, Mazda and Toyota below.

BMW’s 3 Series is one of the best cars for snow, with high safety scores

The 2022 BMW 3 Series | BMW

Kelley’s Blue Book thought the 2022 BMW 3 Series xDrive ticked all the boxes when it came to best cars for snow. The xDrive AWD adds $2,000 to the price but is well worth it. Forward collision warning, automatic emergency braking and automatic windshield wipers are standard on all 2022 3 Series. The IIHS awarded the 2022 BMW 3 Series its Top Safety Pick award.

Kelley Blue Book says the Active Driving Assistant package adds blind-spot monitoring for $700. Some of the other options available include adaptive LED headlights and better high beams for visibility. If you can’t find the 2022 version, the 2021 model is similar and well equipped for snow.

2022 BMW 330i xDrive: $43,450

IIHS Safety Score: Top Safety Pick

All-wheel-drive Mazda3 is one of the best cars for snow

” src=”https://www.youtube.com/embed/Lih-QWkJvVU?feature=oembed” frameborder=”0″ allow=”accelerometer; automatic reading; clipboard-write; encrypted media; gyroscope; picture in picture” allow full screen >

RELATED: The Best Midsize Luxury SUVs For 2022 With A Stress-Free Ownership Experience

If you opt for the 2022 Mazda3 AWD, upgrading to the Preferred version will better equip this car for snow. Mazda equips the 3 with automatic emergency braking, blind-spot monitoring and automatic high beams as standard. According to Kelley Blue Book, the i-Activsense features make this vehicle better suited for snowy conditions. Additionally, the IIHS awarded the Mazda3 the Top Safety Pick Plus award for 2022.

Additionally, the Mazda3 Preferred gets LED headlights, rain-sensing windshield wipers, and heated seats. The 186 horsepower engine is good enough for snow and winter. The 2021 Mazda3 is also well equipped if you can’t find the 2022 version, but it won’t have heated seats.

2022 Mazda3 Preferred AWD: $26,150

IIHS Safety Score: Top Safety Pick Plus

The Toyota Camry is reliable and efficient in winter

” src=”https://www.youtube.com/embed/b5ZzDHVUL0g?feature=oembed” frameborder=”0″ allow=”accelerometer; automatic reading; clipboard-write; encrypted media; gyroscope; picture in picture” allow full screen >

The best cars for snow with high safety scores cannot ignore the 2022 Toyota Camry AWD. In addition to its reliability history, Safety Sense 2.5+ adds many standard safety features. The Camry gets forward collision warning, automatic forward emergency braking and automatic high beams. Its LED headlights and taillights also help illuminate the road better in winter conditions.

Kelley Blue Book says adding a blind-spot monitor and rear cross-traffic alert adds $680 to the price. The Cold Weather Package is an extra $1,290, which adds a heated steering wheel, heated mirrors and heated front seats. If you can’t find a 2022 version, the 2021 Toyota Camry LE AWD is just as capable. The IIHS agreed, giving the 2022 Camry its Top Safety Pick Plus award.

2022 Toyota Camry LE AWD: $26,795

IIHS Safety Score: Top Safety Pick Plus

Some additional suggestions include the 2022 Charger SXT with AWD and the 2022 Nissan Altima with AWD. All-wheel drive is one of the most important features buyers can add, as it helps maintain traction in the snow. However, a good set of winter or snow tires is also a good suggestion.

RELATED: Consumer Reports Best American SUVs under $50,000

Framework to ban members of Congress and SCOTUS from trading stocks includes provision of crypto


Members of the United States House of Representatives and Senate as well as Supreme Court justices who currently trade cryptocurrencies may have to stop HODLing while in office if a bill gets enough votes.

According to a framework released Thursday, House Administration Committee Chair Zoe Lofgren — responsible for the day-to-day operations of the House — said she had a “meaningful and effective plan to address financial conflicts of interest.” ” in the USA. Congress by restricting the financial activities of SCOTUS legislators and judges, as well as those of their spouses and children. The bill, if passed under the framework, would suggest a change in policy after the 2012 passage of the Stop Trading on Congressional Knowledge Act, or STOCK Act, allowing members of Congress to buy, sell and to trade stocks and other investments during their tenure. , but also by requiring them to disclose these transactions.

“Congress can act to restore public faith and confidence in its officials and ensure that those officials act in the public interest, not their private financial interest, by restricting senior government officials – including including members of Congress and the Supreme Court – and their spouses and dependent children trading in stocks or owning investments in securities, commodities, futures, cryptocurrencies and other similar investments and short selling of stocks,” Lofgren said.

She added:

“I will soon introduce the legislative text of a bill built on this framework for reform. Many MPs have already concluded that reforms are needed.”

The framework suggested that SCOTUS lawmakers and judges could still hold and disclose a portfolio with diversified mutual funds, exchange-traded funds, treasury bills and other investments that “did not present the same potential for conflicts of interest”. disclosure amounts are more specific rather than the “extremely broad” range currently used – for example, $5 million to $25 million – and are publicly available.

Under the STOCK Act, lawmakers are required to report the purchase, sale, or exchange of any investment over $1,000 within 30-45 days, but the law provides for minimal financial and legal consequences. for not reporting on time – sometimes as little as $200 late fee. The proposed framework suggested imposing fines of $1,000 for every 30 days an individual violated disclosure rules, increasing late fees to $500, and allowing the Department of Justice to sue. civil actions if necessary. The House Press Gallery Twitter account reported Thursday that the House could consider the bill as early as next week.

Senators Jon Ossoff and Mark Kelly proposed similar reforms for the STOCK Act in the Senate in January, but there has been no movement on the bill for over 8 months. According to Lofgren, House Speaker Nancy Pelosi tasked the committee with reviewing potential financial conflicts of interest in Congress. However, the speaker has previously pushed back on efforts to ban lawmakers from owning or trading stocks, saying “they should be able to participate in that.”

Related: Powers On…Why Are US Officials Ignoring Ethics and the STOCK Act When Trading Stocks?

A number of House members and senators have revealed their exposure to crypto investments, including Illinois Rep. Marie Newman, Florida Rep. Michael Waltz, Wyoming Senator Cynthia Lummis, Texas Rep. Michael McCaul , Pennsylvania Rep. Pat Toomey, Alabama Rep. Barry Moore, and New Jersey Rep. Jefferson Van Drew. In December 2021, New York Representative Alexandria Ocasio-Cortez said it was inappropriate for her to hold Bitcoin (BTC) or other digital assets because US lawmakers have access to “sensitive and to future politics.

Here’s why the 1990s Yamaha GTS1000 was ahead of its time


Automakers are now playing it safe in terms of implementing the technology. But things were crazy in the 80s and 90s and there were all kinds of futuristic features on motorcycles. One such creation was the Yamaha GTS1000, one of the first motorcycles to feature a forkless front end. The “first” tag actually goes to the Ducati-based Bimota Tesi 1/D 851 which increased Yamaha launching in 1990. But it was the GTS1000 that propelled this technology around the world.

The complex front suspension and steering system had many benefits, including more precise handling and reduced stress on the main frame. But it was not without its problems and often offered a “different” driving experience. At low speeds, the steering was hard to shift, and there was the problem of changing the angle and length of the steering rake with braking intensity.

In addition, a never-before-seen technological feature also came with a hefty price tag. The Yamaha GTS1000, when launched, was priced at $12,999. With today’s money, you can get the evil MV Agusta Brutale 800 Rosso for an extra $400! Back then, this Yamaha locked horns with BMW K1100RS, Honda CBR1000F, Suzuki Katana 1100 and Kawasaki ZX-11.

The Yamaha GTS1000 with its futuristic features made jaws drop in the 90s; Still in 2022!

Yamaha GTS1000 had the iconic forkless ‘RADD’ front end

The coolest feature of the Yamaha GTS1000 is its forkless front suspension setup. Yamaha derived it from Ratioally Advanced Design Development (RADD) which was the creation of American inventor James Parker. The front suspension and steering system of the GTS1000 was similar to the cars. The wheel and suspension functions were mostly handled by an upper and lower arm as seen in cars. A shock absorber was attached to the left side of the wheel.

A post was attached to the left wheels but is concealed by the mudguard. The front wheel is attached to a large axle that uses roller bearings for movement. Ball joints have been used to connect the upper and lower arms at both ends of the upright, allowing wheel movement on all axes. The steering system consisted of a steering box that connected the handlebars to the front.

The advantages of this system were numerous. Due to the low-slung design, the center of gravity was much lower than a conventional setup, which helped with cornering and stability. Second, because the forkless system was directly connected to the chassis, it eliminated contact load multiplication. Since the suspension arms were much more stable, there was a reduction in steering mass and the steering was much more precise.

Related: Ranking the coolest ’90s sport bikes on the used market

The GTS1000 had a single frame with a Greek connection

The handlebar is connected to the upright above the wheels via a steering box. All of this setup is connected to a uniquely designed frame that forms two C-shaped aluminum plates with a slight forward tilt. Viewed from the side, the main frame resembles the Greek alphabet Ω; hence the name Omega chassis. The main frame is connected to two steel subframes at each end. The front extension is for the fairing and dashboard and the rear is for the seat and body.

Yamaha GTS1000 Packed A 100 Hp FZR1000-Four in line derivative

Yamaha gave the GTS1000 a detuned version of the FZR1000 inline-four engine. This liquid-cooled, 20-valve, DOHC, 1002cc unit developed 100 hp and 78 lb-ft of torque. Power was transmitted to the rear wheel via a five-speed gearbox. Yamaha pitched it as both a tourer and a sportbike, which was a bit confusing.

The seating posture was a little aggressive with the handlebars set lower. This required a slightly forward-facing position. But the motor peaked at around 6,500 rpm, which didn’t fit the “sportsbike” label Yamaha wanted to give it. Nonetheless, the GTS1000 was a comfortable machine to ride and came with a ready-to-carry saddle for rider and passenger.

Related: 5 Fastest Japanese Motorcycles of the ’90s (& 5 Americans We’d Rather Buy)

This futuristic Yamaha flaunts cool design and features

The GTS1000 still looks futuristic by 2022 standards. Those tri-spoke alloy wheels look sick! The bike was low and long, which again was an indication of its touring side. The fixed windshield was enough to protect you against the gales. It was only offered in a metallic red hue for the United States.

Yamaha used a 5/17-inch rear wheel that was attached to an 11-inch brake rotor mated to a two-piston caliper. The rear part was quite normal compared to the front. It came with a conventional swingarm with a monoshock taken from the Yamaha FZR1000. The front brake situation was quite tricky as Yamaha could not deploy a dual-disc setup due to space constraints.

Instead, the GTS1000 has a big 12.6-inch vented disc mated to a 3.5/17-inch alloy wheel six-piston caliper. Those sold in North America came with standard ABS. Another interesting aspect was the position of its fuel tank. The GTS1000 packed a 5.3 gallon tank upright above the gearbox and towards the rear of the main “Omega” frame.

The Yamaha GTS1000 is an impressive modern classic

Yamaha took a bold step with the GTS1000 and created the world’s first production-ready motorcycle with a forkless front end. But this complex creation could not gain traction as Yamaha expected. It sold for only seven years and there are only a few on the roads right now. But there is a thriving community of GTS1000 owners who still share the same pride and passion for this quirk. And this Yamaha clearly looks like a modern classic.

Source: Yamaha

Tornado Cash source code is now available on GitHub


The controversial Tornado Cash virtual currency mixer code Return to GitHub following a month of downtime.

Last month, after the US OFAC announced sanctions against Tornado Cash, GitHub has disabled associated accountsincluding the story of Roman Semenov, co-founder of Tornado Cash.

Then last week, the Treasury Department authorized users to retrieve funds from Tornado Cash, and individuals who deposited funds into Tornado Cash before August 8 could apply for an OFAC license to “engage in transactions involving the virtual currency in question.”

Following this, Ethereum lead developer Preston Vanloon youged GitHub lifted the ban on Tornado Cash, as the Treasury announcement said “U.S. persons would not be prohibited by U.S. sanctions regulations from copying open source code and making it available online for others can see it”.

After the code ban was lifted, Vanloon tweeted, “Looks like everything is in ‘read only’ mode, but this is progressing from an outright ban.”

As of August 24, an unofficial archive of Tornado Cash code is available on GitHub. Matthew Green, a professor at Johns Hopkins University, built the archive.

Tornado Cash addresses continue to be sanctioned, but users can still access the site due to its decentralized structure.

Read also : Why did the US OFAC sanction Tornado Cash?

A new framework for community mining is on the way – Yukon News


The Government of Yukon invites Yukoners to complete a questionnaire on a proposed framework to address potential mining-related disputes.

In a statement, the proposed staking and mining development framework for planned and zoned communities aims to ensure that the process “promotes sustainable development, respects community values ​​and minimizes land use conflicts” when staking and staking mining development are undertaken in the communities.

The framework aims to suggest approaches to prevent and resolve conflict between mining operations and Yukon communities, improve coordination between municipal and unincorporated land use planning and mineral regulatory processes, and find ways so that mining activities respect community values ​​and interests.

For example, disputes and uncertainty surrounding the development of existing mining claims within community boundaries have resulted in lawsuits in Dawson City and Whitehorse.

Comments will be analyzed and published in an online summary after the questionnaire closes on October 14.

Once the responses have been organized, a framework document will be drafted and submitted to the cabinet for approval.

The Yukon government is also seeking input from the mining industry and other interested groups on its intensity-based emissions target for placer and quartz mining.

People can participate by reading the discussion paper, which outlines the proposed approach, and providing feedback by email by October 3.

The discussion paper proposes the mining sector’s goal of reducing greenhouse gas emissions per unit of production by 45% by 2035, with the goal of net zero by 2050.

The target for all other sectors and industries except mining is a greenhouse gas reduction target of 45% by 2030.

In the document, intensity-based targets, as opposed to an absolute greenhouse gas reduction target, define a desired level of emissions per unit of material produced or volume of activity to encourage more efficient operations. , “regardless of the number or number of mines”. are working at any given time.

The results will be published in a “what we heard” report.

Contact Dana Hatherly at [email protected]

ActiveState Artifact Repository Reduces Risk to Secure Python Supply Chain


ActiveState publishes ActiveState Artifact Repository to enable organizations to securely create Python dependencies directly from source code.

Rather than importing pre-built Python dependencies from a public repository like Python Package Index (PyPI), or from an internal build process which may not be secure against supply chain attacks, all Python artifacts are created through ActiveState’s secure build service and stored directly in their own private ActiveState artifact repository for distribution, creating a closed-loop environment that maximizes supply chain security.

ActiveState’s Secure Build Service supports security and integrity controls defined at the highest level of the Software Artifact Supply Chain Tiers (SLSA) framework, significantly reducing the risk of working with predefined Python dependencies. The ActiveState Artifact Repository is a private, customer-customized repository that will only contain Python packages that have been verified by the organization’s security team.

When developing with Python, software vendors typically use their artifact repository to proxy the Python Package Index (PyPI) which provides no security or integrity guarantees for the third-party software assets they provide. In contrast, the ActiveState Artifact Repository provides software vendors with a catalog of secure Python dependencies that have already been vetted by their security team, reducing the risk of using third-party components.

Organizations that create Python dependencies from source code create unique versions that are rarely updated, resulting in buggy and vulnerable applications; or they are forced to implement and maintain separate build systems for each operating system (OS) that developers and deploying systems need, resulting in high operational overhead. Conversely, the ActiveState artifact repository:

  • Ensures the security and integrity of Python artifacts that developers work with.
  • Eliminates the overhead of creating and maintaining build environments for Windows, Mac, and Linux.
  • Uses a secure, cloud-based build service to eliminate the need to periodically audit internal build systems for any compromises.

As a result, software vendors now have a much more secure and cost-effective way to make trusted Python dependencies available to development and DevOps teams.

Loreli Cadapan, VP, Product, ActiveState, said, “Artifact repositories are a proven way to create a consistent and reliable software development process. But the final product is as safe and secure as the initial entries in the artifact repository. This is where ActiveState excels. The ActiveState Artifact Repository reduces the risk and cost of securing your Python supply chain while ensuring the security and integrity of the products and services you create.

Cummins Fuels Hydrogen Pledge at IAA


Cummins Inc. confirmed its commitment to the IAA to play a major role in the hydrogen economy as part of its Destination Zero initiative.

“Cummins has been at the forefront of developing power solutions for more than a hundred years, and we continue to demonstrate industry leadership by developing a diverse line of sustainable powertrains – with hydrogen playing a key role,” said said Alison Trueblood, Executive Director of Cummins – On-Highway Business Europe. “Our goal is to focus on the entire hydrogen value chain to drive sustainability and enable faster adoption.”

Through acquisitions and investments, Cummins is focused on three key areas for hydrogen: green hydrogen production, hydrogen management and transportation, and the application of hydrogen in engines and fuel cells.

Production of green hydrogen

Green hydrogen is produced by electrolysis to transform sustainable energy (wind, solar, hydro) into hydrogen without carbon dioxide emissions. As announced in May 2021, Cummins is establishing a new Proton Exchange Membrane (PEM) Electrolyzer plant in Spain that will house system assembly and testing for approximately 500 MW/year and will be scalable to over 1 GW/year . Cummins is investing in this technology, with more than 600 electrolyzers deployed worldwide in 100 countries.

Hydrogen storage and supply

On-board storage is an essential part of hydrogen production. The hydrogen must be compressed into the available space to store enough of it to meet the vehicle’s duty cycle requirements. Cummins has a joint venture with NPROXX, a world leader in high pressure hydrogen storage for stationary and mobile applications, to support the OEM integration process.

NPROXX hydrogen tanks were installed on the concept medium-duty delivery vehicle on the Cummins booth at the IAA. The truck is powered by Cummins’ 216 ​​kW B6.7H hydrogen engine and paired with a high-capacity hydrogen storage system at 700 bar pressure, enabling a potential range of up to 500 kilometres.

“The offer and the infrastructures will take time to develop. Hydrogen adoption will likely begin with applications where fueling can be done centrally, such as home operations or near large hydrogen hubs,” Trueblood noted.

Hydrogen engines

Cummins is developing hydrogen combustion engines that will provide sustainable solutions more aligned with current vehicle designs to reduce complexity for OEMs and their customers. Reusing appropriate components results in economies of scale while providing reliability and durability equal to diesel.

In addition to the medium truck’s B6.7H hydrogen engine, IAA visitors could see Cummins’ largest X15H hydrogen engine for heavy trucks up to 44T GVW, with a maximum output of 530 hp (395 kW). ) and an impressive peak torque of 2600 Nm.

“A hydrogen combustion engine fits into today’s vehicles, works with today’s transmissions, and integrates seamlessly into existing industry networks and service practices,” said added Trueblood.

Hydrogen fuel cells

Hydrogen fuel cell technology can offer an efficient power solution for heavy-duty vehicles with high energy usage and requirements, while meeting zero emissions needs. The fuel cell uses oxygen to create a reaction, turning hydrogen into electricity. It works with battery technology – ultra-capacitors, lithium-ion or lead-acid – in a parallel hybrid configuration to provide instantaneous response.

Cummins showcased its fourth-generation fuel cell at the IAA that offers improved power density, efficiency, and durability while producing zero greenhouse gases and zero air emissions criteria. It is available in 135 kW single module and 270 kW dual module motors for medium and heavy duty applications.

“We view hydrogen engines and fuel cells as complementary energy sources, offering different options to customers depending on where they are on their path to zero carbon. The introduction of hydrogen engines market will also accelerate the growth of hydrogen infrastructure to support widespread adoption of fuel cell powertrains,” Trueblood concluded.

Read more of our sustainability articles here