Home Blog

Five Niche Parenting Markets And How To Reach Them Beyond The Mommy Blog

Five Niche Parenting Markets And How To Reach Them Beyond The Mommy Blog

The “mommy blogging” movement began in the early 2000s when internet conversations amongst new moms gave much-needed support and guidance. I had my blog before starting my agency, as did the ladies who would later become my business partners. We used this relatively new medium to discuss our daily highs and lows and build essential bonds that have lasted to this day in many situations.

The “mother blog” has grown into a multibillion-dollar business. And it’s no surprise: according to various studies, American mothers control anywhere from 64 percent to 85 percent of household spending. In 2018, it was predicted that women held as much as $40 trillion in consumer purchasing throughout the globe. While today’s broad parenting audiences are still seeking issues that will always connect with anybody raising small children (for example, first meals, toilet training, and sleepless nights), many parenting makers are increasingly focusing on specialization.

Today’s parenting influencers provide the perfect collaboration opportunity for marketers wishing to access these highly focused, highly engaged audiences. Not only can they talk to the specialist themes that their followers are interested in, but their shared experiences also have the authenticity that customers react to. Here’s how you use parental influencers to reach five highly targeted markets:

  1. Families of Military Personnel

Active-duty troops, reservists, veterans, and their families have similar characteristics: they are often relocated, stationed far away from loved ones, and have a close-knit group of friends and neighbors.

According to a survey, word-of-mouth recommendations and evaluations are critical in this sector, particularly when they come from a reliable source.

Consider influencer marketing efforts that include coupons or discounts and promotions focusing on travel, vacation, or summer relocation. Authentic content from military influencers that understand the community and its needs will ring true in this market, seeking more than lip service.

  1. Consumption

Food-focused parenting producers cover a wide range of themes and recipes on their platforms, and many are accessible for sponsored content, recipe creation, photography, and brand ambassadorship.

These influencers’ material often includes a parenting component, such as solid food introductions or coming up with nutritious, innovative snack ideas. They’re perfect for marketing food products, kitchen gadgets, takeout (for those evenings when everyone’s too tired to cook! ), grocery stores, and more. Sponsored recipes and material based on family rituals, holidays, parenting experiences (getting kids to eat veggies, for example), and entertaining are all excellent choices for this area.

For example, our firm recently completed a campaign for Stonyfield that included a millennial parent blogger’s piece titled “5 Ways to Get Your Child Active This Spring.” Her material contained bright, pinnable visuals and her advice for concentrating on the exercise, which incorporated the brand’s healthy on-the-go snack message.

  1. Education at home

Homeschooling is increasing, with an estimated 3.5 million children enrolled each year. More than home education items, homeschooling parents are interested in life experiences, unique learning methods, and family-first issues in general.

Brands can attract homeschooling audiences by weaving advertising into engaging tales, guidance, activities, and suggestions. Consider sponsoring printables, a summer bucket list, DIY instructions, or recipes that are helpful year after year.

  1. Saving Money/Couponing

According to PaydayNow, While budget-conscious parenting influencers may not immediately spring to mind as a sponsorship partner, their enthusiasm and highly engaged audiences are ideal for advertising rewards programs, coupons/discounts, financial services, or any product with a money-saving advantage.

Brands could consider Family-oriented subjects with the actual value for consumers: a top ten list for saving money over the holidays, how to vacation on a budget, back-to-school shopping under $100, and so on. One frugal-focused influencer, for example, helped promote FreeShipping.com with a holiday-themed article on saving money by utilizing the client’s cash-back program for a campaign we executed with FreeShipping.com.

  1. Handicraft/DIY

Their diversity only equals do-it-yourself parenting gurus’ inventiveness and inspiration. This thriving sector provides infinite options for brand collaborations, from professional designers to home craft aficionados.

Videos and lessons and before and after photos have shown to be quite effective in this market. Because Pinterest is one of the most popular places to look for this sort of material, make sure your campaign contains eye-catching photos with big, legible text and your brand URL, scaled to Pinterest’s ideal image ratio (2:3). (Canva is a tool that many of our influencers use to find and customize Pinterest-ready layouts.)

The topics covered by today’s parenting creators range from fashion to health to vacation. Regardless of the theme, they include more than just the stereotypical “mom” image: men, parents of color, LGBTQ+, mixed and adoptive families are all part of this vibrant content production. Content patterns will change as platforms expand, but the essential aspect of parents bonding over similar interests will stay the same. Brands that provide relevant, compelling information to assist in establishing such relationships will succeed.

Cybersecurity researchers will no longer face hacking charges under the CFAA

Placeholder while loading article actions

The US Department of Justice said Thursday it would not use the country’s longstanding anti-piracy law to prosecute researchers who try to identify security flaws, a move that offers both protection and further validation for a machine still vilified by many officials, companies and the general public.

In a Press release and five-page policy statement Issued to federal prosecutors, top justice officials have said local U.S. attorneys should not press charges when “good faith” searchers exceed “authorized access,” a vague phrase in the 1986 Privacy Act. Computer Fraud and Abuse (CFAA) which has been interpreted to cover such routine practices as automated downloads of web content.

The guidelines define good faith as research aimed primarily at improving the security of sites, programs, or devices, as opposed to exploration aimed at demanding money in exchange for withholding disclosure or exploitation. of a security breach.

Companies can still prosecute those who claim to be acting in good faith, and officials could continue to charge hackers under state laws that often echo the CFAA. But most state attorneys tend to follow federal guidelines when their laws are similar.

In the past, well-meaning hackers were routinely silenced by legal threats. Even in recent years, civil suits and criminal referrals have been used to quash public discussions of dangerous vulnerabilities or cast doubt on research results.

In 2019, a mobile voting company, Voatz, referred the FBI to a Michigan student who was looking for his app for a course. Twenty years ago, a former employee of email provider Tornado Development served more than a year in prison on federal CFAA charges after the company refused to fix security flaws and emailed customers about it.

In a case that drew national attention in October, the governor of Missouri threatened hacking charges against a local newspaper that reviewed the publicly available source code of a government website, then warned the state that it exposed the social security numbers of 100,000 educators.

The Justice Department did not respond to a question about what prompted the new policy.

But security work has become more obviously vital to corporate and even national security, and professionalization has spawned billion-dollar companies. Many companies now pay bug bounties to researchers who find flaws and report them directly or through programs run by outside companies like Bugcrowd and HackerOne, which have welcomed the new US policy.

“For more than a decade now, cybersecurity leaders have recognized the critical role of hackers as the immune system of the internet,” HackerOne founder Alex Rice said via email. “We enthusiastically applaud the Department of Justice for codifying what we have long known: bona fide security research is not a crime. »

Many hackers have turned to bounty platforms and other intermediaries for better protection against legal fallout. Other vulnerabilities were never disclosed or patched for fear of lawsuits, said Andrew Crocker, an attorney at the nonprofit Electronic Frontier Foundation who often advises hackers.

“The first conversation is that the CFAA has criminal and civil remedies, and if things go wrong, it’s entirely possible that the federal government will bring charges,” Crocker told The Washington Post. “Some of the factors are beyond their control, such as whether the company views them as good or bad, whether the company has a good relationship with the local U.S. Attorney’s office, and whether the company has influence at DC”

Even among hackers who are inherently risk-takers, fear of criminal action often deters them from disclosing important findings that could help businesses, Crocker said.

The language of political explanation still leaves room for judgment calls in an area of ​​high tension and overlapping motives, Crocker and others noted.

“And if the goals include talking to [a security conference] or collect a bounty? Isn’t that pure research?

Security experts have said they would prefer Congress review the 35-year-old law, since judges apply the existing law as they see fit and more importantly another Justice Department could reverse the policy.

But they said they were happy with any step in that direction.

“This is a huge victory for our cause!” nonprofit tweet hacker rights Hacking is not a crime.

Unity game engine adopting .NET Core

Unity game engine

Unity Technologies is migrating to .NET Core, a move that will bring modern .NET to Unity developers and also promises to improve technology for .NET developers in general.

In a post this week, the Unity software team mentioned it embarked on a “multi-year initiative…to migrate from the Mono .NET Runtime to CoreCLR, the modern .NET (Core) Runtime.”

The Unity game engine is used by more than 50% of games on mobile, PC and consoles according to to the company. The engine is written in native code but can be scripted using C#, forming a large community of C# developers. The version of .NET used in Unity, however, is based on .NET in its cross-platform mono form, rather than .NET Core.

Unity developers have complained about a lack of access to new C# features and performance improvements, as well as non-standard approaches in areas such as asynchronous coding and package management. Part of the problem lies with the Unity runtime API, rather than .NET itself, and the constraints it places on interop code.

That Unity has fallen behind in this way might seem odd, as the company has been a vital part in advancing .NET from Windows-only to cross-platform execution.

Unity was an early adopter of Mono, as without it the open source implementation of .NET would have progressed more slowly or might not have survived. This legacy, however, has become a burden. At GDC (Game Development Conference) 2022 earlier this year, VM Team Leader Josh Peterson explained how Unity was tightly tied to the Mono runtime, preventing migration to .NET Core CLR ( Common Language Runtime), and developed its own package manager and . asmdef package definition files and does not use MSBuild, the .NET build tool.

Even the Mono runtime is a fork of the official version. The consequence is that people who have learned .NET elsewhere find that in Unity they cannot use familiar tools or C# language features such as asynchronous and pending instructions for asynchronous coding.

Another big issue is that Mono has an integration API that doesn’t exist in .NET Core. The way it works is that the native Unity C++ application hosts the .NET runtime. In order to overcome this, Peterson said Unity is “implementing the Mono Integration API on the .NET Core CLR” and that work will be submitted to the .NET Open Source Project so that it is available to everyone.

The team had to solve tricky problems, he said, in the area of ​​native code interoperability, and wrote its own layer of marshalling to overcome issues like managed code objects that can get move to different memory locations and break native code that references those objects.

The intent is to bring Unity’s work on .NET to the general public. “We need to make sure we’re not building our own solutions…building on top of it, instead of branching off,” Peterson said.

The migration is already underway but complex. It starts with .NET CoreCLR support on desktop platforms, due in 2023, after which “we will port the Unity editor to .NET CoreCLR and remove runtime support .NET Mono at the same time,” the team said, with this new editor expected in 2024.

Unity’s move was welcomed by game developers, although there are still limitations. Asked if Unity will be decoupled from specific .NET versions, Peterson said in a post that “the .NET version will be tied to the Unity version just as it is today…it’s pretty tightly coupled to the .NET runtime”.

There will also be breaking changes for existing code, and the long migration time is another source of frustration.

That said, Unity remains important to the .NET ecosystem and feeding it more fully into the wider .NET ecosystem will be helpful for a project that in some ways remains dominated by Microsoft’s platform and has struggled. to attract a wider community of developers.

IEA calls for comprehensive approach beyond inflation targeting framework


Dr John Kwakye, Research Director at the Institute of Economic Affairs (IEA)

Ghana records highest inflation in 18 years at 23.6% in April

Ghana misses inflation targets, says IEA

The inflation targeting framework was adopted in 2007

The Institute of Economic Affairs (IEA) said a more comprehensive approach was needed to stem the surge in inflation in the country.

In 2007, the central bank adopted the inflation targeting framework as well as a flexible exchange rate regime to ensure price stability over the medium term.

But the institute’s research director, Dr. John Kwakye, said the country needs to go beyond its current inflation targeting framework as the existing structure is not helping Ghana achieve its goals. of inflation.

In a statement published and seen by GhanaWeb, the IEA boss argued for an inflation targeting framework well suited to the Ghanaian context.

“The Bank of Ghana’s BWI partners and the markets expect the Bank to adhere to the rules of the framework. According to the framework, public relations adjustments affect inflation by increasing the cost of credit and thereby reducing aggregate demand in the economy,” the statement read in part.

“We know, however, that in the Ghanaian context, the transmission of PR is constrained by an underdeveloped and less responsive financial sector. But even more important is the fact that Ghana has a long history of inflation with strong supply or cost undercurrents, in particular, food, fuel and the exchange rate. explained Dr. Kwakye.

He continued, “As a primarily demand management tool, the IT framework is less suited to Ghana’s type of inflation. It is more suitable for mature economies where inflation tends to be more demand driven.

He further called on the Bank of Ghana to engage with government and other relevant agencies to directly target key sources of inflationary pressures in particular; fuel, food, transportation and exchange rate to determine trends and drivers.

Here is the full statement below

Watch the latest edition of BizTech below:

Eastern Eight CDC Unveils New Affordable Housing Project | News


Eastern Eight CDC held a symbolic ribbon-cutting event Tuesday morning to mark the completion of a new home at 1808 E. Unaka Ave.

The home was built in partnership with Auburn University’s Rural Studio Front Porch Initiative and the Appalachia Service Project as part of an effort to provide affordable housing.

Eastern Eight CDC is a non-profit corporation and certified housing development organization that focuses on meeting the housing needs of low to middle income families in the area. He partnered with Auburn’s Rural Studio, an off-campus design-build program that’s part of the university’s School of Architecture, Planning and Landscape Architecture, to create a home that’s not only affordable at entry, but which keeps costs to a minimum in the long run.

Affordability was not only measured by the cost of building the house, but also took into consideration the energy efficiency, the durability of the building and the contribution to the health and well-being of the residents as well as to the fabric of the neighborhood, according to the associate director of Rural Studio Rusty. Black-smith.

The Appalachia Service Project, an organization focused on repairing homes for low-income families through volunteer labor, served as the contractor in this construction and helped make the home as energy efficient as possible. The city also provided funds for the project, drawn from its Community Development Block Grant funds provided by the U.S. Department of Housing and Urban Development.

The house sold for $165,000 and the new owners are expected to move in within the next two weeks. Eastern Eight CDC and Auburn’s Rural Studio said they hope to be able to pursue affordable housing projects in the area.

“It’s not just about how much the house cost to build, but what it costs us as a community if we don’t build houses like this,” Smith said. “It’s this cost that we call the hidden cost of inaction, the cost of not doing projects like this wherever you can in the city. This cost is enormous and we all pay it.

For more information on affordable housing opportunities, visit e8cdc.org. To learn more about Auburn University’s Rural Studio Front Porch initiative, visit ruralstudio.org.

Try the Johnson City Press app today. Download here from Google Play and App Store.

Recommended Videos

BetMGM bonus code provides $1,000 risk-free sports bet


New York Post readers can get their hands on a $1,000 risk-free bet with BetMGM. Use promotional code NPBONUS when you sign up for BetMGM, and make your first risk-free sports bet.

BetMGM’s new customer offer gives new users a brilliant, risk-free first sports bet up to $1,000. Using bonus code BetMGM NPBONUSyou can take advantage of this fantastic offer, with exciting NBA matchups on the bill.

This means that if your bet wins, you keep the winnings, but even if it loses, you’ll get your entire stack back as free bets.

BetMGM’s signup offer is one of the most competitive on the market, giving new customers a great welcome to life with BetMGM.

This week’s sports lineup with BetMGM

The final four of the NBA playoffs are set, after a dramatic weekend of events that led to four contenders remaining. The No. 1 seed West Phoenix Suns were eliminated in Game 7 by the Dallas Mavericks, and the Boston Celtics prevailed over defending NBA champions Milwaukee Bucks.

The picture now? The Miami Heat face the Boston Celtics in the East, the Golden State Warriors face the Dallas Mavericks in the West. Both series begin Wednesday night and the drama begins again.

The English Premier League is reaching a dramatic climax, after a weekend that saw Manchester City drop points at West Ham. Liverpool travel to Southampton on Tuesday night, where if Liverpool do not win, Manchester City will lift the Premier League title.

Game 1 of the second round of the Stanley Cup Playoffs is set to begin as the Florida Panthers host the Tampa Bay Lightning on Tuesday night. These two teams met four times during the regular season as they shared the series with two wins each.

What is the BetMGM bonus code?

BetMGM Sportsbook Promo Get a $1,000 risk-free first sports bet
Sports Betting Promotion Terms and Conditions New customers only. Must be 21 years or older. NY, CO, DC, IA, IN, MI, NJ, NV, PA, TN, WV, IA, VA, WV, WY only. Full terms and conditions apply.

How to use your BetMGM bonus code

  1. Click above to redeem BetMGM bonus code.
  2. Register your details and read the TOS.
  3. When prompted for a bonus code, enter NPBONUS.
  4. Make your first deposit up to $1,000.
  5. If your first bet wins, the withdrawable money will appear in your balance.
  6. If your bet loses, your free bets will be in your account within 24 hours.
  7. Free bet funds must be used within seven days or they will expire.

Refer a friend with BetMGM

21+.NY, CO, DC, IA, IN, MI, NJ, NV, PA, TN, WV, IA, VA, WV, WY only. The T&Cs apply.

One of the easiest ways to get yourself a load of free bets is through BetMGM’s very generous ‘refer a friend’ program. BetMGM allows bettors to refer up to 20 friends, with both getting a $50 bonus. Your friend will need to make their first deposit and place their $50 bonus on any sport with odds of -200 or higher for you to claim your bonus.

Discover the best sports betting sites and apps

The Automotive Injection Nozzle Market is Expected to Grow at a


New York, U.S., May 17, 2022 (GLOBE NEWSWIRE) — Automotive Injection Nozzle Market Overview:
According to comprehensive research report by Market Research Future (MRFR), insights on “Automotive Injection Nozzles Market” by Technology, Fuel Used, Sales Channel, Vehicle Type and Region – Forecast up to in 2027, the market size is expected to grow at a compound annual growth rate of 6% by 2027.

Automotive Injection Nozzle Market Scope:
Fuel injection systems provide quicker throttle response, better fuel flow, precise control of the air-fuel combination, and even fuel delivery. These features help automobiles improve fuel efficiency while maintaining maximum horsepower, lower exhaust emissions, better acceleration and more efficient operation. As a result, the injector nozzle pumps the precise amount of fuel and air needed to keep the engine running at peak efficiency. Additionally, government agencies and private organizations have begun to demand fuel-efficient, reliable, and environmentally friendly products that have low maintenance costs and can accept alternative fuels.

Dominant Key Players in Automotive Injection Nozzle Market Covered Are:

  • Haynes Company
  • Infineon Technologies SA
  • Eaton Corporation PLC
  • Denso Company
  • Delphi automotive automaton
  • Camshaft Inc.
  • Continental SA,
  • Transonic Combustion Inc. (USA)
  • Magneti Marelli SpA
  • Keihin Company
  • Robert Bosch GmbH
  • Alternative Fuel Systems Inc.
  • Federal-Mogul Corporation (USA)

Get a Free Sample PDF Brochure:

The essential role of the nozzle is to atomize the fuel creating a fine mist of fuel, allowing fuel to be fully and efficiently burned for more efficient driving. Injection nozzles help vehicle engines maintain the correct amount of fuel in the air injected into the combustion chamber, thereby reducing engine heating. Due to increased energy efficiency, the global automotive injection nozzle market is expected to grow in the near future.

Exclusively encompassed USP market:
Market factors
The automotive injector market is growing and creating new opportunities. Marketplace products and applications are the main drivers of increased interest. The automotive injection nozzle industry products are essential for fuel efficient automobiles and emission regulations. It depicts an ideal scenario for the growth of the on-board traveler vehicle market. Awareness of climate change is prompting governments to invest in cleaner, more fuel-efficient engines and technologies. Automotive fuel injection nozzle technology is a surefire way to increase and improve power/thrust while using the same fuel. Due to the increased efficiency, the life cycle of the engine increases, which reduces vehicle operating costs.

The widespread adoption in the automotive industry is one of the major factors driving the global market. It will contribute to developing vehicle production and car manufacturing in emerging countries. The increasing share of injection nozzles also generates considerable market prospects.

Browse In-Depth (100 Pages) Market Research Report on Automotive Injection Nozzle Market:

Market constraints:

Diesel and gasoline automotive engines offer multiple opportunities in the automotive field, but some limitations exist. Many constraints weigh on these products which hinder the development of the market. The strict restrictions and conditions will limit the market potential and prevent expansion. Another barrier to market development is the element of value. However, the growing popularity of electric vehicles will lead to an indefinite increase in the automotive injection nozzle market. Some aspects of market analysis will drive commercial viability in the near future. One of these difficulties is its variable cost, with some groups believing it to be excessively expensive while others believe it to be reasonable.

Some of the main reasons are limited supply and disagreements with traders. The Automotive Injection Nozzle market constantly faces trade wars and geographical barriers, and to settle such difficulties from these limitations, the market needs more essential participants.

Talk to a specialist:

Market Segmentation Covered by Research:
By fuel

The diesel segment is expected to gain ground in the interval of the forecast period.

By device type

Passenger cars to achieve advanced market share during the forecast period.

By technology

Gasoline direct injection is expected to gain a better position in the automotive injector market.

Buy this report:

Regional analysis
The automotive injector market and the growing number of electric vehicles are growing rapidly. It contributes to the growth and innovation of the automotive industry. The development of injector nozzles in the global vehicle market is an important justification for the pursuit of electric motors and injectors. Compared to other regions, North America holds the largest share of the overall industry. Due to the growing popularity of consumer electric vehicles, this district has a strong interest in gasoline and diesel car engines.

The Asia Pacific Automotive Injection Nozzle Market is expected to grow at a significant rate over the forecast period, driven by the growing demand for automobiles owing to the rising disposable income in the region, as well as well as the strong presence of major automakers in Asia-Pacific countries. such as China, Japan and South Korea. The merger of Latin American countries including Mexico and Brazil presents an attractive potential for the automotive injection nozzle market as several well-known automobile manufacturers have established manufacturing facilities in these countries during the period. forecast.

Related reports:
Automotive Position Sensor Market Insights Report by Type, Vehicle Type and Region – Global Forecast to 2030

Automotive Door Seals Market Research Report: Insights by Material, End Market and Region – Forecast to 2030

Bluetooth in Automotive Market Research Report: Insights by Application, Vehicle Type, OEMs and Region – Forecast to 2030

About Market Research Future:
Market Research Future (MRFR) is a global market research company that prides itself on its services, offering comprehensive and accurate analysis regarding various markets and consumers around the world. Market Research Future has the distinct objective of providing clients with top quality research and granular research. Our market research by products, services, technologies, applications, end users and market players for global, regional and country market segments enables our clients to see more, know more and do more , which helps answer your most important questions. questions.

Follow us: LinkedIn | Twitter


European Parliament and Council agree on cybersecurity risk framework


The NIS2 directive aims to counter the increase in cyber threats in Europe

Prajeet Nair (@prajeetspeaks) •
May 16, 2022

The EU plans to counter the increase in cyber threats following the Russian-Ukrainian war. (Photo: Dusan_Cvetanovic, Pixabay)

the The European Parliament and the Council of the European Union, the executive branch of the EU made up of 27 members, have reached a provisional agreement to establish a “baseline for cybersecurity risk management measures and compliance obligations”. statement”.

See also: Live Webinar | Remote Employees and the Big Resignation: How Do You Handle Insider Threats?

The new directive, called NIS2, is a modernized framework based on the EU’s Network and Information Security Directive. It applies to all sectors, including energy, transport, health and digital infrastructure.

The Council of the EU told Information Security Media Group that the agreement is only “provisional”, meaning that the finalized legislative text is still subject to technical negotiations between the two co-legislators – the Council and the Parliament. This would require the formal approval of both institutions at a later stage, probably in June, according to the Council.

After final approval, entities will have a 21-month compliance window. “Once published in the Official Journal, the Directive will enter into force 20 days after its publication and [the] Member States will then have to transpose the new elements of the directive into their national law. Member states will have 21 months to transpose the directive into national law,” the European Commission said.

The Commission originally proposed the latest framework in December 2020. It will replace the current NIS Directive on the security of network and information systems. The 2016 NIS Directive called on EU members to implement measures “for a high common level of security of network and information systems” for critical sectors across the EU.

“As part of its key political objective of preparing Europe for the digital age, the Commission proposed the revision of the NIS Directive in December 2020. The European cybersecurity law in force since 2019 has provided Europe of a cybersecurity certification framework for products, services and processes and strengthened the mandate of the EU Agency for Cybersecurity (ENISA)”, says the European Commission.

The new frame

“The new framework has a broader scope to include medium-sized entities and simplified incident reporting requirements,” says the International Association of Privacy Professionals.

“The revised directive aims to eliminate the divergences in cybersecurity requirements and in the implementation of cybersecurity measures in the different Member States. To do this, it establishes minimum rules for a regulatory framework and establishes mechanisms for effective cooperation between the competent authorities of each member state. It updates the list of sectors and activities subject to cybersecurity obligations and provides for remedies and sanctions to ensure enforcement,” according to the EU Council.

The Directive will also establish the European Union Cyber ​​Crisis Liaison Organization Network, EU-CyCLONe, which will support the coordinated management of large-scale cybersecurity incidents.

The European Commission says the latest framework is being put in place to counter Europe’s increased exposure to cyber threats. The NIS2 Directive will also cover more sectors critical to the economy and society, including providers of public electronic communications services, digital services, sewage and waste management, manufacturing of critical products, postal services and messaging and public administration, at a central and regional level.

“It also covers the healthcare sector more broadly, for example by including manufacturers of medical devices, given the growing security threats that emerged during the COVID-19 pandemic. The expanded scope covered by the new rules, by effectively obliging more entities and sectors to take cybersecurity risk management measures, will contribute to increasing the level of cybersecurity in Europe in the medium and long term,” according to the European Commission.

Erfan Shadabi, cybersecurity expert at cybersecurity firm Comforte AG, told ISMG that this is a strategic decision by the European Commission as more and more industries have been recognized as “vital”. Potential cyber incidents in these industries could have a ripple effect on other industries and could disrupt the entire economy, he says.

“For businesses, this is a good reminder that they need to rethink their security posture and determine whether or not they are NIS-compliant. As ongoing incidents and these guidelines demonstrate, the unthinkable can quickly become very likely for organizations at all levels,” says Shadabi.

Expanding scope

The latest framework also strengthens cybersecurity requirements for businesses and addresses the security of supply chains and supplier relationships. The framework will hold senior management accountable for non-compliance with cybersecurity obligations.

“It streamlines reporting obligations, introduces stricter oversight measures for national authorities, as well as stricter enforcement requirements, and aims to harmonize sanctioning regimes between Member States. It will help to increase the sharing of information and cooperation in computer crisis management at national and European level”, says the Commission.

Thierry Breton, Commissioner for the EU’s Internal Market, said that as cyber threats grow in complexity, “cooperation and rapid information sharing is of paramount importance”.

“With the agreement of NIS2, we are modernizing the rules to further secure critical services for society and the economy. So this is a major step forward. We will complement this approach with the upcoming Cyber ​​Resilience Act which will ensure that Digital products will also be safer each time they are used,” he adds.

“The European Parliament and the Council have aligned the text with sectoral legislation, in the specific regulation on the digital operational resilience of the financial sector (DORA) and the directive on the resilience of critical entities (CER), to provide legal clarity and ensure consistency between NIS2 and these acts,” reads a statement from the Council of the EU.

The two co-legislators also proposed a voluntary peer-learning mechanism to increase mutual trust and learn from best practices and experiences in order to achieve a common high level of cybersecurity. They aim to streamline reporting obligations in order to avoid over-reporting and creating an excessive burden for covered entities.

The impact

Greg Day, global field CISO at cybersecurity firm Cybereason, told ISMG that it’s “too early” to say what impact, if any, the NIS2 directive will have.

“As it is a directive, it is something that each country now has to convert into its own national legislation,” he says.

Day says that one of the challenges with the previous version of the directive was that international companies struggled to really understand what it meant for them, as they had to comply with the different implementation of the directive in each country. .

“What has been very positive to see lately is the recognition that as the world becomes more digital and threats continue to evolve, the required legislative controls must do the same,” he says. . But he adds that there is also the financial reality that not all agencies in all countries will have the same access to budgets and skills.



The Bottrop-based company, which has been accredited as a vehicle manufacturer with the German Federal Motor Transport Authority for decades, presented its expertise as a bodybuilder in 2020 with the BRABUS XLP pick-up, for which it has developed a discreet body variant for the current Mercedes G-Class of the W 463 series in the best English bodywork tradition.

To turn the off-roader into a pickup truck with a truly useful large loading area, BRABUS engineers used state-of-the-art design and engineering software to develop a special module for the ladder-type steel frame. It extends the wheelbase by 50 centimeters (20 in) while retaining the high torsional rigidity of the frame. The rear end of the cabin is formed by a new rear wall with heated glass.

The pickup bed is also an all-new design. It makes the vehicle 68.9 centimeters (27.1 in) longer than a standard G 63 without a rear-mounted spare wheel. In order to turn the total length of 5.31 meters (209 inches) into an eye-catcher, CSP, a business division of the BRABUS Group specializing in the development and manufacture of high-tech components made of composite materials, designed a body in custom carbon. components such as the rear sidewalls, which it manufactures using the complex prepreg process. They are complemented by newly designed steel components such as the bed floor and the side-hinged tailgate. This mix of materials provides the perfect combination of precise fit, maximum strength and high load capacity. The Flexiteek bed liner is not only extremely durable, but also gives the pickup a stylish touch of yacht design. Double matte black bed rails behind the cab add to the exciting look of the pickup and also allow a wide range of items to be securely attached.

The unusual appearance of the off-road supercar is also made particularly striking by BRABUS WIDESTAR body components. Fender flares fitted with additional wheel arches, also made from exposed carbon with a matt, sealed finish, make the pickup 11.6 centimeters (4.6 inches) wider than a G-Class model of origin. The side rubbing strips, the BRABUS bonnet hood with two power bulges and the robust front and rear skid plates are also made from this same composite material.

The WIDESTAR front fascia with its large air intakes makes the front design of the BRABUS 900 XLP “ONE OUT OF TEN” particularly dynamic and accommodates not only the exposed carbon grille with BRABUS logo, but also a beefy front protection element and a winch with a towing capacity of 4,500 kilograms (9,921 pounds).

An exposed carbon trim panel with integrated BRABUS logo also gives the rear a decidedly sporty look. It is completed with a WIDESTAR fairing which, like its counterpart at the front, turns into flares perfectly.

The rocker panels have also been custom designed to account for this pickup’s longer wheelbase and high ground clearance. Electrically retractable running boards are also available as an option and make entering and exiting the pick-up easier and safer. The integrated LEDs in the flares guarantee safe walking even in the dark. Like the BRABUS logos in the front fender flares, they light up when a door handle is pulled or the central locking system is activated by Keyless Go when approaching the vehicle.

The spectacular body design of the BRABUS 900 XLP “ONE OUT OF TEN” is completed by the roof rack and the wind deflector in exposed carbon with four LED auxiliary lights above the windscreen.

A special chassis also contributes to this supercar fulfilling its function as an absolutely off-road pickup. It gives the vehicle an extremely high ground clearance of 49 centimeters (19.2 inches) and allows for extensive articulation of both axles. For this purpose, BRABUS engineers and technicians have developed a robust suspension with portal axles. This design principle includes special wheel ends with an integrated portal gear, which compensate for the extra height of the raised vehicle and drivetrain. The components necessary for this, such as the new integral subframe and the suspension arms, are made of high-strength aluminum using state-of-the-art CNC technology. Just like the production G-Class, the rear axle uses the principle of a rigid axle. It also required redesigning the axle components and milling them from solid aluminum parts. Changes include a reinforced axle housing and all suspension control arms. This axle geometry, calculated and extensively tested, plays a key role in the outstanding off-road capabilities of the BRABUS pickup.

BRABUS has developed a bespoke version of the BRABUS Ride Control coilover suspension specifically for the high chassis. At the touch of a button in the cockpit, the driver can change the damping settings using the standard DYNAMIC SELECT suspension adjustment function of the current Mercedes G-Class. In addition, the ride height of the titanium-coated BRABUS aluminum suspension can also be adjusted.

The visual identifying feature of the BRABUS chassis are the new BRABUS Monoblock Z HD wheels which have been adapted to the portal axles with an eight-hole bolt pattern. These alloys are designed for maximum strength and in size 9.5Jx22 with Pirelli Scorpion ATR off-road tires in size 325/55 R 22 perfectly fill the space under the exposed carbon fender flares. The wheels of the first vehicle of this limited edition were painted in “Gunmetal Black” and adorned with thin red stripes.

The name of this exceptional supercar says it all: The BRABUS 900 XLP “ONE OUT OF TEN” is powered by the currently most powerful engine in the vast engine range of the Bottrop dream factory. The engine is not only a treat in terms of technology, but also in terms of appearance, as the opening of the bonnet reveals with its characteristic bonnet: the BRABUS bonnet in red carbon sits on an eight-cylinder, four-valve engine , twin-turbo that has been upgraded with some high-performance components.

To reach the targeted 900 horsepower, the engine block was first revised. For the BRABUS 900 ROCKET V8 biturbo specification, displacement increased from 3,982 cc to 4,407 cc (243 to 269 cu in). For this purpose, the BRABUS engine workshop increases the cylinder bore to 84 millimeters (3.3 inches) and installs forged pistons of appropriate size. A precision-balanced billet-aluminum crankshaft with a 100-millimeter (3.9) longer stroke and correspondingly longer connecting rods completes the surgery on the mechanical inner workings of the V8.

In order to supply the high-performance engine with sufficient fuel and air, the BRABUS powertrain engineers have developed special high-pressure pumps with increased flow and a modified air filter system.

The forced induction system was also improved: the two production turbos had to make way for two BRABUS high-performance turbochargers with a larger compressor unit and a reinforced axial bearing. They produce a maximum boost pressure of 1.4 bar. In addition, BRABUS offers an acoustic treat in the form of BRABUS Boost Xtra, two special components for the two engine bypass valves. They produce a clearly audible nose blow when the driver lifts the gas, reminiscent of turbocharged racing engines.

The BRABUS high-performance exhaust system was tailor-made for the longer wheelbase of the pickup. In addition: the system also includes high-performance metal catalysts that reduce exhaust backpressure, special gasoline particulate filters and the two left and right rear silencers, whose chrome tailpipes exit through pairs under the running boards in front of the rear wheels on each side of the vehicle. Actively controlled integrated butterfly valves in the exhaust provide active sound management from the driver’s seat. In the open position, the top-of-the-range BRABUS engine produces a sporty, throaty eight-cylinder sound. The closed position generates a subtle “Coming Home” exhaust note.

All BRABUS high-performance hardware has been calibrated in extensive tests on dynamic and stationary test rigs and in extensive road tests to perfectly match the engine, nine-speed transmission and all-wheel-drive system. This results in new maps for injection, boost pressure control and ignition.

the BRABUS 900 ROCKET V8 biturbo The increased displacement engine ushers in a new dimension of performance for road-legal pickup trucks. The twin-turbocharged eight-cylinder produces its peak power of 662 kW / 900 PS (888 hp) at a low 6,200 rpm. The equally remarkable peak torque of 1,250 Nm (922 lb-ft) is already available at 2,900 rpm. It is electronically limited in the car to 1,050 Nm (774 lb-ft) to protect the transmission. The nine-speed automatic transmission can also be changed manually with the ergonomic BRABUS RACE carbon shift paddles on the steering wheel.

Driving performance is equally outstanding and mirrors the engine performance data. From rest, the all-terrain-capable supercar soars to 100 km/h (62 mph) in just 4.4 seconds. Due to the off-road tires, the top speed is electronically limited to 210 km/h (130 mph).

The driver and passengers of the BRABUS 900 XLP “ONE OUT OF TEN” experience this superiority in a cockpit that offers luxury and individuality in their purest form. The company’s upholstery workshop will create a tailor-made BRABUS MASTERPIECE interior for each vehicle, which will be designed according to the personal wishes of the vehicle owner down to the smallest detail. To facilitate entry and exit, the rear doors are modified to open at an angle of up to 90 degrees. Rear passengers are kept informed of destination, outside temperature and speed by three gauges, which have been stylishly integrated into the headliner using a custom console.

The vehicle shown in the photos has been upholstered in the finest ‘Mondial Black’ leather to contrast with the special gray paint finish. The leather is adorned with ‘Jet Black’ piping and also black stitching. The center sections of the seats and parts of the door panels feature shell-like quilting and perforations applied with pinpoint precision. The plastic parts inside have been enhanced with matte “ROCKET Red” glazing for contrast.

The exclusive designer cockpit also includes a clock, designed by luxury watchmaker Panerai to echo its famous LUMINOR chronograph. A full carbon package and bespoke aluminum components such as pedals and door lock pins add decidedly sporty touches to the cockpit. The BRABUS speedometer of 300 km/h (186 mph) reflects the enormous performance potential of this premium pickup.

Recall announced for Skittles, Starburst and Life Savers gummies


Food News

There may be thin strips of metal in the candies or in the bags.

Mars Wrigley has recalled Starburst, Life Savers and Skittles gummies. March Wrigley

Mars Wrigley Confectionery on Friday announced a voluntary recall of certain flavors of Skittles, Starburst and Life Savers gummies due to the possibility of thin metallic strands embedded in the gummies or loose in the bag.

The recall announcement says customers have alerted the company to the issue, but no illnesses have been reported so far.

Mars Wrigley said the products were manufactured by a third party and distributed in the United States, Canada and Mexico. Affected products can be identified by the manufacturing code on the back of the packaging.

Mars Wrigley said it will work with stores to remove the recalled products from shelves. If consumers believe they have purchased a recalled item, they should discard the product and not consume it.

Consumers with questions can contact the company by calling 1-800-651-2564.

Here is a list of recalled items:

Article number The description UPC Code (first 3 digits)
10188298 STARBURST® Gummies Original Share Size 3.5 oz 10022000253092 136, 139, 140
STARBURST® Gummies Original Peg Pack 5.8 oz 10022000253818
10188301 STARBURST® Gummies Sours 3.5 oz serving size 10022000253122 134,135, 137-142
STARBURST® Gummies Sour Peg Pack 5.8oz 10022000253801
134,135, 137-142
10220865 STARBURST® Gummies Sour Berries Peg Pack 5.8oz 00022000284624 135, 138, 139
LIFE SAVERS® Gummies 5-Pack Flavor Tongs 7.0 oz, 3.22 oz 10022000285277
136, 139
LIFE SAVERS® Wild Berries Gummies Peg Pack 7.0oz 10019000083446
136-138, 140, 147, 149-152
LIFE SAVERS® Sour Gummies Peg Pack 7.0oz, 180g 10022000242058
132-134, 139-140, 144-147, 149, 151, 152, 201
SKITTLES® Gummies Original Peg Pack 5.8oz, 2.93oz 10022000285956
139 – 218
SKITTLES® Gummies Original Stand Up Pouch 12oz 10022000287325
139 – 218
SKITTLES® Wild Berry Gummies Peg Pack 5.8oz, 2.93oz 10022000285970
138 – 218
SKITTLES® Gummies Wild Berry Stand Up Pouch 12 oz 10022000287349
138 – 218
SKITTLES® Sour Gummies Peg Pack 5.8oz 10022000289749
204 – 218

| Cerro Pelado Fire Daily Update Sunday, May 15, 2022NM Fire Info



The current size: 45,602 acres

Current lockdown: 40%

Start date: April 22, 2022

Reason: unknown

Total workforce: 1,078

PUBLIC MEETING ANNOUNCEMENT: Monday, May 16, 2022, located at Los Alamos High School at 5:30 p.m.

WEATHER AND FIRE BEHAVIOR: Firefighters expect moderate winds influenced by the terrain and near record heat today. Midday high temperatures at higher elevations on the fire could climb again to around 80°F, and there will be a very high probability of ignition caused by single-digit relative humidity values ​​and combustibles. extremely dry. A cold front moving over the fire area late this evening will bring a change in weather. Relative humidity will climb to around 45% tonight. Winds are forecast to shift from the southwest and increase slightly as gusty southwesterly winds and a few clouds are expected over the fire area tomorrow. Significant fire growth is unlikely again today, and general conditions for firefighting efforts are favourable.

FIRE OPERATIONS: A drone incursion over the blaze yesterday prompted an airstrike to order a complete halt to all flight operations for the safety of aviation and ground crews. The shutdown was critical, significantly slowing the progress of ongoing work to reduce risk around the communications tower on Los Griegos Mountain in the northwest perimeter. The use of drones is prohibited by the Temporary Flight Restrictions (TFR). As containment increases on the Cerro Pelado Fire, fire managers have begun releasing equipment and crews to assist with fire suppression efforts in other priority areas in the region. The red lines on the perimeter of the fire map indicating the active line of fire are replaced with black for the contained line. As containment increases, crews prepare to repair suppression and remove equipment in these areas. Suppression efforts continue in active fire areas. Inland fire activity remains a threat in the Peralta Ridge and Paliza Canyon areas. Today, helicopters and the two scooper aircraft will continue to support ground crews, providing eyes in the sky and shuttling loads of water to cool hot spots and reinforce containment lines. When safe, crews attempt to use direct fireside tactics. Engine crews continue to patrol structures near burned areas, and fuel reduction continues along Highway 4. Fire activity is quiet on the eastern and southern flanks of the fire. Firefighters continue to upgrade and reinforce containment lines on the east side of Spruce Canyon. The containment line on the old Dome Lookout Road, Forest Road (FR) 287, directs the fire away from Frijoles Canyon to the east. Hand and engine crews are in the area today, patrolling and monitoring the containment lines, and working inland from the edge of the fire. In the Cochiti Mesa area, crews are patrolling where fire hangs in rocky areas. Hand crews march into the far edge of the fire on the south side of the fire, patrolling and directly engaging the fire in Peralta Canyon, north of Cochiti Pueblo. On the west side of the fire, crews continue to secure and reinforce containment lines along FR 266, working further inland from the edge of the fire. Firefighters are transporting equipment and chipping away piles of brush along FR 266 and in areas of Cochiti Mesa.


  • Highway 4 closed from kilometer marker 34 to kilometer marker 50: https://bit.ly/NM-Roads
  • The Santa Fe National Forest has closed the Cerro Pelado Fire Area (Closing Order) and Fire Base Camp along Forest Route 376 (Closing Order).
  • Bandelier National Monument and Valles Caldera National Reserve remain closed.

Great Basin IMT 1 continues to communicate with tribal representatives, community leaders, private cooperators, and Los Alamos National Laboratory personnel to coordinate firefighting resources, protect structures, and ensure member safety. from the community.

Air quality: Air quality information can be found at the New Mexico Department of Health Environmental Public Health Tracker: https://nmtracking.org/fire and an interactive smoke map is available on https://fire.airnow.gov/.

Fire Restrictions Level II fire restrictions are in effect for the Santa Fe National Forest, which prohibits all campfires and other hazardous activities. Due to ongoing fire threats, Sandoval County will not be issuing burn permits. Level III fire restrictions are in effect for Cochiti Pueblo.

Temporary Flight Restriction (TFR). There is a flight restriction above the fire area and drones are also prohibited. https://bit.ly/Flight-Restrictions

Information phone lines: 505-312-4593 and 303-918-4004
Email: [email protected]
InciWeb: https://inciweb.nwcg.gov/incident/8075/
Facebook: https://facebook.com/2022.Cerropeladofire
Twitter: https://twitter.com/SantafeNF

# # #

China criticizes planned US economic framework as Biden welcomes Southeast Asian leaders – Eurasia Review


Beijing has criticized the Indo-Pacific Economic Framework (IPEF) proposed by the United States, calling it Washington’s attempt to induce Southeast Asian countries to “decouple from China”.

US President Joe Biden hosted a special two-day summit with leaders of the Association of Southeast Asian Nations (ASEAN) which ends on Friday. At the summit, the United States is expected to share more details on the framework, which is expected to be officially launched later this month when Biden visits South Korea and Japan.

This is not a free trade pact in the mold of the Trans-Pacific Partnership that the Obama administration has championed and negotiated for years as part of its foreign policy “pivot” to Asia, only to see the Trump administration abandon it. An iteration of the same agreement was later adopted by other Pacific nations.

But IPEF seeks to foster ties with Indo-Pacific economic partners by establishing trade rules and building a supply chain, without China.

In President Biden’s words at the East Asia Summit last year, IPEF involves “trade facilitation, standards for the digital economy and technology, resilience of the supply, decarbonization and clean energy, infrastructure, labor standards and other areas of common interest. ”

On Thursday, Beijing warned Washington that the Asia-Pacific is “not a chessboard for geopolitical competition” and that any framework for regional cooperation should “follow the principle of respect for the sovereignty of others and non-interference in the internal affairs of others”.

Chinese Foreign Ministry spokesman Zhao Lijian said China rejects the “Cold War mentality” when it comes to regional groupings.

The People’s Daily, the mouthpiece of the Communist Party of China, said in an editorial that the IPEF is designed to “compensate for the shortcomings of Washington’s previous engagement with Southeast Asia, which focused only on safety and ignored economics”.

“The United States has deep political and strategic goals aimed at forcing countries to decouple from China,” some analysts quoted by the newspaper said.

The rally in Washington is the second special U.S.-ASEAN summit since 2016, when then-President Barack Obama hosted the bloc’s leaders in Sunnylands, California.

ASEAN leaders minus Myanmar and the Philippines attended a White House dinner with Biden on Thursday and met with a host of US political and business leaders, but had no bilateral meetings with the US president. . The leaders were meeting with Biden and Vice President Kamala Harris on Friday at the State Department.

There are 10 ASEAN member states, but the Burmese junta was not invited to the summit and the Philippines, which held a presidential election last weekend, only sent its foreign minister.

ASEAN caution

Singapore Prime Minister Lee Hsien Loong was the first ASEAN leader to host IPEF.

Speaking during an engagement with the US-ASEAN Business Council and the American Chamber of Commerce on Thursday, Lee said IPEF “must be inclusive and provide tangible benefits to encourage broader participation”.

“We encourage greater ASEAN participation in IPEF and hope that the United States will directly invite and engage ASEAN member states in this endeavor,” he said.

At present, it is understood that only two of the 10 ASEAN countries – Singapore and the Philippines – are expected to be part of the initial group of countries to sign up for negotiations under the IPEF.

“Most ASEAN members have remained hesitant to voice support for Biden’s IPEF, which they say is a counterweight to China’s Belt and Road Initiative in particular and economic coercion. of Beijing in general,” said Huynh Tam Sang, a senior lecturer in Ho Chi Minh City. City University of Social Sciences and Humanities (USSH) in Vietnam.

“Given the economic proximity to China, ASEAN member states have sought to avoid provoking Beijing, let alone getting involved in Sino-US competition,” Sang said.

Yet, judging by prepared statements and initial reactions from ASEAN leaders on the prospects for ASEAN-US economic cooperation and IPEF, “they not only appreciate the substance of the relationship, but are eager to see it grow,” said Thomas Daniel, a senior fellow at the Malaysian Institute for Strategic and International Studies.

“Unfortunately, Washington is still unable to fully grasp or respond to Southeast Asia’s desire for practical dimensions that will bring immediate and tangible benefit to local economies and communities,” he said. he declared.

On Thursday, Malaysian Prime Minister Ismail Sabri Yaakob urged the United States to adopt a more active trade and investment agenda with ASEAN countries. He pointed to the China-backed Regional Comprehensive Economic Partnership, which entered into force this year, as an important tool to boost regional trade and economic activities through the reduction of trade barriers.

Seeking to deliver tangible benefits at the summit, Biden offered $150 million for infrastructure, security, pandemic preparedness and other ASEAN efforts.

More division in the block?

Details of the IPEF remain vague, but policymakers in Washington said they are designing a framework to prioritize flexibility and inclusion, with a choice arrangement for participating countries, allowing them to select individual areas in which they want to make more specific commitments.

The IPEF seeks to foster economic cooperation by establishing trade rules on “four pillars”: trade resilience, infrastructure, decarbonization and the fight against corruption.

An analysis by the Washington-based Center for Strategic and International Studies (CSIS) said that even if the IPEF delivers on its promises, “it will need to be well designed and managed”.

“To the extent possible, the framework should seek to advance binding rules and firm commitments that go beyond broad principles and objectives,” the SCRS said.

At the same time, “the Biden administration will need to deliver tangible benefits to regional partners, especially the less developed ones,” according to the analysis.

There are warnings that the proposed framework, if not carefully considered, could even create a greater gap between countries in the Southeast Asian region.

“Small and medium powers in Southeast Asia are likely to take a cautious approach to initiatives proposed by major powers, especially when such multilateral frameworks could undermine ASEAN’s centrality,” USSH’s Sang said. from Vietnam.

Countries like Singapore, the Philippines and Malaysia may seek to join certain “pillars” that may serve their pragmatic interests, but “China may seek to discourage smaller regional states from forging ties with Washington by participating in IPEF” .

Sang said this could pose a particular dilemma for Laos and Cambodia, which may not want to be left behind but have deep and growing economic ties with China.

6 injured after small plane crash lands on Miami bridge and catches fire – NBC 6 South Florida


At least six people were injured when a small plane crash landed on a bridge in Miami on Saturday afternoon, hitting at least one car and bursting into flames.

The plane crashed shortly before 1 p.m. on the Haulover Inlet Bridge near the 10800 block of Collins Avenue. Smoke from the wreckage of the plane was visible for miles around.

At least one vehicle was hit by the plane during its crash, according to Miami-Dade Fire Rescue.

Crews responded and found the plane on fire and quickly extinguished the flames, officials said.

At least six people were hospitalized when a small plane caught fire after crashing into a bridge in Miami on Saturday afternoon

Fire officials said there were six people injured, including two who were taken to a local hospital as trauma alerts. One of them was transported by plane and the other was washed away on the ground.

Three other patients suffered non-life-threatening injuries. The condition of the sixth patient was unknown.

Footage from the scene showed the wreckage of the plane in the middle of the roadway. The vehicle involved, a dark red or maroon SUV, could be seen with severe front end damage.


This SUV was damaged when a small plane crashed into a bridge in Miami on May 14, 2022.

The Haulover Inlet Bridge on Collins Avenue has been closed between Sunny Isles Beach and Bal Harbor, authorities say. Southbound Collins Avenue is closed at 158 ​​Street.

Traffic was being diverted and drivers were advised to seek an alternate route and expect major delays.

This is a developing story. Check back for updates.

Officials urge common sense as fire season hits early in Color Country – St George News


ST. GEORGE- Due to extremely dry conditions, the 2022 Color Country fire season is kicking off early in southern Utah. Authorities are urging the public to help contain the fires.

Representatives from Dixie National Forest, Bureau of Land Management of the Arizona Strip District, Zion National Park, Bureau of Land Management Color Country District, Utah Division of Forestry, Fire and Stand Lands, and Color Country Fire Mitigation discuss the region’s fire season outlook for 2022, Zion National Park, Utah, May 11, 2022 | Photo courtesy of Zion National Park, St. George News

Color Country area firefighters gathered in Zion National Park on Wednesday to ask the public to help contain potential fires. Color Country includes all unincorporated counties, states and federally administered public lands in Washington, Kane, Garfield, Iron and Beaver counties and the Strip of Arizona.

There has been little to no rain for the past 90 days in southern Utah and the Arizona strip. Ty Mizer, Bureau of Land Management, Arizona Band Fire Management Officer, said the dry conditions combined with little to no snow accumulation in the mountains are impacting the region’s dryness.

“It affects our fire behavior there,” Mizer said. “Any drought relief that we saw last fall has basically been wiped out. We are going to see higher fire intensities and more resistance to controlling some of the wildfires.”

This winter’s lack of snow also points to a fire season in which fires will occur at higher elevations, Mizer said. High altitude fires in the woods could last a little longer than typical fires. He said this would result in longer exposure times for firefighters on the ground and in the air.

This August 2021 file photo shows smoke from an active wildfire atop Pine Valley Mountain that was visible from Oak Grove Campground, Pine Valley, Utah, August 29, 2021 | Photo courtesy of Doris McNally, St. George News

Greg Bartin, fire management manager for Zion National Park and the Utah Parks Group agreed.

“In Utah, we typically have fire restrictions between late May and June,” Bartin said. “And with dry conditions as they are right now, we expect fire restrictions to arrive in three to four weeks.”

When visiting parks and public lands, Bartin said firefighters notice where visitors build campfires. For example, in Zion National Park, the campfire must be inside a ring of fire in a campground. If you’re recreating in an area that allows campfires outside of a ring of fire, he advises against making fires near dry leaves or brush.

“We ask you to follow fire sage tips, that is, when you completely extinguish your campfire. Don’t just leave it, but leave it cold, wet and choppy,” Bartin said. “It’s a great way to not cause an unwanted wildfire in a place where we want to go camping.”

When visiting Zion National Park, if one is not in a designated campground, fires are completely prohibited. Visitors can use camping stoves to cook their meals if they are outside a campground.

“In the Zion’s Wilderness on the plateaus, campfires are completely prohibited,” Bartin said. “We are asking people whose camping stoves are in these locations to cook their meals.”

Some of the park partners, federal land managers for the Forest Service, BLM, and the State of Utah allow campfires and other places that the National Park Service does not allow. The season came early and all groups went into fire restrictions depending on the conditions.

Bartin advises campers and outdoor enthusiasts to use sense of fire. Avoid areas of dry grass where it is windy when starting a fire. Also, avoid anything that could start a forest fire.

“The sense of fire is common sense. The trick is just to use it. You already know that heat or sparks plus dry grass equals a lot of trouble, so next time you’re camping or shooting or enjoying the great outdoors in our great condition, use your brain before things get too hot. to manage,” the website reads.

The four stages of Fire Sense include:

  1. Sliding the chains causes pain: Secure the trailer chains to make sure they don’t drag and cause a fire.
  2. Hot car, dry grass, bad ash: Do not park a hot car or recreational vehicle in dry grass.
  3. Stop the sparks in your tracks: Tractors, all-terrain vehicles and other equipment must be equipped with spark arresters.
  4. Tip-Top tire shape: KKeep trailers and RVs properly maintained, including tire pressure.

Southern Utah is one of the busiest fire zones in history during the summer months. Thus, all public and federal agencies share resources.

“Typically, on average, we pump between 1 million and 1.5 million gallons of fire retardant, and we have plenty of resources,” said Dixie National Forest Service engine captain Skeet Houston. “We have a lot of fires, generally on average, a 10 year average Color Country breakdown starts about 350 fires a year.”

Houston said it was one of the worst fire-affected areas in the country. Twenty-seven fire truck engines range from Type 3 to Type 6, and the five cooperating agencies share additional municipal fire engines.

“They are essential to our needs,” Houston said. “Often they are the closest response and first response with fires breaking out in or near communities, so we use them a lot. We really appreciate their help.

Another fire management resource is manual crew; the Forest Service has a Cedar City Hotshot team of 25 people. They are also a national resource. They are based in southern Utah, but are often elsewhere to help others fight fires.

Houston said that in this region, agencies also regularly share two fire bulldozers and two tank trucks. They also have planes and an air attack platform, a plane that flies and keeps its eyes on the forest. The aircraft recommends aerial resources and helps firefighters on the ground know where things are, like a second set of eyes, as they attack fires.

Additionally, two single-engine air tankers are smaller retarding aircraft that are helping to deal with Houston’s forecasted wildfires, which are expected this year. He said a Type 3 three helicopter with a 10-person attack crew from St. George with the Arizona Strip and two more of the larger Type 1 helicopters are available.

One of the large Type 1 helicopters is under contract with the Forest Service and is currently in the Southwest helping with the fires. Houston said the State of Utah plans to have a Type 1 helicopter in Utah soon. Oversized air tankers are a national resource and may be requested by local agencies to assist. Still, these federal helicopters could be linked to other national fires.

Keeley Yardley, communications coordinator for the Utah State Division of Wildfires and Lands, said all agencies rely heavily on interagency work.

“It’s a super important piece; we would not be able to fight wildfires in the state of Utah as successfully without interagency work,” Yardley said. “So it’s a great collaboration.”

Copyright St.George News, SaintGeorgeUtah.com LLC, 2022, all rights reserved.

Conducting nighttime activities within the law: Hyderabad Police


Hyderabad: Managers of various pubs, bars and drive-through restaurants have been urged to control noise pollution and conduct their business within the law, Hyderabad Police Commissioner CV Anand said.

Acting on complaints and concerns from the public and residents, CP called a meeting to address the nightlife industry. During the meeting, the PC addressed the issues and set out guidelines under the Municipal Police Act for smoother operations.

He pointed to issues such as noise pollution, traffic jams and public nuisance, and urged them to adhere to rules regarding timings, parking and sound.

He reminded the participants of the prevailing standards set out in the city’s police law and advised them to conduct their activities within the framework of the laws.

He also clarified that establishments should not be open beyond 12 noon on weekdays, while an additional hour is granted on weekends with a half-hour grace period to complete the accounts for the day.
“Customers can be politely notified by dimming the lights 10 minutes before closing time, a common practice in developed countries,” he said.

He then reiterated the state government’s strong stance against drug abuse in the city, and that a few cases of lawlessness could cost the state dearly in terms of foreign investment.

“Thanks to the efforts of the state government, Hyderabad has become the preferred destination for investors. The city fulfills all the parameters of foreign investors and other parts of India such as excellent law and order, female safety, ease of doing business, faster clearances and good nightlife,” CV Anand said.

He called on pub, bar and drive-in owners to reduce inconvenience to residents and run businesses responsibly. He urged them to defend the reputation of the city and the state which is compromised by the few who violate standards for small gains.

The following guidelines must be strictly enforced by all venues serving alcohol in accordance with CP:

  • Minors should not be allowed inside.
  • Limit sound levels so as not to exceed the authorized decibel unit
  • Install CCTVs with 30 days backup and ensure a dedicated team monitors it
  • Soundproofing of premises
  • Commitment of valets
  • Search staff and customers for suspicious activity

Meanwhile, CP said the spirit of granting 24-hour alcohol service to four-star and above hotels is for its international travelers or delegates, but not for the general public. audience.

“Adhering to the state government’s focus on the ease of doing business, we will soon be offering an online option on our website through which you can apply for renewals and other licenses and there will be minimal interaction and no harassment by the police,” assured the CP.

“Let Hyderabad be known as the safest city in the world and not a place where drugs are also readily available and let’s work together,” he concluded.

User-created low-code apps to dominate analytics, says Gartner • The Register


By 2025, half of analytics will be developed by business users through a low-code or no-code modular assembly experience, according to Gartner.

Outlining his view on data and analytics trends, the global analyst said the future will put business users, rather than IT or data engineering, in the driver’s seat, at least in terms of apps.

Augmented capabilities…can be proactive in making sure they’re unbiased and focusing heavily on that idea of ​​data diversity

Carlie Idoine, veep and analyst, told the Gartner Data & Analytics Summit in London that the analysis would be based on “automated data stories” created by professional users.

“How can we start a story? composed of data and analytics,” she said.

Idoine said it would be “corporate technologists” who would drive adoption of the approach within organizations.

“It’s what we’ve always called the citizen. It’s the people in the business who use data and analytics to make business decisions,” she said.

These business people would expect to have access to contextual data outside of business numbers. “Think of video documents, think [web]logs: all that data that comes together to give us more context for the analysis we want to do. Contextual analysis is the direction we will take beyond the traditional approach. How can we leverage more data and not just more data, but different types of data?”

Meanwhile, technical and data engineering teams will need to build data pipelines for AI — which Gartner predicts to be ubiquitous — with data that protects against bias and represents diversity in society.

According to Gartner, organizations that don’t have a sustainable plan to “operationalize” how they manage data and analytics by 2024 face a two-year setback in their efforts.

Ted Friedman, distinguished veep and analyst at Gartner, said, “Without the right data and the right data capabilities under AI systems, AI systems are likely to be flawed, even dangerous. And we’ve observed that many organizations are in the wrong place in terms of the data management capabilities required to support the deployment of AI. »

He said preparing data management for AI wouldn’t mean companies would have to throw away their existing data management systems. “You have things like data integration capabilities, data quality assurance, and data governance capabilities: they’re still very much needed.

“But now we need to expand data management and bring in new thinking in terms of synthetic data, augmented capabilities that can be proactive to make sure it’s not biased and focus strongly on this idea of ​​data diversity. .”

Friedman said Gartner’s view of the data and analysis comes against the backdrop of global economic, geopolitical, social and medical uncertainties.

“This chaos and uncertainty that shapes the backdrop against which we stage our major trends,” he said.

Whether or not IT departments agree with Gartner’s views is a moot point. But they might want to be aware of that the next time they talk to the leadership team, who just might have a hotline with the global tech diviner. ®

Automotive Gasoline Engine Market Size and Forecast


New Jersey, United States – Comprehensive analyzes of the fastest growing companies automotive gasoline engine market provide information that helps stakeholders identify opportunities and challenges. The 2022 markets could be another big year for automotive gasoline engines. This report provides an overview of the company’s activities and financial situation (a company profile is required if you want to raise capital or attract investors), recent developments (mergers and acquisitions) and recent SWOT analyses. This report focuses on the automotive gasoline engine market over the assessment period 2029. The report also provides an analysis of the automotive gasoline engine market growth which includes Porter’s five-factor analysis and l supply chain analysis.

It describes the behavior of the industry. It also outlines a future direction that will help companies and other stakeholders make informed decisions that will ensure strong returns for years to come. The report provides a practical overview of the global market and its changing environment to help readers make informed decisions about market projects. This report focuses on growth opportunities that allow the market to expand its operations in existing markets.

For more information or query or customization before buying, visit @ https://www.verifiedmarketreports.com/product/global-automative-gasoline-engine-market-report-2019-competitive-landscape-trends-and-opportunities/

(Use company email id to get higher priority)

The report helps both major players and new entrants to analyze the market in depth. This helps key players determine their business strategy and set goals. The report provides key market insights including niche growth opportunities along with market size, growth rate and forecast in key regions and countries.

The Automotive Gasoline Engine report contains data based on rigorous studies in primary and secondary schools using the best research practices. The report contains comprehensive information which will enable you to evaluate each segment of the Automotive Gasoline Engine market. This report has been prepared considering various aspects of market research and analysis. It includes market size estimates, market dynamics, and company and market best practices. Entry marketing strategy, positioning, segmentation, competitive landscape and economic forecasts. Industry-specific technology solutions, roadmap analysis, alignment to key buying criteria, in-depth vendor product benchmarking

Key Players Mentioned in the Automotive Gasoline Engines Market Research Report:

GE, Cummins, Quantum, Nissan, General Motors, Toyota, Achates Power, LIM, Honda, Camcraft, Paice, Tour, PMC, PurePOWER, Fiat Chrysler

Automotive Gasoline Engine Market Segmentation:

By Product Type, the market is primarily split into:

• Type I
• Type II
• Type III
• Type IV

By application, this report covers the following segments:

• Request I
• Application II
• Application III
• Application IV

Get Sample Full PDF Copy of Report: (Including Full TOC, List of Tables & Figures, Chart) @ https://www.verifiedmarketreports.com/download-sample/?rid=125390

Scope of the Automotive Gasoline Engines Market Report

UNITY Value (million USD/billion)
SECTORS COVERED Types, applications, end users, and more.
REPORT COVER Revenue Forecast, Business Ranking, Competitive Landscape, Growth Factors and Trends
BY REGION North America, Europe, Asia-Pacific, Latin America, Middle East and Africa
CUSTOMIZATION SCOPE Free report customization (equivalent to up to 4 analyst business days) with purchase. Added or changed country, region and segment scope.

Geographic segment covered in the report:

The Automotive Gasoline Engine report provides information on the market area, which is sub-divided into sub-regions and countries/regions. In addition to the market share in each country and sub-region, this chapter of this report also contains information on profit opportunities. This chapter of the report mentions the market share and growth rate of each region, country and sub-region over the estimated period.

• North America (USA and Canada)
• Europe (UK, Germany, France and rest of Europe)
• Asia-Pacific (China, Japan, India and the rest of the Asia-Pacific region)
• Latin America (Brazil, Mexico and rest of Latin America)
• Middle East and Africa (GCC and Rest of Middle East and Africa)

Key questions answered in this Automotive Gasoline Engine Market report

  1. How much revenue will the Automotive Gasoline Engine Market generate by the end of the forecast period?
  2. Which market segment is expected to have the maximum market share?
  3. What are the influencing factors and their impact on the automotive gasoline engine market?
  4. Which regions are currently contributing the maximum share of the global automotive gasoline engine market?
  5. Which indicators are likely to drive the automotive gasoline engine market?
  6. What are the key strategies of the major Automotive Gasoline Engine market players to expand their geographical presence?
  7. What are the key advancements of the Automotive Gasoline Engine market?
  8. How are regulatory standards affecting the automotive gasoline engine market?

Get a discount on the purchase of this report @ https://www.verifiedmarketreports.com/ask-for-discount/?rid=125390

Visualize Automotive Gasoline Engines Market Using Verified Market Intelligence:-

Verified Market Intelligence is our BI platform for market narrative storytelling. VMI offers in-depth forecast trends and accurate insights on over 20,000 emerging and niche markets, helping you make critical revenue-impacting decisions for a bright future.

VMI provides a global overview and competitive landscape with respect to region, country and segment, as well as key players in your market. Present your market report and results with built-in presentation functionality that saves you over 70% of your time and resources for presentations to investors, sales and marketing, R&D, and product development. VMI enables data delivery in Excel and interactive PDF formats with over 15+ key market indicators for your market.

Visualize the automotive gasoline engine market using [email protected] https://www.verifiedmarketresearch.com/vmintelligence/

Most Popular Reports

Global Natural Gas Commercial Vehicle Automotive Market Size and Forecast

Global Automotive Gasoline Engine Market Size and Forecast

Global Anti-lock Braking Equipment Market Size and Forecast

Global Smart Parking Market Size and Forecast

Global Automotive Wheels Market Size and Forecast

Global Automotive Engine Rotors Market Size and Forecast

Global Automotive Smart Seating Systems Market Size and Forecast

Global Automotive Paints Market Size and Forecast

Global Automotive Appearance Chemicals Market Size and Forecast

Global Automotive Steering Rods Market Size and Forecast

About Us: Verified Market Reports

Verified Market Reports is a leading global research and advisory company serving over 5000 global clients. We provide advanced analytical research solutions while delivering information-enriched research studies.

We also provide insight into the strategic and growth analytics and data needed to achieve business goals and critical revenue decisions.

Our 250 analysts and SMEs offer a high level of expertise in data collection and governance using industry techniques to collect and analyze data on over 25,000 high impact and niche markets. Our analysts are trained to combine modern data collection techniques, superior research methodology, expertise and years of collective experience to produce informative and accurate research.

Our research spans a multitude of industries, including energy, technology, manufacturing and construction, chemicals and materials, food and beverage, and more. Having served many Fortune 2000 organizations, we bring a wealth of reliable experience that covers all kinds of research needs.

Contact us:

Mr. Edwyne Fernandes

USA: +1 (650)-781-4080
UK: +44 (753)-715-0008
APAC: +61 (488)-85-9400
US toll free: +1 (800)-782-1768

E-mail: [email protected]

Website: – https://www.verifiedmarketreports.com/

Asian stocks rise slightly from near two-year lows ahead of US inflation data


A currency trader works in a trading room of a bank in Seoul, South Korea August 25, 2015. REUTERS/Kim Hong-Ji

Join now for FREE unlimited access to Reuters.com


HONG KONG, May 11 (Reuters) – Asian stocks edged higher on Wednesday after hitting near two-year lows in the previous session and the dollar held steady, ahead of much-anticipated U.S. inflation data that will offer a guide to the aggressiveness of the United States. The Fed will raise rates.

MSCI’s broadest Asia-Pacific ex-Japan equity index (.MIAPJ0000PUS) rose 0.45%, trading slightly above its lowest level since July 2020 touched the previous day. The Japanese Nikkei (.N225) gained 0.3%.

China’s blue chips (.CSI300) led the gains, rising 1.5% after producer prices in the world’s second-largest economy rose at the slowest pace in a year in April, giving way to more stimulus to shore up an economy facing pressure from COVID-19 restrictions. Read more

Join now for FREE unlimited access to Reuters.com


Strict restrictions to fight the coronavirus have weighed on the Chinese economy. As of Tuesday, 41 Chinese cities were currently implementing full or partial lockdowns or some sort of district-based control measures, according to Nomura analysts’ estimates.

They estimated that about 289.8 million people are currently affected by these lockdown measures in regions that account for about 33.8 trillion yuan ($5.02 trillion) of China’s total GDP, down slightly. compared to last week’s 327.9 million and 35.4 trillion yuan.

But the main event scheduled for the day is US inflation data, due at 12:30 GMT, which will indicate whether the US Federal Reserve will raise rates even more aggressively to fight inflation.

Last week, the Fed raised its overnight interbank lending target by half a percentage point, and Chairman Jerome Powell said two more such rate hikes are likely in upcoming policy meetings. the US central bank.

There has also been speculation in the markets that the Fed will have to make a massive 75 basis point hike at a meeting.

This pushed up US Treasury yields and supported the dollar.

“A positive surprise (in the CPI data) will encourage markets to raise prices for a 75 bp fund rate hike later in the year and support the dollar, while a negative surprise will keep prices up. for 50 basis point increases in June and July untouched and will leave the dollar stable,” the ABC analysts said in a note.

Analysts anticipate the US consumer price index

They also predict an 8.1% annual increase, 0.4 percentage points lower than the previous 8.5%, which was the warmest reading since December 1981.

The dollar index, which measures the greenback against six major peers, held steady at 103.86, not far from the high of 104.49 hit earlier this week for the first time since December 2002.

Wall Street was mixed overnight. The Nasdaq (.IXIC) rose 0.98% and the S&P 500 (.SPX) gained 0.25% but the Dow Jones Industrial Average (.DJI) fell 0.26%.

US Treasuries were also calm ahead of the data. The yield on the benchmark 10-year note was flat at 2.9869%, after falling overnight from a three-year high.

Early in the curve, the US two-year yield, which often mirrors the Fed’s rate outlook, was little changed at 2.68%.

Bitcoin was trading around $31,400 after recording a small rally after falling below $30,000 on Tuesday for the first time since July 2021.

Oil rebounded from the previous day’s declines.

U.S. crude rose 1% to $100.03 a barrel, after falling below $100 on Tuesday for the first time this month. Brent rose 1.1% to $103.58.

Spot gold fell 0.1% to $1,836.6 an ounce.

($1 = 6.7338 yuan)

Join now for FREE unlimited access to Reuters.com


Reporting by Alun John; Editing by Muralikumar Anantharaman

Our standards: The Thomson Reuters Trust Principles.

Danny Jenkins, CEO of ThreatLocker


Cybercriminals have evolved from schoolyard bullies to organized gangs that have created sophisticated businesses with sales departments, support organizations and sales quotas that turn popular software products into weapons of mass destruction, said ThreatLocker co-founder and CEO Danny Jenkins.

“Today we don’t fight back against schoolyard bullies,” Jenkins said during a keynote session at CRN parent The Channel Company’s Best of Breed virtual conference on Tuesday. “We don’t defend ourselves against enthusiasts who just want to write malware for fun. We try to defend ourselves against organized gangs… We fight sophisticated companies.

The new class of highly structured cybercriminal organizations are well-coordinated businesses with sales departments, sales quotas and help desks that measure everything from the number of emails they have to send to launch a successful attack at what is the optimal link to attract an unsuspecting user, says Jenkins. “They are attacking your business in sophisticated ways,” he warned attendees of the virtual BoB conference.

[RELATED STORY: ThreatLocker Alert Warns Of Increased Ransomware Attacks Using MSP RMM Tools]

“These guys are out to destroy your business, to encrypt your data, to steal your data,” Jenkins said, rallying his partners to adopt a denial-by-default security strategy. “You even fight nation states (now). Over the past few months we have seen attacks increase and increase from Russia with more and more ransomware and more and more organized attacks.

The ransomware organizations that are wreaking havoc focus not only on large enterprises, but also on small businesses and MSPs, Jenkins said.

The attack landscape has evolved from enthusiasts launching malware attacks like the infamous “Lovebug” virus in May 2000 to sophisticated cybercriminal organizations using well-established software products like the SolarWinds Orion network monitoring platform and the Microsoft Exchange server to launch attacks, Jenkins said. “Now the attackers are actually using our software against us,” Jenkins said.

The SolarWinds breach, for example, which was discovered in December 2020 by cybersecurity firm FireEye, was an “incredibly sophisticated” attack in which bad actors inserted malicious code directly into the SolarWinds Orion network monitoring product, said Jenkins. “The attackers had actually managed to break into the source code of SolarWinds and they had changed the code” to launch an unprecedented attack on US government agencies, Jenkins said.

“It was a very bad attack,” he said. “It was so sophisticated that federal government agencies were installing Orion for attackers and they were basically putting this Trojan into their system.”

The Microsoft Exchange server hack – which was discovered in March 2021 and was used to steal emails and compromise networks – was “much more terrifying” than many realized at the time, Jenkins said.

ThreatLocker analyzed the Exchange Server hack with one of its customers keen to get more details about the attempted attack and found that the highly regarded Virus Total database failed to isolate the malicious code, said Jenkins.

The disturbing thing about the Exchange server hack is that the malicious batch file was actually created by Microsoft’s own IIS web server, Jenkins said. “This is where it gets really worrying because you wonder why a batch file would be created by IIS on an Exchange server?” Jenkins asked.

Working with the customer, ThreatLocker found that the Microsoft Exchange configuration had changed. So when the user downloaded the Offline Address Book, Exchange downloaded the malicious batch file to the system, Jenkins said. “We actually took this to our lab after this event to find out what was going on,” he said.

That’s when ThreatLocker discovered the malicious code had downloaded Microsoft’s PsExec tool that lets you run processes on other systems, Jenkins said. The PsExec has created a Microsoft Group Policy Object (GPO) in Active Directory for all computers in the organization. When ThreatLocker ran the malicious code in its lab, the GPO had crypto-locked every machine in the test case.

“We saw all the machines encrypted because of a vulnerability on an Exchange server,” he said. “Every time we run software on our computer. Every time we open an application, be it Microsoft Office or Google Chrome, that software has access to whatever we have access to. Ransomware is just software. Malware is just software. It’s written in the same languages, the same code. You can even find the same Stack Overflow samples in the ransomware if you decompile it.

The most infamous ransomware attack on MSPs took place over the July 4 weekend of last year when Kaseya’s on-premises VSA monitoring platform left over 36,000 MSPs without access to the product. Kaseya’s VSA flagship for at least four days.

“The 4th of July weekend was probably one of the worst weekends ever for MSPs,” Jenkins said. “We have seen thousands of MSPs affected by ransomware within our own customer base. Fortunately, the ransomware was blocked because our clients were operating on a deny basis by default. We saw 46 customers attempt to deliver ransomware to all of their endpoints. Just think of the damage (which could have resulted without negating by default).

All MSP customers had two-factor authentication enabled, Jenkins said. “It was a vulnerability in the Kaseya portal that allowed an attacker to essentially insert a command to send ransomware to all of your customers,” he said.

There were a record 21,000 common vulnerabilities and exposures (CVEs) in 2022 that were documented by Miter Corporation with funding from the United States Cybersecurity and Infrastructure Security Agency (CISA), Jenkins said.

“Just think about it – 21,000 software vulnerabilities for legitimate software that were logged in the CVE database last year,” he said. “This is the highest ever recorded in history. Attackers use these vulnerabilities.

One of the critical steps MSPs must take to make businesses more secure is to provide secure network access control, Jenkins said. “One of the biggest challenges we face today with network security (with the advent of the Internet) is that there is no network, the network is gone, the perimeter is gone” , did he declare. “When we are at Starbucks or working from home, we have to control access to these devices. The problem is that there is a network and it is called the Internet. We share it with Russia, China , North Korea.

ThreatLocker’s new network access control product provides a portal that MSPs can configure to protect themselves and their customers and see all incoming denials, Jenkins said. This network access control product allows partners to open their network only to trusted devices, Jenkins said. “It only allows access from where you are – not from anywhere in the world, from Russia to Canada to Detroit,” he said.

Neal Juern, founder and CEO of Juern Technology, a San Antonio-based MSSP, credits ThreatLocker’s default denial software with providing him with the security muscle needed to triple his company’s sales and transform into an MSSP. fully-fledged with 24-hour service, seven-day-a-week security operations center.

“I tell other MSPs that in the past three years, ThreatLocker is the single most important security tool or solution we’ve added to our portfolio,” he said. “That says a lot because we’ve become an MSSP and added so many layers of security.”

ThreatLocker’s fence and whitelist software provided a modern and innovative approach to stopping bad actors, Juern said.

“The old way doesn’t work,” he said. “He has no future. Thanks to Danny for coming up with a real security solution for MSPs. This is not the old days of malware. Now hackers themselves use our operating system files to attack and exploit us. It is fileless malware. There are no viruses to look for. Hackers have figured out that the tools already installed on our systems are all they need. This is why ringfencing is so powerful and why denial by default has become the new normal, the new way forward. You can no longer rely on finding known bad things. You have to stop the bad behavior – the unknowable bad things. Bad behavior gives hackers access to tools with which they can do damage.

Ultimately, MSPs that don’t use the default decline are playing Russian roulette, Juern said. “It’s only a matter of time before you get raped,” he said. “It’s the truth. We need to seek to stop things that could potentially be misused. That’s deny by default.

Grafa integrates ICE Consolidated Feed Data via the MDXT market


– MDXT facilitates access to ICE data for smaller/niche players

– Compelling collaboration greatly increases new business development opportunities

LONDON, May 10, 2022 /PRNewswire/ — MDX Technology (MDXT), the leading provider of data monetization technology solutions for data owners, is pleased to announce that Grafaan Australia-based fintech company, integrated data from the Consolidated flow ICE via MDXT’s data marketplace. ICE Consolidated Stream is part of the Intercontinental Exchange (NYSE: ICE).

Grafa is a powerful and modern financial data engine that quickly gives users consolidated access to large volumes of information. The engine aggregates financial information and business news coverage from around the world, allowing end users to scour the globe for up-to-the-minute information on emerging trends.

ICE Consolidated Feed aggregates content from over 600 global sources, over 300 sites and over 25 million investment instruments to provide clients with access to a vast universe of low-latency financial information with data complete on the depth of the market. ICE’s solution provides clients with a scalable market data feed designed to empower all departments involved in trading.

“Our work with Grafa and MDXT further extends ICE’s ability to provide individual investors and other market participants with comprehensive financial information from the consolidated ICE feed,” said Marc HeckertChief Product Officer Fixed Income and Data Services at ICE. “Grafa provides users with an integrated platform and MDXT’s Market API can allow users to easily see and act on real-time data.”

Heidi Cuthbert CEO of Grafa, commented. “One of our founding principles was to make financial, economic and business information accessible to everyone. However, the biggest obstacle to achieving this goal is being able to access good quality and affordable financial information. Therefore , a vital requirement of this project was the ability to provide flexible and inexpensive access to the exceptional data sources that ICE offers.”

Heidi continued, “Furthermore, the MDXT Data Marketplace API has proven to be functionally excellent. It is very user-friendly and provides a variety of out-of-the-box endpoints as standard. Overall, The combined ICE/MDXT experience has been very positive, and we are excited to be at the forefront of change, through the adoption of this innovative and much-needed capability.”

Paul WatmoughFounder and CEO, MDXT. “We are delighted to welcome Grafa as a customer, providing them with full access to business-critical data through our marketplace. We also look forward to helping facilitate future Grafa data usage requirements. and those of our joint customers with ICE”.

About Grafa

Grafa is a powerful financial data engine that allows users to quickly access large volumes of information in an entertaining and engaging way. It was founded by former Bloomberg colleagues who had a vision of making financial, economic and business information accessible to everyone, from Wall Street to Main Street. Grafa has news content from the world’s leading publishers including Bloomberg, Investing Channel, Cheddar TV and Grafa’s data journalism team. It has over 20,000 data points and allows users to create multi-asset watchlists including Australian stocks, global currencies, commodities and cryptocurrencies. Grafa is like the Swiss army knife of finance.

About MDX Technology Ltd

Nearly 40 of the world’s leading financial institutions and data providers use MDX technology to deliver real-time data and collaborate internally and with customers. Users include TP ICAP, HSBC, ICE and Royal Bank of Canada to name a few. The company is headquartered in Londonwith offices at North America and representation in the Far East.

SOURCE MDX Technology Ltd

Researchers outline framework to tackle rising rates of early-onset colorectal cancer



Disclosures: Eng reports serving on advisory boards for Merck and Pfizer and honoraria from Roche.

We have not been able to process your request. Please try again later. If you continue to have this problem, please contact [email protected]

According to a review article published in the Lancet Oncology.

“This review is one of three articles the Lancet decided to focus on the early-onset colorectal cancer patient population,” Cathy Eng, MD, FACP, FASCO, David H. Johnson endowed chair in the division of surgical and medical oncology and professor of medicine in the department of hematology and oncology at Vanderbilt University Medical Center, said in an interview with Healio.

Quote from Cathy Eng, MD, FACP, FASCO.

“The subject is of interest to many of us who treat colorectal cancer, as it is surprising to see a young adult in our clinic diagnosed with sporadic colorectal cancer,” added Eng. “I have been seeing these patients for a second opinion in my office for many years now.”

Eng spoke with Healio about the genesis of the review article, potential underlying causes of sporadic colorectal cancer in young adults, and what oncologists and other clinicians can do to help these patients.

Helio: What prompted this review?

Eng: Greater recognition is now given to early colorectal cancer. We are concerned that the survival of young adults is significantly lower than that of the middle-aged patient, because this younger population has advanced disease. The purpose of these articles is to further promote education and awareness – not only trying to prevent the development of colorectal cancer, but determining how can we optimize the care of younger patients who receive this diagnosis, other than simply treat it surgically or with radiotherapy or chemotherapy.

Helio: What are the potential underlying causes?

Eng: We don’t know the exact etiology, but it’s probably multifactorial. Most of these patients will not be diagnosed with an inherited form of colorectal cancer. I see patients in my clinic who are between 20 and 40 years old, which means they are not of screening age. Most people develop a polyp before it becomes cancerous. The polyp takes between 5 and 10 years to develop into an adenocarcinoma. Being diagnosed with a polyp at such a young age could mean there is an environmental factor at play, and obesity also plays a role. There’s also a lot of interest in how the microbiome plays into this.

We also know that patients with left-sided tumors should do better than those with right-sided tumors. Yet it is interesting because most young adult patients have tumors on the left side. We don’t know why this is happening and we don’t have enough answers, which is why many of us are so interested in the ongoing research and trying to find out more about these patients.

Helio: What does the treatment of these young people look likeuh the patients?

Eng: Patients diagnosed with colon cancer will go directly to resection. For cancers of the rectum, depending on the degree of tumor involvement, radiotherapy is administered. That’s it for the average young patient and it all depends on how many lymph nodes are involved and where the tumor is. A patient with metastatic colon cancer can undergo chemotherapy indefinitely and it is always a difficult subject, especially for younger people who are often starting a crucial aspect of their lives.

Helio: What psychological and qualityofthe impacts of life make colorectal cancer have on younger patients?

Eng: We specifically considered the psychosocial challenges of being diagnosed with colorectal cancer at a younger age and the potential financial toxicity that could result. Even for patients diagnosed with early-stage disease, some chemotherapy can cause neuropathy, which may persist and may be permanent. So we have to be very careful about processing in this context. We also use this treatment in the metastatic setting, and for patients with metastatic disease who cannot have surgery, the duration of most chemotherapies is indefinite. The risk of toxicity in these patients can be quite high and some treatment regimens can cause hair loss. Some patients may also end up with a permanent colostomy, which impacts body image and quality of life. Despite our best efforts, some patients who receive radiation therapy experience radiation toxicities that can significantly impact sexual, urinary, and bowel function.

With the diagnosis alone, patients can sometimes feel hopeless and need social support from others who can relate to what they are going through, so they don’t feel alone. Also, if the patient is young and loses his job and insurance, he may not be able to properly complete his cancer care. They face financial instability and financial stress unimaginable for someone at such a young age.

Helio: What would you advise oncologists for To do for these patients?

Eng: Do your best to communicate with the patient each time they come to your practice. Ask how they are doing and see if you can direct them to the right person or clinic to address their unmet needs. Every oncologist is extremely busy and it’s even harder to do it with COVID, but it’s so important to take the time and make that connection with the patient and get them to open up.

I also hope that with continued outreach, more internal physicians will understand the importance of recognizing early symptoms and referring these patients for testing, even those who appear to be perfectly healthy but have irregular bowel habits, for example. Most patients will tell us in retrospect that they have noticed blood in their stools for several weeks or months. Irregular bowel motility and increased frequency of gas, bloating and night sweats in a young patient are also of concern. Also, it should not be assumed that anemia in a young woman can be attributed to her period. If there is a persistent iron deficiency, I would strongly encourage further workup. By educating others and spreading the word, the hope is that family physicians and internal physicians will recognize that young patients can be diagnosed with colorectal cancer, and if something does not improve after a few weeks, it must be remedied. The ultimate hope is that we can diagnose these patients earlier.

Helio: Do you have anything else you would like to mention?

Eng: This article aims to highlight what is happening in the real world setting. I hope others will recognize that this is a potentially growing problem. We also need to improve our approach and not assume that all colorectal cancer patients are the same, regardless of age. The reality is that our young adult patients have very different personal obstacles in their lives that can be attributed to their diagnosis, and we also need to recognize that they not only want to survive, they want to live. We must help them to live.

For more information:

Cathy Eng, MD, FACP, FASCO, can be reached at Vanderbilt University Medical Center, 2220 Pierce Ave., Nashville, TN 37232; email: [email protected]

Career Changes in Law, Government, Real Estate and More – Sun Sentinel


Pompano Beach-based Tint World Automotive Styling Centers franchise announced that Danish Bryant joined the company as its front-end web developer.

The Florida Association for Women Lawyers held an election for the positions of President-Elect and Treasurer for the 2022-2023 membership year. Thomasina Moore was elected president and Jennifer Comelle was elected treasurer

Florida-based real estate investment group Grover Corlew has announced the appointment of Marlene Diaz as Vice President of Property Management.

JLL has named Roderick Barnes as Market Manager for the Florida Region and LaShawn Bates as Market Manager for North and Central Florida.

In recognition of May as Older American Month, the Broward County Regional Agency on Aging honors Broward’s senior volunteers, ages 60 and older, for their contributions to the community at the 38th Annual Dr. Nan S. Hutchison Broward Senior Hall of Fame, scheduled as a virtual presentation for May 18. A plaque with the name of each winner will be displayed in the Broward County Government Building. Candidates for induction include: Doug Frankow from Fort Lauderdale; Joel and Marcia HochbergHollywood; Patricia JonesLauderdale Lakes; Harriet McCoy, Park ; Mayor of Pembroke Pines Frank Ortis; Rosalind Perlmutter, Fort Lauderdale; Commissioner Debra PlackoCity of Tamarac; Judy ShutowickPark ; Evelyn WarrickPompano Beach; Shirley WimberleyFort Lauderdale and Fred YarmuthPark.

dr. Thomas Smith and dr. Sheryl Zayas of Care Resource Community Health Centers Inc. are honored by Mental Health America of Southeast Florida for their positive impact on the mental well-being of others in South Florida during their 26th Annual Epic Awards on May 25. The Exceptional People Impacting the Community (EPIC) awards are presented to members of the community who have demonstrated exceptional service through their actions, advocacy, leadership, or service delivery to the most vulnerable in the community.

Safeguarding American Values ​​for All, SAVE, has expanded its South Florida presence to Broward County, and the location will be managed by Francesca Hawthorne as a Broward community and field organizer.

Cameron Gordon Forbes has been named Associate Executive Director of Toby & Leon Cooperman Sinai Residences. Gordon-Forbes most recently worked at Aventura’s Palm Gardens, where he ran a skilled nursing facility. Prior to that, Gordon-Forbes was the administrator of Harbor’s Edge Nursing Home in Delray Beach.

Fort Lauderdale-based Sip Channé, a line of rosé and white varietals created and imported from Provence, France, announced Jonathan Shabat as Chief Operating Officer. Before joining Sip Channé, Chabat was Sales Director at BODVAR House of Rosés.

governor of florida Ron DeSantis named dr. Mark Klein to the Board of Podiatric Medicine. Klein, of Boca Raton, is a practicing podiatrist with Florida Foot Specialists.

Bradley Barreto was appointed to the Construction Industry Licensing Board by DeSantis. Barreto, of Coral Gables, is the principal and broker of Barreto Real Estate Group, LLC.

DeSantis has appointed several people to Florida Building Code Administrators and Inspectors. From South Florida, the appointees are: Jane Deckerof Miami, building manager for the City of Doral; Alexander Hernandez, of Coral Springs, building manager for the City of Coral Springs; and Peter Ringleof Lake Worth, building manager for the City of Lake Worth.

Eric Kennedyof Margate, and president of EDK Management Consultants, was named by DeSantis to the Learning Advisory Council.

Daniel Foganholiof Coral Springs, currently a design consultant for Arhaus, was appointed by DeSantis to the Broward County School Board.

gastroenterologist Paul Andrew Feldman, MD, has joined Holy Cross Medical Group, a multi-specialty physician group employing more than 160 physicians providing services in Broward and Palm Beach counties. Prior to joining Holy Cross Health, he was Section Chief of Gastroenterology at the Veteran Affairs Medical Center in Miami.

Email promotions, appointments, new hires at [email protected] 954-356-4662, or Twitter @mindingyourbiz

Hydroneer mining sandbox now features multiplayer, vehicles, and optimized code overhaul


The big Hydroneer mining sandbox just got… a whole lot bigger. The release of the updated version 2.0 today, Sunday May 8, 2022, adds split-screen co-op, Steam Remote Play, hundreds of new items, and an all-new vehicle system. it also adds two new areas to the world. Perhaps most impressively, the update is a complete overhaul of Hydroneer’s underlying code, putting it on more stable ground for additional optimization, new gameplay features, and multiplayer.

It’s a far cry from the game that I thought was getting quite detailed when it was updated to add power and logic systems in 2021. I couldn’t have imagined it would ever be a game that you would customize your character’s appearance for multiplayer. I doubt when our Chris Livingston tried it in 2020 he thought it would go this far.

Hydroneer’s best selling point, for the record, is still intact: it’s $10 for a sprawling sandbox building game. (30% off until May 15, even.)

Image 1 of 13


(Image credit: Foulball Hangover)
Image 2 of 13


(Image credit: Foulball Hangover)
Image 3 of 13


(Image credit: Foulball Hangover)
Image 4 of 13


(Image credit: Foulball Hangover)
Image 5 of 13


(Image credit: Foulball Hangover)
Image 6 of 13


(Image credit: Foulball Hangover)
Image 7 of 13


(Image credit: Foulball Hangover)
Image 8 of 13


(Image credit: Foulball Hangover)
Image 9 of 13


(Image credit: Foulball Hangover)
Image 10 of 13


(Image credit: Foulball Hangover)
Image 11 of 13


(Image credit: Foulball Hangover)
Image 12 of 13


(Image credit: Foulball Hangover)
Image 13 of 13


(Image credit: Foulball Hangover)

That price has something to do with why multiplayer is co-op split-screen using Steam Remote Play, for the record. “Due to the technical limitations of the physics engines and our desire to remain independent and not hire outside investors, I decided the best thing to do was to turn the multiplayer aspects of the update into split-screen Steam Remote Play,” said the game creator and Foulball Hangover. directs Max Hayon. “We’ve tested this a lot and put it through its paces and I’m personally very impressed with how far it’s come since the last time I used it.”

The new world update is pretty neat, adding two new areas, each with its own dig site to mine. Icehelm and Snowrune Falls each have their own twists, but Icehelm is the most interesting to me: it’s a horizontal dig rather than a vertical one. Icehelm also has a few stores to buy, to boot.

You can find Hydroneer on Steam.

Why Bittrex Lost Its Lead, Critical Token Sales Mistakes, and How to Get Listed (Interview)


Bittrex Global is the international branch of the American exchange Bittrex based in Seattle, Washington. It is based in Lichtenstein, and it is registered and supervised by the local financial market authority. During the early years of crypto trading and up until the 2017 bull run, Bittrex was considered one of the top exchanges, and the founders were eager to list their tokens on the US-based exchange.

Chris Sinkey is Chief Commercial Officer and Listing Manager for Bittrex Global for non-US users.

During the Paris Blockchain Week conference in April, CryptoPotato sat down with Sinkey for an insightful conversation about the history of Bittrex, the current state of crypto exchanges as it relates to security and regulation, and the future of token sales.

Sinkey told us that “it became clear that because of regulatory clarity, it made a lot of business sense to separate our user base into US and non-US.

Bittrex and Bittrex Global: what is the difference?

Sinkey revealed that he created the new international entity called Bittrex Global in search of regulatory clarity and based it in Lichtenstein, where the company is registered and also supervised.

The two companies (Bittrex and Bittrex Global) continue to have “a relationship to this day from an engineering perspective.” In other words, Bittrex supports Bittrex Global’s engineering backend, trading infrastructure, matching engine, wallet, integrations and new product development.

Additionally, the level of integration between the two companies, along with strict anti-money laundering regulatory compliance, allows for a shared pool of liquidity unlike what other exchanges such as Binance do:

“Other exchanges, like Binance, do the reverse of that. They came to the US using the same infrastructure, but they created a US exchange.

The difference is that our order books are shared with Bittrex US. […] So in a Bitcoin order book, because both markets are available for trading, a US client can be the counterparty to trade with a European client. This is because all clients on our platform are KYC and we follow a very strict and compliant AMPL process.

Chris Sinkey, Bittrex Global CBO. Source: Twitter

Bittrex: from the best exchange in 2017 to the laggard

Bittrex was one of the world’s leading exchanges by trading volume in 2017, but it was also during this year that it started to fall behind.

Sinkey explained this and recalls that the industry back then was very different than it is today. He told us it was “crazy” when he joined Bittrex in 2017, amid that year’s legendary and insatiable bull run.

“Shortly after joining Bittrex, it was the largest exchange in the world in terms of trading volume and number of markets. And there were so many account requests at that time that the price of Bitcoin went from two to three thousand, then up to $17,000, $18,000, and $19,000.

One of our servers that was supporting new account signups was having trouble handling the load. We had to throttle our new users.

This is actually one of the reasons why Binance was able to grow. Because users who couldn’t access Bittrex had to go somewhere. Binance was the new exchange at that time. They had just done their ICO the previous summer and they were really starting to gain popularity.

Sinkey said the reason other exchanges took so much market share in subsequent years was because of the amount of capital they raised and invested in marketing.

He told us that Bittrex made a conscious decision to remain entirely private and self-funded. The crypto exchange has never raised outside capital or launched massive VC-funded marketing campaigns. Instead, he says the company has focused its long-term strategy on strict regulatory compliance and trusted custody practices.

“We are very happy to be in Lichtenstein and Bermuda. So we also have Bittrex Global Bermuda and we have a Digital Assets Business Act license – a Bermuda DBA license. We found it fantastic to work with the regulators. »

When it comes to custody, Bittrex has some of the best security in the crypto exchange industry. The company’s three founders are cybersecurity experts from Microsoft, Amazon and Blackberry.

Bittrex Global, logo

Which tokens are listed (and removed)

Coin listing policies are a major sticking point within the cryptocurrency community, and we wanted to learn more about Bittrex’s approach.

Sinkey told us that they took “the approach of backing the long tail of crypto assets rather than trying to be picky and trying to pick which project will win or which won’t. We like to let the market decide.

However, he also clarified that they have a rigorous compliance and due diligence process and a technical review process.

“We break down our registration process into three pillars: legal, compliance and technical. A legitimate project with the desire to come up with new crypto, we will review and run through our process. If they pass these three phases of due diligence, we will list them.

Regarding delisting, the CBO told us that it “is almost always tied to liquidity – it’s almost always tied to a market that doesn’t show demand from our user base over a long period of time. Or there is no liquidity provided by any type of institutional market maker or liquidity support for that market.

The Biggest Token Sales Mistake

During our conversation, Mr. Sinkey offered advice for new crypto startups trying to raise funds by issuing tokens. His MBA from London Business School shines in this part of our interview.

He believes that the number one mistake teams make when raising funds is “they don’t understand the difference between equities and commodities.

“99.9% of the listings we do are utility tokens. They are commodities. When a team goes to market to raise funds, they structure their pre-sale and go to market with a public sale with more intent to raise funds than to distribute its token to token holders, for the purposes of allowing users to use the token in their ecosystem they are building.”

This, in turn, translates into the number one reason most projects fail. He thinks teams should raise the right way and sell shares to accredited investors. Later, they should distribute their token “in a way that enables utility in an ecosystem.”

“That’s probably the biggest mistake that I think a lot of smaller, younger teams don’t really understand the differences there. Or why and when to choose which path for what. They end up overselling the token.

This creates far too much supply and far too many sellers. Because most people bought for investment rather than utility. Then the token price collapses and the project dies.

His advice is to structure the right of presale. For this to happen, the team needs to really understand what they’re trying to accomplish and “get a deal with a pre-sale for your token only if you need it.”

Sinkey argued that teams should only sell what they need and to the right buyers. This brought him to his other point:

“Choose your buyers wisely. If you are pre-selling and you have a token that is B2B in nature, why are you selling it to retailers who can never use it for utility purposes?

If your business is B2B in nature, go out to customers and sell the token to them, or do a proof of concept with them and get it in their hands and see if your platform has any use.


Binance Free $100 (Exclusive): Use this link to sign up and receive $100 free and 10% off Binance Futures fees for the first month (terms).

PrimeXBT Special Offer: Use this link to sign up and enter code POTATO50 to receive up to $7,000 on your deposits.

Dubai fascinates the world with its unique setting


DUBAI: It’s not just holidaymakers who have contributed to the boom in the luxury holiday home market. Foreign companies operate from short-term rental villas, said Mohammed Sultan, founder and CEO of Luxury Explorers Collection, which has helped them.

Sultan is a veteran of the luxury hotel industry, specializing in high-level conferences and VIP travel arrangements since 2004. But when the pandemic hit – essentially bringing events and travel to a halt – he had to change quickly. of strategy.

His company spotted an urgent need in the market for high-end, short-term vacation rentals. So in June 2020, just months after COVID-19 swept the world, Luxury Holiday Homes was created.

The majority of the company’s customers are from Europe and Asia, mainly China. They are not typical digital nomads; they are high profile men and women who see the appeal of doing business in Dubai.

Compared to restrictive COVID-19 measures in many major cities in Asia and the ongoing war in Eastern Europe, Dubai has become a safe halfway house for businesses.

“Since the pandemic, China has been our biggest market,” Sultan told Arab News.

“We are seeing a lot of wealthy people moving their business and bringing in staff members to operate in a villa in Dubai, in addition to the influx of Russian businessmen vacationing in Dubai and investing here. They need a base, so they use our ultra-luxury properties to experience the market and feel settled,” he added.

The luxury sought

The global vacation rental market is expected to reach $111.2 billion by 2030, according to a 2021 Precedence Research study. The ultra-luxury market, however, is more nuanced.

In addition to beautifully decorated properties, often in popular destinations such as the exclusive Emirates Hills area or a penthouse in downtown Dubai, amenities are offered to affluent clients.

Private chefs, butler services, and high-end toiletries are expected. The company operates 20 properties in Dubai and five in Makkah. The three-bedroom unit in Makkah that overlooks the Kaaba is one of the most coveted properties in his reach.

“Most hotels in Makkah are old and not good value for money. It is really difficult to find a large three bedroom in Makkah that is suitable for a whole family and overlooks the holy place for prayers,” Sultan said. “It’s a spiritual experience.”

In Dubai, the Company’s properties are spread across Palm Jumeirah, Emirates Hills and Downtown Dubai. The majority of holiday homes have pianos so that the children can continue their lessons. Some have open-air cinemas and beachside barbecue areas. Luxury Explorer Collection rates per night range from 6,000 dirhams ($1,634) to 65,000 dirhams.

“When we started with a few properties, clients would call us at odd hours asking how to turn on the gas for cooking, so we realized they needed to be fully maintained to a high degree,” Sultan said. “We’ve set an impeccable ultra-luxury standard now, and we’ve seen the highest occupancy rates.”

Changing trends

Luxury Holiday Homes is currently planning to expand into Abu Dhabi and Saudi Arabia to meet growing demand. Riyadh, Jeddah and Dammam are on the radar. Additionally, the company will soon be working with a developer to create luxury mansion experiences from scratch within the next two to five years.

“It helped me to work in the industry and to have the right connections. I knew the habits of high net worth individuals in the area, so when we saw that hotel bookings were slowing down in 2008 and the homes of private vacations were on the rise, I took note of consumer preference and acted at the appropriate time,” Sultan said.

“Even hotel brands are moving into short-term rental space,” he added.

Brands such as Marriott International launched Homes & Villas in 2018, encouraging guests to stay longer.

“Hotels are definitely getting into the vacation home business. We talk about it all the time at conferences,” Sultan said. “But they have restrictions; we can update easily and quickly; we offer more privacy.

New data brought new insights into traveler habits that he hadn’t anticipated, affecting renovation plans in some cases.

“Our data shows that the more you renovate your bathrooms, the more value you get. We have renovated all the bathrooms and set aside the secondary bedroom renovations in the 11 bedroom villas. It paid off,” he said. “We have found in a striking way that revenue increases massively the more you upgrade the bathrooms.”

Other preferences include entertainment facilities, including cinemas and barbecue areas facing the sea. As the lines between work and personal life remain blurred, having everything you need in one place is particularly appealing. for luxury travel consumers and business travelers.

What are dApps and their place in Ethereum » CryptoNinjas


Anything decentralized is all the rage in 2022. Blockchain and decentralized services remain among the top Google trends and are sparking discussions around the world. DApps, or decentralized applications, occupy a privileged place in the debates, being one of the pillars of decentralization.

According to the state of Dapps, the market hosted more than 4000 decentralized applications with more than 110K daily active users. Axie Infinity, Katana and OpenSea have attracted thousands of users and are growing by leaps and bounds. It is therefore not surprising that dApps are a bankable opportunity for investors and companies. But what is a dApp?

Today we’re going to go over the fundamentals of decentralized apps and see if it’s a worthwhile investment for years to come.

What are dApps?

Most of your basic apps like Instagram or Google Docs share the same basic structure. There is a client application on your device, while the server is installed somewhere on the central system.

Whatever your type of application, local client applications synchronize your data with the central system, thus transmitting critical information to the central server which has full control over your data

Unlike traditional applications, a decentralized application is built on a decentralized network that combines a smart contract and a front-end user interface.

From the end user’s perspective, dApps look almost identical to a standard mobile app. Yet the main difference is that not all data and the backend are stored centrally on a server. This means that no centralized entity exercises authority or control over your data or your movements within the application.

Under the hood of decentralization

So how do dApps work? Any decentralized application is made up of back-end code that runs on a peer-to-peer network.

A user interface can also be established by front-end code that makes back-end calls in a dApp. Therefore, dApps users interact with the back-end code i.e. smart contracts to call the app functions.

Used as a back-end, smart apps are programs that run when predefined conditions are met. Thus, they automate transactions and verify when the parties fulfill the conditions.

Other key dApps differentiators include:

  • Open source code that runs autonomously and no one entity has control over most tokens;
  • dApps generate tokens to reward participating nodes;
  • dApps are accessed via tokens;
  • Miners receive tokens as rewards for their significant contributions to the ecosystem.

Decentralized applications and Ethereum

Being one of the largest blockchain platforms, Ethereum is home to the majority of dApps. It is basically an application development platform based on decentralized blockchain technology. Since it is the primary platform for hosting smart contracts, Ethereum is most commonly associated with decentralized services. Therefore, it is the go-to platform for building dApps, as it already offers a variety of tools for dApps development.

Main applications of dApps

Unlike most technological innovations for purely theoretical use, decentralized applications have already transformed into practical and widely used services. Let’s take a look at the most popular ones.

Decentralized finance

The unmediated financial ecosystem has long been an inaccessible business. However, smart contracts and blockchain have launched DeFi solutions that now represent an estimated market value of $12.7 billion. Here, the decentralized applications present themselves as a client-facing interface that allows users to communicate with a particular DeFi service, be it lending or exchanges.

Non-fungible tokens

Just like with DeFi, dApps integrate the use of NFTs into software applications. Non-fungible tokens can be used to represent different types of underlying assets. These can include physical objects, works of art and the like.

For example, OpenSea, which is the largest NFT marketplace in the world, offers an unparalleled selection of assets to buy and caters to over 80 million NFTs. Another striking example of an NFT solution is Axie Infinity. This NFT game invites users to a digital pet community where they can explore, breed and buy Axies.


Another widespread application of dApps is their presence in the social media ecosystem. While traditional social networks grant little or no control to their users, communication platforms dApps return more user activation and provide more control over user data. Minds is a decentralized Facebook alternative that allows users to post content and exchange secure messages with other members of the network.

Crypto Wallets

This type of application stores users’ private keys. These are unique digital codes that facilitate cryptocurrency transactions. Crypto wallets differ widely, with the most popular being hosted wallets, non-custodial wallets, and hardware wallets. Exodus is a popular multi-asset crypto wallet that allows users to buy, trade, and earn interest through an easy-to-use interface.

Main disadvantages of dApps

Apart from added value such as decentralization and security, decentralized applications have some disadvantages.

Due to their immutability, dApps are harder to maintain. This means that once your dApps are on the mainnet, it’s difficult to update or fix a bug. The high costs and the complexity of use are among the disadvantages that scare away new users and investors.

Additionally, UX of dApps is difficult to create due to in-app design requirements and lack of expertise of UX/UI designers. Unlike traditional mobile and web applications, decentralized applications have different user experience requirements, which makes design a difficult and unexplored area.

Finally, network congestion weighs on the performance and speed of dApps. The current processing speed of DApp networks stands at 10-15 transactions per second. If an application gobbles up excessive computational resources, it affects the entire network.

However, the majority of these drawbacks can be eliminated as the dApp ecosystem matures. Therefore, the disruptive potential of decentralized apps shines brighter than their downsides.

The last word

Dapps will continue to grow at an exponential rate in the years to come. While a fully decentralized utopia is unlikely to materialize anytime soon, the year 2022 is expected to see significant improvements and the spread of blockchain technology and its applications.

In particular, decentralized apps are uniquely positioned to support censorship resistance and return more control over their content to users. However, dApps are still haunted by a number of drawbacks that stem from the immaturity of the network. As decentralization gains traction, we will see the full potential of blockchain-based solutions.

Intel plans to sell software that simplifies resume template training • The Register


Exclusive Intel plans to start selling a software platform that promises to simplify and speed up the training of AI models for computer vision, according to internal company documents seen by The register.

The software, named Sonoma Creek, is set to launch this fall, and the semiconductor giant plans to sell it as a subscription or license, part of a new push by the x86 giant to boost sales of chips with a growing stable of commercial software products. Intel is also looking at Sonoma Creek as a way to drive adoption of its free OpenVINO software toolkit for AI inference work.

Intel touts Sonoma Creek as an “end-to-end AI development platform” that simplifies computer vision model training for subject matter experts without a data science background.

The chipmaker believes Sonoma Creek will benefit multiple industries. This includes manufacturing, where computers can monitor assembly lines and find faults, and healthcare, where computers can detect abnormalities in medical imaging. Other industries cited include smart agriculture, smart cities, retail and video security.

The Sonoma Creek development has been hidden for some time. However, there have been some public references to the software. This includes a publicly available online workshop that Intel held for users in South Korea last year, with a company representative discussing the software. The CEO of Intel’s Korean business also mentioned Sonoma Creek in a korean news article in December.

How Sonoma Creek Works

In a presentation, Intel says Sonoma Creek brings together five important stages of AI model training that would be fragmented across multiple services into a “single workflow.” These five steps are data collection, data labeling, model selection and training, model optimization, and deployment.

A slide for Intel's Sonoma Creek software showing the company's vision for fragmented AI development.

A slide from a workshop in South Korea showing Intel’s perspective on fragmented AI development. Click to enlarge.

The software works like this, according to several documents:

A slide showing how Intel's Sonoma Creek software addresses the five stages of developing an AI model.

A slide from a workshop in South Korea showing how Intel’s Sonoma Creek software addresses the five stages of AI model development. Click to enlarge.

Sonoma Creek begins training computer vision models using PyTorch and TensorFlow frameworks with just 10-20 images or a video.

Users then annotate the data using what Intel calls “intelligent assistants,” which helps Sonoma Creek learn and improve the accuracy of the model.

Once enough data is annotated, Sonoma Creek will automatically train the model and make predictions, which users approve or modify to improve model accuracy as well.

After that, users export the model for inference using the original model framework or using Intel’s OpenVINO toolkit, which optimizes the model for a variety of Intel hardware, including CPUs and GPUs.

If a template is not accurate, users can make corrections by adding new images and tagging those images before re-exporting the template. This process of continuous improvement of the model is called “active learning”.

In an internal explainer for Intel employees, the company says Sonoma Creek comes with an intuitive web-based graphical user interface. This, combined with the annotation helpers, “helps[s] speed up data annotation and reduce[s] deployment time,” according to Intel. Sonoma Creek also allows users to “combine multiple tasks,” such as detection and classification, “for more granular model development.”

Intel says these and other features “differentiate the platform from other” no-code or low-code development platforms that have become popular.

Sonoma Creek runs on Intel processors and Nvidia GPUs for desktops and servers, although Intel plans to support its own GPUs in the future.

A slide showing how Intel's Sonoma Creek software works.

A slide from a workshop in South Korea illustrating how Intel’s Sonoma Creek software works. Click to enlarge.

Intel began prototyping Sonoma Creek with early adopters in the second half of last year, and the software has been in an early access program for a few months, according to a document. This is all part of the company’s plan to launch the software as a commercial offering this fall.

The x86 giant plans to sell Sonoma Creek as a subscription service or software license. The software will be available for on-premises servers and through cloud service providers. For cloud deployments, users will be able to access the software in virtual machines or Kubernetes containers.

Intel also plans to provide support and professional services for the suite, which includes “onsite solution activation, project-level consultation, and enterprise-level support.”

One of the go-to-market channels Intel is considering is system manufacturers, which is how the company has already sold some of its current software products.

Sonoma Creek will boost Intel’s AI and software strategies

Intel is working on Sonoma Creek as the company hopes to boost chip sales through software revenue and become a bigger player in the AI ​​space.

The x86 giant is trying to catch up with Nvidia, which has built a comprehensive portfolio of AI hardware and software over the past few years, making it a favorite on Wall Street.

On the hardware front, Intel is taking several avenues, integrating new AI features into its processors, while expanding its portfolio of specialty chips, which will eventually include new discrete GPUs the company plans to release for servers later this year. year.

The chipmaker has also started selling AI software products in addition to free offerings like OpenVINO. These commercial products include the managed AI service Cnvrg.io and the AI ​​model optimization platform SigOpt.

As one document states, Intel sees Sonoma Creek as the “next level” in the company’s AI strategy. The big questions are whether enough organizations will find the software useful and whether it will comply with “eco-responsible” promise Intel CEO Pat Gelsinger did.

Sonoma Creek will join a growing stable of commercial software offerings that Gelsinger says will help Intel better compete with rivals by making its hardware more attractive. After earning $100 million on software last year, the business hopes to increase that figure to $150 million this year.

That $150 million figure may pale in comparison to the $76 billion Intel expects to collect in sales this year, though Gelsinger promised software would have an outsized impact on the business.

“We’re going to grow it quickly, but we’re going to get platform differentiation right, which is going to [have a] very disproportionate business advantage, even if the short-term earnings are rather low,” he told an investor meeting in February. ®

DARPA Seeks Proposals for DRACO Nuclear-Thermal Rocket In-Space Flight Demonstration – Reuters

Artist’s rendering of the demonstration rocket for DARPA’s DRACO program.

DARPA is looking for proposals for Phase 2 and 3 of Demonstration rocket for agile cislunar operations (DRACO) for the design, development, manufacture and assembly of a nuclear thermal rocket engine – the objective is to execute a flight demonstration in space of nuclear thermal propulsion during the financial year 2026.

The overall objective of DRAGON is to enable urgent missions over vast distances in cislunar space, the area between the Earth and the Moon. Nuclear thermal propulsion achieves a high thrust-to-weight ratio, similar to chemical propulsion, but with two to five times greater efficiency using systems that are both faster and smaller than electrical and chemical systems, respectively. These propulsive capabilities will allow the United States to strengthen its interests in space and expand the possibilities of NASA’s long-duration human spaceflight missions.

Phase 1 of the DRACO program included two parallel risk reduction activities. Track A focused on developing a preliminary design for the rocket engine reactor. Track B focused on developing a conceptual plan for the in-orbit demonstration system.

The planned Phases 2 and 3 of DRACO will focus on the development and demonstration of the operation of the nuclear thermal rocket engine in orbit. The agency’s general announcement can be found at sam.gov.

The United States uses the maneuver to maintain its advantages in the land, sea and air domains. However, maneuvering is more difficult in space due to propulsion system limitations“, said Major Nathan Greiner, program manager in DARPA’s Office of Tactical Technology. “To maintain technological superiority in space, the United States needs advanced propulsion technology that the DRACO program will provide.”

MOSIP partners with BixeLab for a global certification framework for biometric devices


MOSIP engaged BixeLab to write a new, modular and globally adoptable certification framework for biometric devices and software.

MOSIP – the modular open source identity platform – notes the growing adoption of its technology worldwide and the need for a higher standard for the quality of biometric images to ensure the best possible performance of the functions of deduplication and authentication. To meet this demand, MOSIP enlisted BixeLab, the world’s second NIST NVLAP-certified biometric testing lab, to form a new certification framework.

BixeLab was also recently accredited for FIDO biometric testing.

The purpose of the framework, according to MOSIP, is to provide standard evaluation criteria and operating procedures for testing devices and solutions, and to establish standardized certification programs for MOSP biometric devices to provide independent certifications to MOSIP users. It aims to provide an overview of assessing full compliance across image quality, software interfaces, and hardware-based security implementation to deliver meaningful and realistic results. He adds that adopting countries should be able to use these results to make decisions about biometric devices in their ecosystems.

The two partners decided that the standard evaluation criteria should be independently adoptable by global laboratories, supported by global and geography-specific compliance needs, and usable by countries adopting MOSIP.

These global labs will offer MACP (MOSIP Advanced Compliance Program) certification to meet the needs of each country in mind and developed in consultation with the ecosystem, MOSIP says.

The advantage of an independent biometric certification mechanism is the ability to set up certification programs in-house or to rely on accredited independent laboratories to verify the quality of devices, explains MOSIP. This will reduce the time-consuming and resource-intensive development of full-fledged programs, he says, while being particularly useful for smaller countries that may lack the bandwidth for internal certification systems.

MOSIP says the framework will be developed in stages and will be published regularly for feedback. He expects laboratory qualification criteria to be part of the framework. First drafts are expected by the third quarter of 2022.

MOSIP also provides secure biometric interface standards for partners to self-test to ensure compliance, as just completed by Integrated Biometrics.

Article topics

biometrics | BixeLab | certified | MACP (MOSIP Advanced Compliance Program) | MOSIP (Modular Open Source Identity Platform) | research and development | standards | trial

Sweets & Snacks Expo announces comprehensive training program for the confectionery industry


The show’s new educational programming will include industry-specific sessions to give attendees the opportunity to learn from experts, thought-provoking industry panels, and confectionery and snacks leaders tackling critical issues like as the disruption of the supply chain, the revolutionary innovation of confectionery and snack products, the influence of social media. on shopping habits and post-pandemic shopping trends.

The educational sessions offered at the Sweets & Snacks Expo are unparalleled. As consumer habits continue to change during this uncertain time, access to top-level education and knowledge is more important than ever, and this year attendees will have access to some of the industries brightest minds. confectionery and snacks.said John Downs, president and CEO of the National Confectioners Association.

Whether they’re looking to prepare for National Candy Month in June, get inspired for a bigger social media presence, or rethink their front-end strategy, our attendees can find what they’re looking for – and more – at this year’s Sweets & Snacks Expo​.”

In addition to a robust education program, attendees can find show-wide insights at many other education-focused show features and hear from 18 retail leaders on the following topics:

Revealing Education

Beginning before the show opens, Eye-Opener training sessions feature information for early risers looking to take a leap into learning and connections for the day.

Insight stage | Sponsored by Barry Callebaut

The Insights Stage, located in the West Concourse, is Sweets & Snacks Expo’s home for the latest data and ideas on the confectionery and snacks categories from industry thought leaders.

Innovation Phase | Sponsored by Barry Callebaut

The Innovation Stage debuts at Sweets & Snacks Expo this year. Here attendees can find industry trends, the latest and greatest innovations in confectionery and snack products and more.

Destination Front-End | Sponsored by Barry Callebaut

Destination Front-End takes a closer look at the front-end experience, covering topics such as merchandising best practices, front-end disruptions, new technologies and more to help Sweets & Snacks Expo attendees learn manage this vital and ever-changing experience. section of the store.

Ask an Expert Kiosks | Sponsored by Barry Callebaut

Want to connect one-on-one with some of the experts who graced the Sweets & Snacks Expo stage? The Ask an Expert booth will host a selection of Sweets & Snacks Expo speakers immediately following their stage presentations for follow-up questions and additional information.

Registration to attend the Sweets & Snacks Expo and access the show’s exclusive educational sessions will remain open throughout the show, with advanced-rate registration ending May 12.

The Legal Landscape of Artificial Intelligence (AI) Law


Although artificial intelligence (AI) technology has the potential to transform society, the legal issues it raises touch on various areas of law. These areas include data privacy and security, commercial contracts, intellectual property, antitrust, employee benefits and product liability.

AI is generally defined as computer technology capable of simulating human intelligence. Using algorithms, this software can aggregate data, detect patterns, optimize behaviors and make future predictions. Some examples of AI applications include machine learning, natural language processing, artificial neural networks, machine perception, and motion manipulation.

Businesses and organizations often use these technologies to perform functions more efficiently. They can either develop AI capabilities in-house or license AI technology from a third party.

Product Liability Act

AI has become a mainstream feature in many products and services. As a result, the potential for product liability claims has increased. AI’s ability to act autonomously raises new legal questions regarding claims for personal injury and property damage.

Product liability law is largely based on common law and state statutory principles. Claims of negligence, breach of warranty and strict liability constitute the traditional theories of product liability. These traditional theories of accountability also apply in the context of AI.

Negligence claims impose liability on the defendant for failing to meet a standard of reasonable care. This may be because the product was negligently designed or contained inadequate warning labels.

The breach of warranty rights is based on the contractual relationship between the plaintiff and the defendant (the seller of the product). Plaintiff may allege breach of an express warranty or an implied warranty. An implied warranty can take two forms: for the merchantability of the product or for the fitness of the product for a particular purpose.

Finally, strict liability is a standard under which a manufacturer or seller of a product is held liable for bodily injury or property damage, regardless of the level of care exercised.

AI and a bus crash

The application of these product liability principles in the context of AI was highlighted in the recent case Cruz v. Raymond Talmadge d/b/a Calvary Coach. The case featured an AI-based product that has become part of our daily lives: a GPS device. In this case, the plaintiffs were injured when a bus hit an overpass. The plaintiffs’ lawsuit rested on allegations of negligence, breach of warranty and strict liability against the manufacturer of the GPS device. In particular, the plaintiffs pointed to what they characterized as a design flaw in the GPS device. He drove the bus driver under an overpass. The plaintiffs claimed that the GPS device should have been able to discern that the overpass was too low for the bus. The parties eventually reached an agreement.

AI and data privacy

AI technology has created a host of issues related to data privacy and automated decision making. Data protection laws vary around the world. In the United States, laws governing the use of personal data in automated decision-making vary from jurisdiction to jurisdiction. In Europe, the EU General Data Protection Regulationor GDPR, provides a uniform standard.

Despite the differences between the legal regimes, a few underlying principles inform general thinking on these issues. These core principles include the principle of fairness, the principle of purpose specification, and the principle of data minimization.

The principle of fairness requires organizations to treat personal information fairly. This means implementing transparent measures to use personal information within the reasonable expectations of individuals and to mitigate the risk of discriminatory applications.

The principle of purpose specification requires that organizations collect personal information only for specific and defined purposes. This can be difficult to implement in practice because organizations often cannot predict what the algorithms will learn or the correlations the algorithms will make with data sets. This can lead the algorithms to use the data in unintended ways.

The Data Minimization Principle requires organizations to minimize the time they store data and limit the use of data to fulfilling stated processing purposes. This can be difficult to implement in practice, as AI technology tends to perform better with larger datasets.

AI technology and intellectual property issues

AI technology touches on issues of patent law, copyright and trade secrets. The technology is patentable through the designation of class 706 (Data processing: artificial intelligence) in the patent classification system of the US Patent and Trademark Office. Source code and visual elements of AI systems may be protected by copyright law. Finally, trade secret protection can be a useful form of intellectual property protection for AI-related technologies and can apply to algorithms, source code, and AI training datasets.

Dell bolsters its storage lineup with 500 software upgrades


Dell will implement a range of new features for its storage platforms aimed at “cloudifying” its systems and improving support for hybrid environments, the company announced this week at its annual Dell Technologies World event in Las. Vegas.

Dell touted more than 500 software advancements in three key platforms: PowerStore storage appliances, PowerMax mission-critical storage, and PowerFlex software-defined storage framework. Major PowerStore updates are improved support for native file replication, third-party file monitoring and ransomware protection, as well as improved networking speeds, NVMe support and deeper integration for VMware vSphere Virtual Volumes (vVols) virtualized SAN/NAS arrays and disaster recovery. .

PowerMax gets new features like multi-array smart provisioning, new workload optimization, and the ability to quickly move data snapshots to and from public cloud services for backup and recovery. Finally, PowerFlex’s existing integrations with cloud and container orchestration will be expanded, allowing customers to consolidate physical storage with the cloud into a single logical framework.

Dell also announced a new collaboration with cloud data analytics company Snowflake, with the aim of allowing data stored in Dell’s enterprise storage family to be processed in the Snowflake cloud without raising security concerns. data sovereignty.

Sid Nag, vice president of technology and service providers at a research company Gartner, said the multiple updates all point to tighter integration of cloud and on-premises storage, and that customers in heavily regulated industries, like healthcare and finance, are most likely to be interested in the news. features. The cloud has long posed data sovereignty and governance issues for industries subject to tight regulations; HIPAA and Sarbanes-Oxley are two of the main laws limiting cloud usage.

“What they basically did was take things out of storage and try to ‘cloudify’ them, for lack of a better term,” Nag said. “If I have a workload that requires me to leverage analytics, but the data can’t flow through the cloud, they partner with Snowflake and the analytics engine runs in the cloud. cloud, but the data itself is in a domain on the premises.”

The new storage technology is also thematically tied to Dell’s centralization around its Apex line of solutions as a service, Nag added. The unification of different types of data storage in a smaller number of frames follows the pattern.

“Apex is the big aha that Dell has been pushing for a year now – taking all of their solutions and delivering them in a cloud-like consumer model.”

Join the Network World communities on Facebook and LinkedIn to comment on topics that matter to you.

Copyright © 2022 IDG Communications, Inc.

GARO signs a framework agreement with a global car manufacturer regarding charging infrastructure for the European market


GARO E-mobility AB signed a framework agreement with a global heavy vehicle manufacturer for the supply of destination chargers to the European market. The demand for transport continues to increase and the initiative to offer sustainable transport in the distribution of goods, and thus contribute to reducing the climate impact in the transport sector, is something that GARO welcomes.

The products that will be supplied under the framework agreement are wall boxes with a capacity suitable for heavy-duty electric vehicles. The wall box can then be installed at the end user and at the vehicle manufacturer’s own premises. The first deliveries under the agreement are expected during the third quarter of 2022. Thereafter, orders will be placed on a rolling basis and the agreement does not guarantee any volume.

“The transition to fossil-free transport is essential to achieve the UN SDGs. We are proud and satisfied that a major car manufacturer has chosen us as their partner to extend the charging infrastructure in Europe in the transport sector. Close collaboration with manufacturers of electric-powered heavy-duty vehicles enables us to jointly develop and drive the fossil fuel-free transport of the future,” says Niklas Rönnäng, Business Line Manager of GARO E-mobility.

For more information please contact: patrick anderssonCEO GARO Group: +46 76 148 44 44
Niklas Rönnäng, Business Area Director GARO E-mobility: +46 70 698 09 05

GARO AB (pbl) Corp. Reg. N° 556071-7772 is a company that develops, manufactures and markets under its own brand innovative products and systems for the electrical installation market. GAROThe customer offering of consists of providing complete solutions in the areas of electrical distribution products, e-mobility, project activities and temporary power with a focus on electrical safety, user-friendliness and durability. GARO was founded in 1939, is headquartered in Gnosjö and is today an international company with operations in six countries with approximately 500 employees. The company’s production units in Sweden are located in Gnosjö and Värnamo, as well as in Szczecin, Poland. GARO is listed on Nasdaq Stockholm under the symbol name GARO. For more information see www.garo.se



(c) Decision 2022. All rights reserved., sources Press Releases – English

Bank of America analysts cut S&P 500 projection as ‘specter of recession’ looms


The S&P 500 just suffered its worst April performance since 1970, plunging into its second correction of the year – now many pundits are lowering their projection for the index this year.

Bank of America analysts led by Savita Subramanian cut their year-end outlook for the S&P 500 by 100 points to 4,500, which would mark a drop of more than 6% from the start of 2022. In April, the benchmark S&P index fell about 8.8%. . It’s down about 13.48% so far this year, indicating the market has priced in about a third of the chance of a recession, BofA analysts said.


“The specter of a recession looms,” Subramanian wrote. “And so we’re moving from underweight to overweight defensive, torque-generating consumer staples.”

Actions in this article


+201.38 (+1.63%)

Several threats to the outlook include deteriorating economic growth in China, the Russian invasion of Ukraine on Feb. 24, and an increasingly hawkish Federal Reserve seeking to aggressively tighten monetary policy to rein in the economy. inflation.

Night view of the Bank of America Tower logo. It is an American multinational banking and financial services company. (Roberto Machado Noa/LightRocket via Getty Images/Getty Images)

“All of this against the backdrop of a cyclical peak in the S&P 500 EPS in the face of secular margin pressure (de-globalization), still-high valuations and a Fed cut still in play,” Subramanian said.

The note comes amid growing fears of a Fed-triggered economic recession on Wall Street as it seeks to tackle inflation, which is at its highest level since December 1981. Policymakers raised interest rates a quarter of a percentage point in March and have since signaled that larger half-point increases are likely in the coming months, starting in May.

“It is appropriate to go a little faster,” said the Fed chairman Jerome Powell said last month during a panel discussion at the spring meetings of the International Monetary Fund and the World Bank. “I also think there’s something to the idea of ​​front-loading whatever accommodation one feels is appropriate. So that indicates 50 basis points are on the table.”

Traders are now pricing in a 100% chance of at least a half-point rate hike when policymakers meet this week. It would be the first time since 2000 that the US central bank would raise the federal funds rate by 50 basis points.

Growth in the US economy is likely to slow at the end of 2020, but a growing number of economists expect it to return to pre-pandemic strength by the second half of next year. (AP Photo/Mark Lennihan/AP Newsroom)

Some economists believe the Fed has waited too long to deal with soaring inflation, while others have expressed concern that moving too quickly to stabilize prices risks triggering an economic recession. Rising interest rates tend to create higher rates on consumer and business loans, which slows down the economy by forcing employers to cut spending.

Powell brushed off fears that further central bank tightening could trigger a recession and maintained optimism that the Fed can strike a delicate balance between controlling inflation without crushing the economy.


Still, he acknowledged the difficulty of the task at hand and said it was “absolutely essential” for central bankers to restore price stability.

“Our goal is to use our tools to get demand and supply in sync, so that inflation gets back in place, without a slowdown that equates to a recession,” Powell said. “I don’t think you’ll hear anyone at the Fed say it’s simple and straightforward. It’s going to be tough.”

Spring4Shell marks the end of ‘Snooze Button’ security


While Spring4Shell may appear to be a replay of the initial Log4j alarm, what it actually signals is the changing cadence in the frequency of zero-day attacks.

Combining an easily exploitable zero-day RCE into a ubiquitous product is usually not a common event let alone a back-to-back event like Log4Shell and Spring4Shell. While the threat of these vulnerabilities themselves grab our attention, the most alarming part might be the timing and suggestion that the frequency of these types of threats is accelerating.

As open source code continues to play a central role in the technology stacks of so many organizations, we must consider the importance of proactive security as vulnerabilities become more prevalent. Zero-day attacks are increasingly common, and the proportion of those used by cybercriminals for the lucrative ransomware industry is growth.

Despite this continuing pattern of similar alarms, security guards continue to press the snooze button. But if this rhythm continues, it will be more and more difficult to ignore it; leaders will begin to push to prioritize security in development. Coupled with Log4j, Spring4Shell offers us some key lessons to ensure that organizations use the best security practices:

Security Debt Can Leave You Bankrupt

The large amount of security debt (technical debt specific to known infrastructure or software vulnerabilities) that exists in most organizations helps to illustrate the main gap between the perceived risk and the budget allocated to application security. Developers, in general, are saddled with far more technical debt than anyone has the bandwidth to deal with. But those who don’t regularly manage it, including the open source components and all their dependencies, put their entire organization at risk, especially when it comes to security.

As businesses grow, these debts accumulate and accrue interest in the same way as financial debt, in the form of fixes or piecemeal workarounds. Startups start with zero technical (or security) debt, and their goal is to focus on creating a valuable and manageable product. Large organizations have legacy code that is no longer state-of-the-art technology, and on top of that, over time they struggle with additional workarounds that mitigated past issues. Technical debt isn’t always a critical issue requiring a team’s full attention, but organizations need to address it continuously and consistently. The optimal amount of investment to address it over time depends on many factors, the most important being the stage of the business.

Given the degradation of code quality and the accumulation of technical debt over time, early-stage companies should estimate an investment of around 10% of the developers’ time to settle this debt, if not more. For later-stage companies, this can be between 15% and 30%.

Holistic visibility helps teams move quickly when it matters most

Even months later, Log4j still demonstrates how difficult it can be to access critical information by examining everything – custom code, open source, containers, etc. Since the vulnerability affects so indirectly, some organizations are still scrambling to approach it as attackers. finding new ways to take advantage of vulnerability. Rapid response to security issues is essential, whether for customer demand or legal requirements, as in the example of Equifax.

Once you are alerted to a critical vulnerability in your product or zero day, a countdown begins – you can compare this to a fire breaking out in your office. This metaphor may seem over the top, but the emotions and stress involved may seem similar and the result can be just as devastating to an organization.

We couldn’t imagine an office that doesn’t have fire safety, training and drill plans. Just as we need to know the location of exits in an emergency, developer teams need an overview of all code. This is especially important for those who work for medium-sized companies and large enterprises using large amounts of content from different providers.

While this helps us understand the importance of developing incident response plans for the next emerging security hazard, organizations must also proactively prevent them. One way to do this is to detect threats before they happen by designating a zero-day team or task force. It’s almost a guarantee that you’ll find vulnerabilities when you look for them. While not always urgent, organizations need to be prepared as malicious actors are constantly looking for loopholes to exploit for financial gain as the business grows.

Zero-day attacks counted less than half a percent of all vulnerabilities over the past decade, with 99% of exploited vulnerabilities already known to IT teams, according to Gartner estimates. The changing cadence of zero-day attacks, however, warrants proactive and reactive vulnerability patching work, i.e. resolving technical and security debt in addition to developing a mitigation plan. action in case of vulnerability.

Native tools help thwart potential attacks

The patching and remediation process is complicated, and especially with the attacks we’ve seen recently, there is no one-size-fits-all approach to patching these vulnerabilities. Some experts say that new problems will continue to appear for years.

But not all developers can be expected to have deep security expertise. A native remediation approach for developers should offer a solution to deal with these vulnerabilities analogous to a pull request.

There is a future where developers can deal with vulnerabilities as easily as general code quality control fixes; most vulnerabilities can be attributed to user input that was not properly filtered. If a developer can be guided to these ambiguous points or, even better, alerted when such remediation is missing or improperly implemented, we can eliminate the creation of vulnerable code.

Meanwhile, organizations suffer from a lack of knowledge about where these issues may be hiding, leaving them vulnerable to attack. As these more malicious targeted attacks occur more frequently in the open source community, the best-prepared companies have the most visibility into their code. If Log4j showed us how pervasive certain vulnerabilities can be in organizations’ supply chains, Spring4Shell illustrates why back-to-back attacks are a “call to action” for organizations to revise how they prioritize best practices. of security.

Indy Autonomous Challenge race car sets new world land speed record


The Indy Autonomous Challenge (IAC) race car set a new world land speed record of 192.2 mph (309.3 km/h) over 1,000 meters (0.62 miles). Developed by the PoliMOVE team from Politecnico di Milano (Italy) and the University of Alabama (USA), the self-driving race car hit the track on a space shuttle landing strip at the Space Center NASA historical Kennedy.

Harnessing the Dallara AV-21, the PoliMOVE team set out to push the boundaries of a boosted engine package in trials. The upgraded engine assembly, capable of delivering 30% more power than previous models, will be on all IAC race cars in the future.

“Congratulations to the PoliMOVE team for making the Dallara AV-21 the fastest autonomous racing car in the world”, said Andrea Pontremoli, CEO and Managing Director of Dallara. “This record-breaking race sets a new bar for the top speed capabilities of autonomous competition vehicles, and we are excited to be a part of that future. Dallara is also very proud to partner with leading software and engineering industries in collaboration with the world’s top universities to contribute to the development of fully autonomous transport.

The Dallara AV-21 Race Car features hardware and controls that enable automation. This includes three Luminar Hydra LiDARs, optical cameras, sensors, autonomous actuators, plus additional batteries needed to power additional wiring and sensors.

IAC strives to establish a hub for performance automation in the state and harnesses the power of competition by prize to attract the best and brightest minds from around the world to advance the technology of state-of-the-art in terms of safety and performance. automated vehicles. The IAC competition has certainly generated a lot of interest around the world, with 41 university teams already entered.

IAC’s primary goal is to solve real-world problems by advancing technology that will accelerate the commercialization of fully autonomous vehicles and the deployment of advanced driver assistance systems (ADAS). Pushing the boundaries for the entire autonomous community and helping to increase safety and performance is of crucial importance, not only in motorsport, but in all modes of commercial transport.

Teacher. Sergio Savaresi, team leader of the Politecnico di Milano mentioned, “We were using a car that runs purely on algorithms, where precision is paramount, and any small error in prediction could have created a completely different result. This test has been exhilarating and we are delighted with the world record, but we are also delighted that this data will be made available to all and that the industry will benefit from our work and learnings.

“How MSMEs can put in place an enterprise risk management framework to identify, assess and manage business uncertainties”


By Hersh Shah

Ease of doing business for MSMEs: The MSME (micro, small and medium-sized enterprises) sector forms the backbone of India’s economy, providing employment to around 120 million people and accounting for 45% of overall exports. With 20% of these businesses based in rural India, it is also considered a major driver of rural entrepreneurship and economic inclusiveness. The MSME sector is characterized by limited resources, which also makes them vulnerable to risks such as those arising from cyber attacks, shortage of liquidity, lack of succession planning and poor reputation management.

It is essential to understand here that risk is an inevitable part of a business. It is the flip side of every opportunity a business must seize to grow and expand. Ignoring risk management can lead to disastrous consequences, threatening business continuity. ERM offers a holistic approach to managing risk within an organization, enabling companies to identify, assess and manage a wide range of uncertainties. Thus, it helps companies to strengthen their resilience against emerging threats and to develop agility to adapt quickly to an unexpected event, such as the Covid pandemic.

Although SEBI mandates the appointment of risk management committees for the top 1,000 publicly traded companies, there are no guidelines in effect with respect to smaller companies. With limited resources at their disposal, many small businesses may find setting up risk management committees an unnecessary burden. However, this is a short-sighted approach, which leaves them vulnerable to risk and ill-prepared to deal with the challenges that may arise in pursuit of their business goals. On the other hand, adopting ERM can improve their chances of raising capital, as banks and investors are more likely to prefer organizations that have a strong ERM framework. To set up the ERM, small businesses can start with the following steps:

Develop a culture of risk: Risk culture refers to the values, attitudes and behavior of employees and teams within the organization that determine its ability to manage risk. It is the responsibility of the board of directors and its senior management to set the tone by promoting positive behavior and enforcing corporate governance. Establishing clear risk ownership through a well-planned reporting structure will facilitate the timely identification and deployment of risk management policies. However, a culture of risk can only be successful if it is aligned with organizational culture and people management.

Developing risk appetite: Risk appetite is the amount of risk a company can bear in pursuit of its organizational goals. Developing organizational risk appetite is one of the fundamental considerations of ERM, helping companies recognize their risk tolerance, which is the degree of uncertainty an organization is willing to bear. Identifying risk appetite and risk tolerance allows the organization to put triggers in place when these thresholds are crossed, ensuring that risk mitigation tactics are deployed on time.

Subscribe now to the Financial Express SME newsletter: your weekly dose of news, views and updates from the world of micro, small and medium enterprises

Develop a risk escalation matrix: While it is senior management that is responsible for planning risk management policies, it is usually employees in the field or project managers who are usually the first to spot emerging threats. In such cases, an escalation matrix helps managers effectively and quickly communicate these events to upper management. The matrix facilitates the identification of risks in a timely manner and ensures that there is an established procedure to escalate or gradually increase the intensity of the alert if the threat is not addressed in time.

Identify risk champions: Risk Champions are risk-smart professionals in each department who are responsible for periodic risk reporting and implementation of risk management policies. In the absence of such professionals, companies can take the initiative to recruit selective employees from each department to pursue global ERM qualifications or exams. They can encourage these qualifications by making them mandatory for certain positions. Each company should also have a risk expert or risk manager to oversee the overall implementation.

Periodic review: The effectiveness of ERM implementation depends on its periodic review. An organization’s risk appetite can change over time, and it is important to monitor changes in its tolerance to different threats when formulating ERM strategies. These reviews are also essential for keeping track of emerging uncertainties in the field and for evaluating the performance of the internal risk management team, which determines the organization’s response. A comprehensive review will highlight any gaps in ERM implementation, allowing management to correct the company’s course of action.

For many businesses, the pandemic was an event that exposed their lack of risk preparedness, and many small businesses were shut down as well. The economic turmoil of the past two years, driven by the need for rapid digitization, the adoption of remote/hybrid work models and compounded by risks such as climate change, further underscores the need to remain vigilant and proactive to respond to uncertainties and threats. Family businesses and startups have also begun to realize the importance of ERM and the need for entrepreneurs to upskill with ERM qualifications. ERM not only helps small businesses build much-needed resilience, but it also improves the chances of success as they pursue new growth opportunities.

Hersh Shah is CEO of the Institute of Risk Management (IRM), India Affiliate. The opinions expressed are those of the author.

“Yo-Yo” DDoS cyber-attacks; What They Are and How You Can Beat Them


Typically, DDoS (Distributed Denial of Service) attacks use massive traffic such as HTTP, DNS, TCP, and other methods to allow attackers to disrupt even the best-protected networks or servers. But Yo-Yo DDoS is a totally different animal.

They are a much more innovative way to attack public cloud infrastructure resources. In today’s cloud architecture, almost any resource can scale quickly. These can be nodes, Kubernetes pods, load balancers, etc. You have unlimited resources when it comes to scaling in the public cloud. Cyber ​​attackers use these cloud autoscaling capabilities against you and harm you financially. It could literally destroy small organizations that have limited cloud budgets. This article will shed more light on these types of attacks to help you increase your cyber preparedness.

This is a simulation of its appearance:

A simulation of the appearance of a Yo-Yo attack

How Do Yo-Yo Attacks Work?

Yo-Yo DDoS attacks can be difficult to identify because these attacks are brief and do not necessarily result in denial of service (DOS) conditions. In a yo-yo attack, attackers flood their targets with so much traffic that it automatically scales cloud resources such as load balancers, front-end services, and other cloud resources. Then they suddenly stop the traffic so the app is over-provisioned and automatically throttles down again. Once the autoscaler decides that the traffic volume has decreased, it reduces its resources. The attacker re-enables the DDoS traffic and the cycle repeats, hence the name Yo-Yo attack.

Constant scaling can be a financial drain on app owners, who have to pay hyperscalers a lot of money. In some cases, this behavior may be difficult or impossible to differentiate from legitimate requests. Unlike other forms of DDoS attacks, Yo-Yos do not have a centralized source – they often come from many different machines on the Internet.

How to Protect Yourself From Yo-Yo Attacks

You should control your cloud scaling behavior by setting limits for each cloud resource you scale to avoid large financial outlays. If you don’t set a maximum scaling limit, you risk wasting a lot of cloud computing resources and cloud-native services. Monitor your compute autoscaling groups and use anomaly detection to automatically recognize unusual scaling patterns. You can then create alerts for unusual scaling patterns and further investigate your infrastructure scaling and spending.

Although difficult to detect, ‘yo-yo’ attacks can be mitigated by hiding the traffic scaling configuration. Attackers need to know how much scaling has taken place to stop the DDoS attack and possibly reactivate it once traffic reaches a pre-determined average level. If the website or service owner can hide scaling information, it would help mitigate any preparations attackers could have made before launching the attack.

To improve the security of your cloud against such attacks, it’s worth exploring third-party solutions from specialist security companies such as AWS Shield and Google Armor that can help you mitigate complex attacks. These are cloud-native Hyperscalers security services, but you can choose third-party solutions such as Cloudflare or Incapsula.

Another way to mitigate Yo-Yo DDoS attacks is to not use the default values ​​for scaling and scaling with respect to the service provider’s load balancing mechanism cloud. It also disrupts any plan the attackers might have made for when to stop sending additional unwanted traffic and when to start again.

General tips to guard against DDoS attacks include updating the entire system. Fix all security issues and bugs and quickly develop a plan to identify these issues. It’s also important to point out that “Yo-Yo” DDoS attacks are a relatively recent development and mitigation is generally only available on the best web security platforms. For example, the native security tools included in leading cloud platforms are usually not sufficient to defeat these attacks.

Some of the more common Yo-Yo fading techniques include:

  • Use a cloud-based DDoS protection service such as AWS Shield, Google Cloud Armor, Cloudflare, etc…
  • Using a Content Delivery Network (CDN) such as AWS CloudFront, Google CDN, Cloudflare CDN, etc…
  • Deploying a Web Application Firewall (WAF) such as Imperva, F5, and Palo Alto WAAS or using Hyperscalers Cloud Native WAF services is not the best solution. Still, they’re pretty good if you’re on a budget.
  • Use of hyperscaler security best practices – each hyperscaler has its security methods and techniques.
  • Use a defense-in-depth approach
  • Review your application/security logs constantly
  • Avoid default configurations in terms of scaling

Points to remember to defend against Yo-Yo DDoS cyberattacks

  • Use a DDoS protection service.
  • Improve your network infrastructure.
  • Use a cloud-based DDoS mitigation service.
  • Use a DDoS-protected DNS service.
  • Use a CDN service protected by DDoS.
  • Use a DDoS-protected web application firewall.
  • Use a DDoS-protected service.
  • Implement microservices security solutions

DDos and Yo-Yo DDoS attacks happen all the time, and the attacks are becoming more innovative and frequent. In general, Yo-Yo DDoS attacks are intended to harm companies and countries financially.

From the Checkpoint online attack website

Ultimately, the best way to beat a Yo-Yo DDoS attack is to stay alert. You don’t want to be the next victim of such an attack. To make sure this doesn’t happen, use multiple layers of defense against attacks, keep your systems up to date, and stay aware of threats.

Written by Ido Vapner, CTO and Chief Architect at Kyndryl

If Earth is destroyed by an asteroid strike, THIS HUMAN SEED bank is there for us


This startup has a plan to jump-start human civilization in case an asteroid strike destroys Earth. And how does it work ? Using a human seed bank and relying on a little ALIEN magic.

Over the years, scientists have come up with various ways to combat an asteroid impact situation. From NASA working on firing nuclear weapons to destroy asteroids to China’s plans to redirect an asteroid using rocket boosters, many solutions are being worked on. But the solution this US-based entrepreneur came up with has to be one of the most innovative and possibly wackiest ideas of all time. Ben Haldeman is the founder of a startup called Lifeship which has only one mission. Create a human seed bank. In other words, it collects and stores human DNA. Where? Of all places, the DNA bank will be on the Moon! This will help kick-start human civilization in the event that Earth is wiped out by an asteroid.

Even after an asteroid strike, the human seed bank will save humanity

Lifeship was founded in 2019 by Haldeman with the goal of creating a human repository in space. The company offers people to send their DNA in the form of saliva and it takes the sample to the Moon. So, for up to $99, you can have a one-way ticket to the Moon and then stay there forever. The idea was new. From a scientific perspective, this means that human data, the core of human existence, could forever be preserved and disseminated to various parts of the solar system and perhaps beyond.

Read also : Are you looking for a smart phone? To check the mobile locator, click here.

From the customer’s perspective, it has a certain sentimental appeal. One of the testimonials on the platform reads: “So when people see the Moon, I will be there. Especially for my daughters, so that my light can always guide them even in the dark of night But apart from these reasons, this human seed bank business also offers a means for the survival of humanity if there were an asteroid strike on Earth.

This effort would take a little more effort and a little extraterrestrial magic, but that’s the amount of faith you need when you’re ready to send your DNA sample into space. The idea is that, if human DNA survives in space, at some point an alien species may encounter it and try to resurrect the human species using our source code.

So far, Lifeship hasn’t carried its first payload into space, but its Moon 1 mission is expected to lift off in mid-2022. The website says boarding is closed for this mission, implying that no further DNA samples will be considered for this trip. . However, they are inviting more samples for a second moon mission later this year. The startup uses SpaceX launch vehicles and lunar landers to deploy its shipment.

Automotive Engine Valves Market Size, Outlook and Forecast


New Jersey, United States – the automotive engine valves market The research report offers comprehensive coverage of the Automotive Engine Valves Market over the forecast period 2022-2029. It provides historical, current and future market trends to help develop a robust market strategy. Additionally, it provides analysis of the value chain, key drivers, and challenges, and includes upcoming opportunities in the Automotive Engine Valves market that will enable the business success.

Automotive Engine Valves Market report provides detailed analysis of global market size, regional and country level market size, segmentation market growth, market share, competitive landscape, sales analysis, impact of national and global market players, value chain optimization, trade. regulations, recent developments, opportunity analysis, strategic market growth analysis, product launches, regional market expansion and technological innovations.

Get Sample Full PDF Copy of Report: (Including Full TOC, List of Tables & Figures, Chart) @ https://www.verifiedmarketreports.com/download-sample/?rid=41620

Key Players Mentioned in the Automotive Engine Valves Market Research Report:

Tenneco (Federal-Mogul), Eaton, Mahle, Fuji Oozx, Worldwide Auto, Asian, Rane, Dengyun Auto-parts, ShengChi, Xin Yue, Yangzhou Guanghui, Nittan, Wode Valve, AnFu, JinQingLong, Tyen Machinery, Burg, SSV, Ferrea, Tongcheng, SINUS

This comprehensive Automotive Engine Valves Market report helps to determine the gaps and issues faced by the dominating or new companies. It also provides information about the potential impact of the existing COVID-19 on the market scenario. Automotive Engine Valves market is split by Type and by Application. For the period 2018-2027, the growth between segments provides accurate calculations and forecasts of sales by type and application in terms of volume and value. This analysis can help you grow your business by targeting qualified niche markets.

Automotive Engine Valves Market Segmentation:

By Product Type, the market is primarily split into:

• Gasoline engine valve
• Diesel engine valve

By application, this report covers the following segments:

• Tourism vehicle
• Commercial vehicle

Get a discount on the purchase of this report @ https://www.verifiedmarketreports.com/ask-for-discount/?rid=41620

Scope of Automotive Engine Valves Market Report

UNITY Value (million USD/billion)
SECTORS COVERED Types, applications, end users, and more.
REPORT COVER Revenue Forecast, Business Ranking, Competitive Landscape, Growth Factors and Trends
BY REGION North America, Europe, Asia-Pacific, Latin America, Middle East and Africa
CUSTOMIZATION SCOPE Free report customization (equivalent to up to 4 analyst business days) with purchase. Added or changed country, region and segment scope.

Geographic segment covered in the report:

The Automotive Engine Valve report provides information about the scope of the market, which is segmented into sub-regions and countries/regions. In addition to the market share in each country and sub-region, this chapter of this report also contains information on profit opportunities. This chapter of the report mentions the market share and growth rate of each region, country and sub-region over the estimated period.

• North America (USA and Canada)
• Europe (UK, Germany, France and rest of Europe)
• Asia-Pacific (China, Japan, India and the rest of the Asia-Pacific region)
• Latin America (Brazil, Mexico and rest of Latin America)
• Middle East and Africa (GCC and Rest of Middle East and Africa)

Key questions answered in this Automotive Engine Valve Market report

  1. How much revenue will the Automotive Engine Valve Market generate by the end of the forecast period?
  2. Which market segment is expected to have the maximum market share?
  3. What are the influencing factors and their impact on the Automotive Engine Valve market?
  4. Which regions are currently contributing the maximum share of the global Automotive Engine Valve market?
  5. Which indicators are likely to drive the Automotive Engine Valve market?
  6. What are the key strategies of Automotive Engine Valve market leading players to expand their geographical presence?
  7. What are the key advancements of the Automotive Engine Valve market?
  8. How are regulatory standards affecting the automotive engine valve market?

For more information or query or customization before buying, visit @ https://www.verifiedmarketreports.com/product/global-automotive-engine-valve-market-2019-by-manufacturers-regions-type-and-application-forecast-to-2024/

Visualize Automotive Engine Valves Market Using Verified Market Intelligence:-

Verified Market Intelligence is our BI platform for market narrative storytelling. VMI offers in-depth forecast trends and accurate insights on over 20,000 emerging and niche markets, helping you make critical revenue-impacting decisions for a bright future.

VMI provides a global overview and competitive landscape with respect to region, country and segment, as well as key players in your market. Present your market report and results with an integrated presentation function that saves you more than 70% of your time and resources for presentations to investors, sales and marketing, R&D and product development. products. VMI enables data delivery in Excel and interactive PDF formats with over 15+ key market indicators for your market.

Visualize the automotive engine valve market using [email protected] https://www.verifiedmarketresearch.com/vmintelligence/

Most Popular Reports

Global Automotive Injection Nozzle Market Size and Forecast

Global Automotive Gear Reducer Market Size and Forecast

Global Commercial Vehicle Urea Tank Market Size and Forecast

Global Diesel Car Market Size and Forecast

Global Articulated Dump Trucks Market Size and Forecast

Global Aircraft Tires Market Size and Forecast

Global Suspension Springs Market Size and Forecast

Global Airbag Market Size and Forecast

Global Electro-Hydraulic Servo Valves Market Size and Forecast

Global Automotive Engine Valves Market Size and Forecast

About Us: Verified Market Reports

Verified Market Reports is a leading global research and advisory company serving over 5000 global clients. We provide advanced analytical research solutions while delivering information-enriched research studies.

We also provide insight into the strategic and growth analytics and data needed to achieve business goals and critical revenue decisions.

Our 250 analysts and SMEs offer a high level of expertise in data collection and governance using industry techniques to collect and analyze data on over 25,000 high impact and niche markets. Our analysts are trained to combine modern data collection techniques, superior research methodology, expertise and years of collective experience to produce informative and accurate research.

Our research spans a multitude of industries, including energy, technology, manufacturing and construction, chemicals and materials, food and beverage, and more. Having served many Fortune 2000 organizations, we bring a wealth of reliable experience that covers all kinds of research needs.

Contact us:

Mr. Edwyne Fernandes

USA: +1 (650)-781-4080
UK: +44 (753)-715-0008
APAC: +61 (488)-85-9400
US toll free: +1 (800)-782-1768

E-mail: [email protected]

Website: – https://www.verifiedmarketreports.com/

European Parliament committee backs extension of COVID certificate framework for another year


The European Parliament’s Civil Liberties Committee (LIBE) has backed a European Commission proposal to extend the EU’s Digital COVID-19 Certificate (DCC) scheme for another year until June 2023.

In a meeting held on Thursday, April 28, the Committee backed the proposal with 48 votes in favor, 16 against and no abstentions, in a bid to ensure that citizens of the bloc continue to benefit from their right to free movement despite the evolution of the pandemic.

Commenting on the issue, MEP Juan Fernando López Aguilar, who led the drafting of the report on the framework presented to the committee, said the certificate had allowed the creation of unilateral national restrictions without jeopardizing the right to free movement. and equality of EU citizens. .

We wanted to prevent discrimination between countries of origin and we wanted this settlement to be time-limited. However, we can only get rid of it once the pandemic is over. As it is not over yet, we are extending the validity of the scheme and asking experts to assess the situation in six months“, she said, saying that since people are traveling freely again, it means that the regulations are working effectively.

In endorsing the proposal, the LIBE committee also supported the changes proposed by the Commission, which include granting recovery certificates to travelers who tested negative with rapid antigen tests, which was not possible before.

At Thursday’s meeting, however, the committee decided to make a request to the Commission, asking it to review the scheme after six months and terminate it if it is no longer deemed necessary.

MEPs want to shorten the period of application of the regulation as soon as the epidemiological situation allows it“, notes the press release.

At the same time, MEPs called on EU countries to refrain from imposing COVID-19 restrictions this summer unless absolutely necessary, and even then in line with scientific advice from the European Center for Disease Prevention and Control and EU Health Security. Committee.

Last March, the European Commission had also adopted an EU mechanism that allows member states to cancel false or erroneous COVID digital certificates due to frequently detected COVID certificates to access areas that are only accessible with such a document or to travel .

On March 15, EU Justice Commissioner Didier Reynders revealed that by then more than 1.7 billion such certificates had been issued by countries within the framework.

Since the first certificates were issued by Member States in June 2021, until now, part of the framework for their issuance and verification are the 27 EU Member States and 35 third countries, namely the Albania, Andorra, Armenia, Benin, Cape Verde, El Salvador, Faroe Islands, Georgia, Israel, Iceland, Jordan, Lebanon, Liechtenstein, Moldova, Monaco, Montenegro, Morocco, New Zealand, North Macedonia, Norway, Panama, San Marino, Serbia, Singapore, Switzerland, Taiwan, Thailand, Tunisia, Togo, Turkey, Ukraine, United Arab Emirates, United Kingdom, Uruguay and the Vatican.

Manitou R7 Expert fork provides legit XC racing support [Review]

Manitou R7 Expert fork provides legit XC racing support [Review]

Pendulums suspended above mountain bike racing components can swing between moving poles, their energy always evolving towards speed and efficiency. In the pit under a 100-120mm travel fork pendulum, there are conflicting arguments between designing for comfort or all-out acceleration. Sometimes a short-travel squisher accommodates both of these perspectives, allowing riders to precisely choose how their bike’s front end behaves. The Manitou R7 Expert is one of those versatile sets of stanchions, with positive and negative air spring volume spacers to dial in the performance.

Test driver profile the size: 175cm (5’9″) mass: 65 kg (145 lbs) testing area: Bellingham, WA

Manitou R7 Expert Chassis

The front brake hose can be routed along the leading or trailing edge of the lower leg.

Two R7 models can be found in Manitou’s XC race segment and this lower cost Expert model sells for $819 (available at Worldwide Cyclery and Wiggle) while the Pro model bumps the price up to $980. Manitou says the Pro model is 165g lighter, thanks to higher-grade alloy stanchions and some damping differences. With the steerer cut, a bearing race and star nut installed, and some PNW mud stuck in the arch, the 29er R7 Expert fork with 120mm of travel weighs 1,861g.

Like most XC forks, the R7 models use 32mm stanchions that give the shortest lever just the right amount of flex and stiffness. I ran a 2.5-inch tire between the arch and couldn’t flex the tire in the lows no matter how hard I tried. With lighter and less stiff XC wheels it might have been a different story, but most XC racers are going to use narrower tires that leave more space between the aluminum tubes and the rubber tread, which which renders this point moot.

Beneath those uprights, Manitou’s well-known inverted arch would add 13 percent stiffness over a fork with similar intentions and a front arch. They report that the added stiffness comes from a shorter arch that allows for similar stiffness characteristics as a taller sanctioned model.

The big mud collector.

The downside to this inverted arch is that its rear landforms are filled with mud and it ends up weighing down the trail a lot more. There’s a “fender” to cover those bumps on the arch, and it’s about as useful as attaching a thin piece of milk carton to the fork. As with the Manitou Mezzer Pro we tested a while back, the fender sits too close to the tire, constantly rubbing on the 29×2.5″ tread to the point that I had to remove it, and the fender material is so brittle that when it’s not rubbing the knobs, it hits the tire with every impact.There isn’t enough space under the arch to mount a different fender, so if your trails work well in the mud you’ll need a downtube fender and/or big ass goggles Manitou says the fork should fit 29er up to 68 tires mm (2.6″) wide, but probably not with the fender installed.

I may be alone here, but I don’t get the benefits of the axle in this fork. Why add complexity to something that might otherwise be a super lightweight bolt and replaceable integral nut? Perhaps it is thought to provide a faster wheel swap mid-stroke? The Hexlock axle must be slid into a specific position, and it does not rotate in the fork. Instead, an integrated nut on the non-drive side rotates to pull it into a final resting position. This system works well, but it seems unnecessarily over-engineered. It also adds an extra spot on the bike where you can’t let dirt in. If you are repairing a front flat, you will need to get the axle and fork off the ground which could collect on the threads and cause problems. This is true for any axle, but with the closed end of this system you will need to be especially careful.

Manitou R7 Expert forks are available in 27.5″ or 29″ sizes, with 100 or 120mm of travel and all standard crown offsets. The brake caliper mount fits a 160mm rotor and the fork can run up to 203mm disc with an adapter.

Air Spring Considerations

Travel on the R7 models can be adjusted internally, and I found the service documentation on Manitou’s site easy to follow. Theoretically, you could mount the R7 on a 120mm trail bike and then swap it out to the XC race bike with 100mm in minutes. It’s not a job that every home mechanic has the time for, but the options are always great to have.

Expert models use a balancing valve to equalize the positive and negative chambers. Manitou says “This gives the spring rate a consistent feel without any flat or dead spots in the stroke, while giving riders of different weights the same initial stroke feel.” This system is quite common and results in an easily adjustable spring with only one chamber to deal with when setting sag and finding the amount of support you want.

In practice, the fork’s air spring is somewhat anemic out of the box, and riders looking for support will need to make a few simple adjustments. I had the fork pumped up near its maximum pressure, with the compression half closed, and I couldn’t get a glimpse of the level of support I would want for legitimate XC racing. This factor alone might warrant upgrading to the R7 Pro model which offers additional air spring and shock adjustability.

You can purchase the Incremental Volume Tuning Kit for an additional $55. This air spring comes stock on the Pro model, offering volume spacer swaps so you can dial in the progressiveness throughout the R7 stroke. The kit takes minutes to install and makes a huge difference in the way the fork works. This allowed for a much higher level of mid and final stroke and support that makes the R7 noticeably more racy. I’d be happy to line up for an XC race or hit some unsuitable, heavy trails on this fork after adding the kit.

The initial stroke with the IVA remains soft enough to hold traction as well as any competitive fork. With better seals and bushings, most forks seem to have settled the friction, leaving us with suspension that starts up smooth and creates solid grip. I felt no bushing play in the fork throughout testing, and the crown stays creak-free. These things have really improved over the past decade.

Shock Absorber Download

“We kind of use French” might have been a phrase overheard at Manitou’s office when they decided to call the R7’s shock “VTT,” or Variable Terrain Tune. The MTB offers a simple three-position compression lever with a fully open, firmer, fully locked-out setting. The lockout creates a stiff front end and the firm setting is perfect for rougher trails with bigger impacts in store. I found the open position a bit under-damped and opted not to use it much. The damper uses a pair of shim stacks which, according to Manitou, “By controlling the shim stack through which oil flow is diverted, we can manipulate the characteristic of the damper so that it is locked , digressive or progressive to meet the requirements of the pilot and the terrain.”

In terms of high- and low-speed compression, the R7 Expert setting is now the lighter side, and chances are the brand’s World Cup athletes won’t use this cleat setup. ‘origin. Again, the R7 Pro model comes with a more tunable shock on the compression side, allowing for high and low speed adjustment. The jump in this disc sings “just buy the Pro model”.

Regulating the return of the fork to full extension seems quite complicated, with a fairly wide range of usable adjustments. I like my hardtail fork pretty fast, and this one will get there. A massive face factory of the R7 Expert rebound is that there are no detents in the knob, leaving riders without an accurate way to judge where their rebound is from where it was. This element is a deciding factor for me, because I want to be able to compose my suspension and be able to compare it, and periodically check that it is in the correct position. If you’re comfortable with the ambiguity of the damping knob, this one should be fine.


The R7 Expert with an IVA air spring upgrade is a great fork at about the same price as a Fox Performance Elite model. If you’re looking for something a little different, he’ll definitely provide it. I would suggest upgrading to the Pro model for a lot more adjustability and support, unless your pendulum is definitely geared towards the comfort side. Edgar Allen Poe might be delighted that this fork looked dark and slightly offbeat, or perhaps he would be pissed that I ripped out one of his most famous works for this review’s narrative thread.

party towers

  • Excellent support with the air spring upgrade
  • Relatively light

Advantages and disadvantages of the Manitou R7 Expert fork.

dirty naps

  • Unusable wing
  • No detent on the rebound button

Twitter worries about employee sabotage site, locks down source code


Image Getty

  • Twitter allegedly blocked its developers from making changes, locking down its source code.
  • The company held a town hall meeting on Monday afternoon to address employee concerns about Elon Musk.
  • Read more news on Twitter here.

Following news and backlash from employees after accepting a $44 billion offer from Elon Musk to acquire the company, Twitter has reportedly locked down its source code to prevent unauthorized modifications.

Bloomberg reports that “Twitter will not allow product updates unless they are business critical.”

Product changes will require approval from a vice president, the people said. Twitter imposed the temporary ban to prevent employees who might be unhappy with the deal from “going rogue,” according to one of the people.

Elon Musk’s takeover of Twitter has yet to gain shareholder and regulatory approval, but many employees of the social media platform wonder what will happen if and when that day comes.

For example, Rumman Chowdhury, Director of Machine Learning Ethics, Transparency and Accountability at Twitter, tweeted tuesday“Aside from Elon, can someone explain to me how Twitter is going to hire/keep employees since there are no company actions to create competitive packages? An important part of our salary is in RSU.

This question and others are still relevant despite the fact that Twitter CEO Parag Agrawal and Chairman of the Board Bret Taylor held a town hall meeting Monday afternoon with employees.

Twitter reportedly concerned about employee revolt over Elon Musk acquisition

According to the audio of the call, as reported by CNN, Agrawal told Twitter employees “there are no layoff plans at this stage.”

However, he added some caveats.

“Between now and the shutdown…we will continue to make decisions as we always have, guided by the principles we have,” he said. “That doesn’t mean things won’t change, things have changed… I’ve talked about bringing about positive change in the business, and I will continue to do so because it makes us better and makes us stronger Once the deal is done, different decisions could be made.

Among the questions raised at the meeting were concerns about Twitter’s work in artificial intelligence and machine learning, whether the company will turn more to advertising, its views on freedom of expression, whether President Trump’s account will be reinstated and whether employees will at some point. be able to ask questions directly to Elon Musk.

“It is indeed a time of uncertainty,” Agrawal said at the meeting. “You all have different feelings and views on this news, a lot of you are worried, some of you are excited, a lot of people here are waiting to figure out how this is going and have an open mind. .. If we work with each other, we won’t have to worry about losing the heart of what makes Twitter powerful, which is that we all work together for the benefit of our customers every day. .

Listen to the full call below.

San Diego County supervisors approve first $16 million twin-engine helicopter to help fight wildfires


San Diego County Board of Supervisors voted unanimously on Tuesday to buy a twin-engine helicopter to help fight wildfires.

The decision of the supervisors will allow the Purchasing and Contracts Department director to negotiate a fair price for a Bell 412 EPX helicopter.

According to the information on the supervisors diary, the helicopter is estimated at 16 million dollars.

Board chairman Nathan Fletcher made the proposal and said getting the helicopter “has been a long-desired goal” as the region faces a higher risk of wildfires. . He also thanked the San Diego County Sheriff’s Department for its funding assistance.

Fletcher added that the county’s current fleet of single-engine helicopters can’t fly at night or carry that much water, but a twin-engine helicopter will solve those problems.

Currently, the county’s air fleet consists of single-engine helicopters with airframes from the 1960s and 1970s.

Supervisor Jim Desmond thanked Fletcher for presenting the proposal.

“You have to provide the best firefighting capability possible,” he said.

In a related action, supervisors also unanimously approved a roadside vegetation management and evacuation preparedness program, as well as a contract with Perimeter Solutions to supply a brand of fire retardant.

In a statement released after the vote, Fletcher said the plan continues the commitment “this Board of Supervisors made last year to ensure our county is ready to respond to wildfires and take action. preventive measures necessary to protect residents and their property. We will invest as necessary to keep San Diegans safe.

According to Fletcher’s office, a total of 79% of the county’s unincorporated area is designated as high or very high fire danger area.

Last year, supervisors approved the creation of an expanded roadside vegetation management program.

Officials from the county’s fire department and Department of Public Works then identified 200 miles of lanes of what are considered critical evacuation corridors, with unique entry and exit points that could benefit from additional management. roadside vegetation, according to Fletcher’s office.

City News Service contributed to this article.

The Fascinating History of the Alfa Romeo Iguana


Alfa Romeo (now a subsidiary of Stellantis) has been known for manufacturing Italian luxury automobiles since its founding as “Anonima Lombarda Fabbrica Automobili” in 1910. The company has built its brand to represent not only class and high of range. line of European cars, but also in the fields of endurance and touring car racing, where they hold numerous victories, championships and records.

During their lifetime, the company introduced many concepts, some of which were incredibly influential even without being put into production. One such concept was the Alfa Romeo Iguana. Created in 1969, the futuristic car was designed by Giorgetto Giugario of Italdesign and based on the Alfa Romeo 33 Stradale.

Although the Iguana never reached official production, its style was later incorporated into many Giugario models, including some very famous models. Alfa Romeo may have missed out on producing this beauty, but it helped set the tone for some of their championship-winning cars produced later.

Let’s take a closer look at the Alfa Romeo Iguana and its intriguing history!

RELATED: Battle Tested: The Alfa Romeo Matta Is a Lightweight All-Terrain Recon Vehicle

History of the Alfa Romeo Iguana

Although the Iguana never became a production car, even as a concept, it was incredibly influential and had a unique history and an intriguing effect on car designs to follow. Originally designed in 1969, it was the work of Giorgetto Guigario, who based the car on the road-ready version of the Alfa Romeo 33 Stradale Tipo 33/2.

The Iguana can lay claim to being the first of many historic designs to come from Guigiaro while working for the ItalDesign studio, which was just beginning to reveal itself at this time. Despite the Stradale’s entry into competition in 1967, and the car winning its first race and several to follow, it was never a popular car.

Although a series of 50 was planned, less than half were created and only eighteen were actually built. This left plenty of chassis to be used elsewhere, and Alfa Romeo determined that they could be put to better use if entrusted to some of the best-known Italian designers. One of them was the booming ItalDesign.

Guigiaro created the Iguana on this basic chassis and presented it at the Turin Motor Show in 1969.

The initial design called for the car to have a metallic gray body and brushed metal (stainless steel, specifically) roof frame and cabin pillars. The result was a sleek, futuristic look when combined with the Iguana’s sharp front and rear and aerodynamic body lines.

After several photo shoots and extensive showings, the car moved away from the concept model and was used as the base model for several other production cars.

RELATED: 10 Reasons You Should Choose An Alfa Romeo Giulia Over The Competition

Alfa Romeo Iguana specs and influences

The Iguana’s chassis (“borrowed” from the remains of the Stradale) was a tubular steel version, and the fuel tank was lined with rubber. The body was drafted in fiberglass and had a low-sloped front end and nose. The deeper windscreen and raised wheel cutouts were a new design that later made it into both the Maserati Bora and the Porsche Tapiro. The definition and elements of the rear were also used later in other cars designed by Guigiaro, such as the Alfetta GT.

The brushed stainless steel look on parts of the body was a design that Giugiaro later used on the popular DMC DeLorean, which suited the futuristic concept and coloring. The DeLorean was later used as a time machine in the Back to the future film series. Other Giugiaro creations in the 1970s also referenced this design, including the Maserati Merak. The Maserati Bora and Merak look enough like the original Iguana to be brighter-colored siblings. They featured similar design cues in the body, including the pinched nose and cut-out wheel space, and a very recognizable rear end.

The Iguana featured a 121.7 cubic inch aluminum V8 engine capable of developing up to 266.9 horsepower. However, in order to increase reliability, the final version was tuned to deliver only 230 horsepower at 8,000 rpm. The Iguana’s V8 was paired with a SPICA fuel injection system and a six-speed manual transmission with Colotti gearbox. It could reach speeds of up to 161.6 MPH.

Although it never reached production or was ever used in the long-standing racing heritage held by Alfa Romeo, the Iguana concept car left its mark on the history of company and in the car world by influencing many other car design elements. who made it to production and even to film during the era that followed. Without the Iguana, some iconic rides wouldn’t exist in the form they are known for today.

    Citroen GT

Inspired by the virtual world, the Citroën GT is the craziest French supercar of all time

Read more

About the Author

FBI says BlackCat Rust-based ransomware wiped out over 60 organizations


In short According to the FBI, the BlackCat ransomware gang, believed to be the first known ransomware group to successfully enter networks with malware written by Rust, attacked at least 60 organizations worldwide in March.

BlackCat, also known as ALPHV, is a relatively new group of cybercriminals that operates Windows ransomware as a service. But while it only appeared on the ransomware crime scene in November 2021, security researchers and federal law enforcement have linked its developers and money launderers to the notorious Darkside/ Blackmatter, “stating that they have extensive networks and experience in ransomware operations.” The FBI said in a security alert [PDF] this week.

In an earlier analysis, security researchers from Cisco Talos and Palo Alto Networks Unit 42 also noted BlackCat’s preference for Rust, with Unit 42 saying the gang was “one of the first, if not the first” of its kind to use this programming language.

The fact that the gang writes their ransomware in Rust, as opposed to C/C++, is interesting. Rust has arguably built in crucial security measures, which means the malware could be more stable and reliable. Like C/C++ toolchains, the Rust environment can be used to create programs for embedded devices, and to integrate with other programming languages, said Carolyn Crandall, chief security officer at Attivo Networks.

The aforementioned FBI alert also includes BlackCat Indicators of Compromise and warns that ransomware typically leverages previously compromised user credentials to gain access to a victim’s system. “The initial malware deployment leverages PowerShell scripts, in conjunction with Cobalt Strike, and disables security features within the victim’s network,” he said.

Once broken into, the malware compromises Active Directory user and administrator accounts and uses Windows Task Scheduler to configure malicious GPOs to deploy ransomware. But before executing the ransomware, BlackCat steals a victim’s data, including information from cloud providers.

Cisco Umbrella Flaw Allows Remote Administrator Credential Theft

Cisco has fixed a high-severity vulnerability in its Umbrella virtual appliance that, if exploited, could allow an unauthenticated remote user to steal administrator credentials and modify configurations or even reload the virtual appliance.

Tracked as CVE-2022-20773, Cisco classified it as a serious vulnerability with a CVSS score of 7.5 out of 10. It affects Cisco Umbrella Virtual Appliance (VA) for VMWare ESXi and Hyper-V running software version older than 3.3 .2.

Umbrella is Cisco’s DNS-layer security service that the vendor claims protects more than 24,000 organizations.

According to the security advisory, a static SSH host key is to blame. “An attacker could exploit this vulnerability by performing a man-in-the-middle attack on an SSH connection to Umbrella VA,” he said. Explain.

The Cisco security team says they are not aware of any malicious exploits in the wild.

Still, the vulnerability points to a bigger threat around SSH keys, according to Kevin Bocek, vice president of security strategy and threat intelligence at identity management firm Venafi.

Fortunately, a researcher and not an attacker discovered this vulnerability, he noted. “This type of access really gives an actor the keys to the realm, able to escalate privileges, create backdoors into systems, exfiltrate large undetected datasets, and move back and forth over n any device and system, no questions asked,” Bocek said.

However, Cisco is not alone. “SSH keys are incredibly powerful machine identities and are used everywhere, but they’re also misunderstood and mismanaged, making them a prime target for attackers,” Bocek added.

The longevity of SSH keys adds to the security risk, he said. “Unlike other machine identities like TLS, they do not expire. This means that a compromised identity could be abused for months or even years without an organization knowing. Given the high level of privileges granted to them, this is a very serious flaw in organizational security.”

TeamTNT Malware Blown Lid

In an effort to stay ahead of defenders, cybercrime group TeamTNT modified its malicious shell scripts after security researchers made the code public.

TeamTNT, which has existed since 2019, mainly targets cloud and containerized environments. Last year, Trend Micro found a TeamTNT binary containing a shell script designed to steal Amazon Web Services credentials and published a detailed analysis. analysis of the gang’s methods, including the abandoned script.

The disbelievers changed their scripts, and in response, Cisco Talos researchers released a “field guide“, which describes the latest TeamTNT code, its features, indicators of compromise and other attributes.

While the criminal gang still primarily targets AWS environments, these latest scripts can also run on-premises, in containers and other Linux instances, Talos wrote.

And in addition to stealing credentials, which remains the primary goal of crooks’ scripts, other payloads that can be deployed include cryptocurrency miners and malware to maintain persistence and enable lateral movement. across a network by discovering and deploying to all Kubernetes pods.

Additionally, some of the new scripts contain evasion functions that can disable Alibaba’s cloud security tools, Talos warned. “The focus on compromising modern cloud environments sets TeamTNT apart,” the researchers noted.

Better late than never?

Industrial control systems (ICS) experts and security vendors have finally been invited to join the US government’s Joint Cyber ​​Defense Collaborative (JCDC) public-private collaboration for sharing threat data and expertise. matters of security.

Initial ICS partners include Bechtel, Claroty, Dragos, GE, Honeywell, Nozomi Networks, Schneider Electric, Schweitzer Engineering Laboratories, Siemens and Xylem.

“Cyber ​​threats to the systems that control and operate the critical infrastructure we rely on every day are among our greatest challenges,” mentioned CISA Director Jen Easterly at the S4x22 conference where she announced the new JCDC-ICS effort.

According to federal authorities, the JCDC-ICS will build on existing JCDC work to develop plans around protecting and defending control systems, informing government guidance on cybersecurity of ICS and operational technology, and “contribute to the operational fusion in real time” with the public and private partners of the SCI.

Like The Reg readers may recall, Easterly announced JCDC at the Black Hat Security Conference last summer. At the time, the collective’s industry partners included Amazon Web Services, AT&T, Crowdstrike, FireEye Mandiant, Google Cloud, Lumen, Microsoft, Palo Alto Networks, and Verizon.

Since then, nation states and cybercriminal gangs have stepped up their efforts to attack critical infrastructure. Last week, CISA, along with the US Department of Energy, NSA and FBI warned that cybercriminals had created custom tools to hijack a range of industrial control systems and supervisory control devices and devices. data acquisition (ICS and SCADA equipment).

And this month, all Five Eyes nation cybersecurity agencies urged critical infrastructure to prepare for attacks from Kremlin-supported or sympathetic crews amid strong Western opposition to the Russian invasion of Ukraine.

These are just two of the most recent alerts among the barrage of security warnings from federal agencies and private threat researchers that operators routinely call upon.

So it would seem that including companies that develop and secure critical infrastructure technologies in a national cybersecurity effort would be a no-brainer. Maybe their previous invitations got lost in the mail?

LAPSUS$ ‘stole’ source code from T-Mobile US

The LAPSUS dollar extortion gang stole US source code from T-Mobile in the weeks before some of its alleged members were arrested in March, according to infosec blogger Brian Krebs.

Krebs said he got a week of private messages between seven core LAPSUS$ members as they plotted the intrusion. “Logs show that LAPSUS$ repeatedly breached T-Mobile in March, stealing source code for a series of company projects,” he claimed.

The notorious criminal group apparently breached the telecommunications giant using compromised employee accounts. The gang typically gains initial access to organizations by purchasing credentials stolen from dark web marketplaces, such as the Russian marketplace, which sells access to compromised systems.

The gang also reportedly uses social engineering scams to trick employees into adding one of their devices to the list of those allowed to authenticate with a victim organization’s virtual private network.

Targeting T-Mob employees and giving them access to internal company tools made it easier for LAPSUS$ SIM exchangesthat reassign someone’s cell phone number to a handheld controlled by attackers, allowing scammers to intercept text messages and calls, including links for password resets or codes for multi-factor authentication.

T-Mobile US said The register its monitoring tools had detected malicious activity using stolen credentials to access internal systems hosting operational tools software.

“The systems accessed did not contain any customer or government information or other similar sensitive information, and we have no evidence that the intruder was able to obtain anything of value,” he said. . “Our systems and processes functioned as intended, the intrusion was quickly stopped and closed, and the compromised credentials used became obsolete.” ®

Capturing and using audience data: what are the opportunities?


By Paul O’Donovan, Director of Market Development – Direct to Consumer, MediaKind

Many new players in the direct-to-consumer (D2C) space face a similar challenge. While they may have built up a very loyal group of followers, they don’t necessarily have the most important data. Capturing audience and usage data is key to shaping their view of their users’ profiles and regular habits on the second screen while watching premium video content.

Let me give you an interesting recent example. Earlier this year, Spotify has announced its sponsorship of FC Barcelona. As part of the negotiations, the club highlighted their vast fanbase of 350 million registered supporters. For Spotify, the potential access to this huge group of FC Barcelona supporters offered huge revenue potential. But the reality was somewhat different. Only 1% of registered FC Barcelona supporters chose to provide their personal data. This resulted in Spotify paying a considerably lower amount for its sponsorship deal. The overall value of their sponsorship proposal was significantly reduced.

And yet, the opportunity for service providers is very real. Many existing advertising solutions revolve around opt-in models, but the consumer benefits of doing so are minimal at present. The challenge for the whole industry is simple: how to provide a direct benefit to the consumer that will be enough to encourage them to share their data?

Data is king in the D2C space

As my colleague Erik Ramberg pointed out in his recent blog, data is critical in the D2C space: “everything is geared towards real-time interaction and a more personalized experience.” Data should expose the right types of content and unlock the right interactive services to help engage viewers in their viewing experience and unlock new monetization opportunities.

Earlier this week, market research firm Kantar said that 54% of online adults in the UK surveyed in its recent DIMENSION study said they preferred seeing adverts tailored to their particular interests and needs. This, however, must be weighed against the fact that 56% of adults surveyed were also concerned that more personalized content would compromise their privacy. The lesson here is that incentivizing membership needs to add real value, and from my perspective, there are already several potential use cases.

For example, a potential opportunity could be to introduce the application of credits to an account, leveraging the transactional nature of the VOD platform to offer consumers the option to provide data in exchange for a certain level of credit. which includes access to premium content. In other words, a direct return on the consumer’s investment in their data. This model is already adopted in many free mobile games. The main objective is to make the value of the service so desirable that users will want to pay to extend the level of availability. Or to trick them into paying additional fees to avoid watching certain advertisements in the program.

Another possible use case is the ability to insert micro-transactions that allow access to a small portion of a live sporting event, such as the last quarter of a basketball game. There are two potential ways to achieve this:

  • A flat rate, which provides a direct entry point to content
  • Use targeted advertising to provide a sign-up option for new users who want to watch content for free. The user then gives their consent for the streaming service to access their data and share it with third parties.

Come discuss MediaKind’s ad capability at the 2022 NAB Show!

Once you have a fan’s data, it instantly becomes more valuable to you. There are great opportunities from a purely advertising standpoint once you have a more complete view of your target audience. It’s about moving away from “Lewis the Chicago Bulls fan” to Lewis, a 35-year-old married man who lives in Springfield, Illinois, and loves a certain brand of potato chips, as well as sports betting game – who is also a Chicago Bulls Fan! In other words, build an advertising model that goes beyond generic information to a more hyper-targeted profile of that person.

These are all areas we can address with our PRISMA solution. Using a very powerful entitlement engine, PRISMA enables service providers to take advantage of these use cases. For consumers who opt for some use of data, it is possible to offer very flexible ad placement options and provide access to a small portion of a live sporting event, such as the last 10 minutes of a game basketball, or access to a free one-month pass for a paid service.

And with MediaKind Engage, our D2C solution for video production, streaming, and audience engagement, we can help content owners, broadcasters, and media brands meet the pace of cloud adoption and the rise of streaming services. We can provide the back-end platform, streaming technology, and rights to apply highly advanced use cases for hyper-targeted advertising. Through MediaKind Engage, we can enable sports content owners and other major rights holders to effectively become TV operators in their own right by owning the platform and building billing systems while simultaneously managing fans and Accounts. I discussed this subject with another of my colleagues, Chris Wilson, in a recent video.

MediaKind can facilitate all of these types of offers, and I can’t wait to explain to NAB Show visitors how we do it! Please contact me via LinkedIn if you’d like to learn more, you can also drop by the MediaKind booth if you’re in Las Vegas this week (#W2800), and I’d be happy to show you some of our live streaming demos.

Back to the Nissan Laurel C30


Nissan is one of the best and most enduring automakers today, with a reputation that dates back to the 1950s. The 60s era was home to a lot of great cars. Meanwhile, Nissan’s Bluebird and Cedric models were already at their peak selling point. To meet the demand for a more stylish sedan, the brand decided to create a version that would offer the benefits of its best-selling sedans, but in a compact package with more luxurious features. In 1968, the Nissan Laurel C30 was born and ticked all the boxes of a compact sedan. As the first generation of its kind, the C30 was a more upmarket version of the Bluebird. This sedan rivaled the top-of-the-line versions of the sedans of the 60s.

The same is true in a sleek exterior design that featured a compact build, twin headlights and 14-inch whitewall tires. The Nissan Laurel ran on the same base engine as the Skyline. It was a 4-cylinder OHC with a displacement of 1800 cc. It also had 4-wheel independent suspension which was later adapted by the third generation Bluebird 510 version. Today, the Laurel is among the rarest classic 1960s Nissan models you can find.

The Nissan Laurel debuted in the late 1960s as a worthy competitor to the Toyota Corona Mark II and the Mazda Luce. This is the story of the Nissan Laurel C30.

RELATED: Why The 1997 Nissan GT-R Nismo 400R Is Worth A Fortune Today

The Nissan Laurel C30 had humble beginnings and received a premium design

The Nissan Laurel was a unique vehicle and one that would stand out from the rest of the counterparts offered in the late 1960s. When it was first released, it became a top choice for anyone looking for a mid-size sedan. daily. Offering more luxury than its predecessors, the Nissan Laurel C30 dominated its segment during its production years. It was a true upgraded version of the Datsun Bluebird 510 – another viable sedan at the time.

For the first generation of the range, the brand offered the Nissan Laurel in a luxury compact package. Customers could choose between two body styles: a 2-door hardtop coupé and a 4-door sedan model. Its fairing featured distinct twin round headlights. It was a fashionable feature at the time, and something that would later become standard for its impending generation lines. The headlights mingled with the sleek grille. The silver bumper gave the front a nice bold finish. Models produced the following year featured “GX” lettering on the grille. Most 4-door versions were equipped with auxiliary lighting in the front. This came in the form of two additional lights fitted between the grille and the bumper, for extra visibility.

Another factor that was atypical about the Laurel compared to most classics was the mirrors. Called mirrors, these were positioned on the front panel, just above the wheel arches and signal lights. Compared to the door-positioned mirrors we have today, we’d say visibility out of the Laurel C30’s side mirrors would have been difficult, especially in bad weather. 14-inch whitewall tires and full wheel covers enhanced the look of the car. In dimensions, the first generation Nissan Laurel measured 169.5 inches in length and 63.5 inches in width. When combined with the 55.3 inches in height, the Laurel was among the most compact vehicles of its kind.

RELATED: Here’s How Much a 1983 Nissan Skyline 2000RS Turbo Costs Today

The interior of the Nissan Laurel C30 had all the trimmings of a trendy compact sedan

The interior of the Nissan Laurel complements the exterior design. It featured a unique instrument cluster, with well-positioned, driver-oriented buttons and dials. Its instrument panel offered revamped odometer readings for the next model year. The 1970 Nissan Laurel C30 2000GX version received sportier equipment. It also came with two bucket seats in the front and a bench seat in the back for the 4-door sedan. While it was the smaller version of the previous vehicles, the Nissan Laurel had a considerably large cabin, thanks to the 103.1-inch wheelbase. This made it the perfect family sedan.

RELATED: Here’s Everything You Need to Know Before Buying a Used Nissan Altima

The classic Nissan Laurel offered two durable engines

The 2-door hardtop coupe models were equipped with a 2.0-liter G-20 inline-4 engine, which developed 120 horsepower. On the other hand, the 4-door version of the vehicle units offered a 1.8-liter inline 4-cylinder engine. It was a similar engine to the Skyline model and only produced 99 horsepower at 5,600 rpm. These engines were either mated to a 4-speed manual or a 3-speed automatic transmission system to power the rear wheels. For better driving performance, the Nissan acquired a heavy-duty suspension. It featured strut suspensions at the front and a semi-trailing arm suspension system at the rear. Just like the C10 Skyline. The power and handling capabilities of the Nissan Laurel greatly influenced the second-generation C130 version, which the brand produced from 1972 to 1977, and many units that followed.

10 of the best Nissan car models on the market

Read more

About the Author

A complete and highly customizable HPC software stack


Sponsored Feature. There are many things that the HPC centers and hyperscalers of the world have in common, and one of them is their attitude towards software. They like to control their system software as much as possible because it allows them to squeeze as much performance out of their systems as possible. However, the time and money resources and level of expertise required to create what amounts to custom operating systems, middleware and runtimes are too onerous for most other organizations that stand to benefit from the HPC in its many forms.

With a rapidly growing number and types of compute engines in the data center and a growing set of HPC applications – which include traditional simulation and modeling as well as data analytics and machine learning and, increasingly, a hodgepodge of these techniques piled into a workflow that constitutes a new type of application – building and maintaining a full HPC software stack is a tall order.

What if it could be more of a group effort? What if there was a way to create a complete HPC software stack that was still optimizable for very specific use cases? Wouldn’t that be a benefit to the wider HPC community, and especially to academic, government, and corporate centers that don’t have the resources to build and maintain their own HPC stack?

It’s hard to argue against customization and optimization in HPC, so don’t think that’s what we’re doing here. Quite the contrary. But we’re thinking of a sort of curated mass customization that benefits more HPC users and more diverse architectures – and that’s because system architectures become more homogeneous over time, not less.

Each processor or GPU or FPGA accelerator manufacturer, not to mention custom ASIC vendors, creates its own compilers and often its own application development and runtime environments in the never-ending task of extracting more performance expensive HPC clusters that organizations build from their compute engines and networks. (After all, it’s hard to separate compute performance and network performance in a clustered system. That’s one of the reasons Nvidia paid $6.9 billion for Mellanox.)

The list of important HPC compilers and runtimes is not long, but it is varied.

Intel had its historical parallel studio XE stacks, which include C++ and Fortran compilers and a Python interpreter plus the Math Kernel library, data analysis acceleration library, built-in performance primitives (for algorithm acceleration for specific domains ), thread building blocks (for shared-memory parallel programming), plus an MPI library for implementing message-passing scale-out clustering, optimizations for TensorFlow and PyTorch machine learning frameworksnow included in Intel’s oneAPI toolkits.

Nvidia created its Compute Unified Device Architecture, or CUDA, to make it easier to move computing tasks from CPUs to GPUs instead of having to resort to OpenGL. Over time, the CUDA development environment and runtime added support for the OpenMP, OpenACC, and OpenCL programming models. In 2013, Nvidia bought the venerable PGI C, C++ and Fortran compilers, which came out of mini-supercomputer maker Floating Point Systems decades ago, and for more than a year the PGI compilers were distributed in the Nvidia HPC SDK stack framework. .

AMD has the Radeon Open Compute Platform, or ROCm for short, which heavily leverages the heterogeneous system architecture runtime which has a compiler front end that can generate hybrid code to run on both CPUs and GPU accelerators, and most importantly, the tools that make up the ROCm environment are open source. ROCm supports OpenMP and OpenCL programming models, and has another Heterogeneous Interface Programming Model for Portability (HIP), which is a C++ kernel language and runtime for GPU offloading that can generate code that can run on AMD or Nvidia GPUs and can also convert code created from Nvidia’s CUDA environment to run on HIP and therefore have some sort of portability.

The Cray Linux environment and compiler set, now sold by Hewlett Packard Enterprise as the Cray Suite of Programming Environments, comes to mind immediately and can be used on HPE’s own Cray XE systems, Intel or AMD processors and Nvidia, AMD or Intel GPUs (incorporating each vendor’s tools) as well as Apollo 80 machines using Fujitsu’s heavily vectored A64FX ARM server processor. ARM has its Allinea compiler set, which is important for A64FX processors as well as Neoverse Arm processor designs that will come out with vector extensions in the coming years. Fujitsu also has its own C++ and Fortran compilers which can run on the A64FX chip and of course there is also the open source GCC compiler set.

There are other important HPC compiler and runtime stacks with acceleration libraries for all sorts of important algorithms in various fields of simulation, modeling, financial services, and analytics. More the merrier, the merrier. But here’s the important lesson exemplified by the launch of the Apollo 80 system with HPE’s A64FX processor: Not all compilers are good at compiling all types of code. This is something that all university and government supercomputing centers, especially those that modify architectures a lot, know very well. Diverse computing will mean diverse compilation.

And, therefore, it is better to have many different compilers and libraries in the toolkit to choose from. And, in fact, what the HPC market really needs is a hyper-compiler that can examine code and determine which compiler should be used across a wide range and possibly a diverse mix of compute engines to get the best performance. We don’t think the HPC industry needs many different comprehensive HPC SDKs developed by their vendor advocates as much as it needs compilers and libraries from many different experts all of which can be integrated into one framework Single, large and complete SDK for HPC. workloads.

Stepping up to the next level in the HPC software stack, and further complicating the situation, is the fact that each HPC system manufacturer has its own Linux environment, or one that has been anointed as the one chosen by IBM’s Red Hat unit or SUSE Linux or Scientific Linux, or whatever is cobbled together by the HPC center itself.

In an HPC world where security and efficiency are paramount, we need a stack of operating systems, middleware, compilers, and libraries designed as a whole, with options you can drag into and out of the stack as needed. , but which offers the widest optionality. This software does not need to be open source, but it must be able to be integrated consistently via APIs. For inspiration from this HPC stack, we take the OpenHPC effort led by Intel six years ago and the Tri-Lab Operating System Stack (TOSS) platform developed by the US Department of Energy – specifically, Lawrence Livermore National Laboratory, Sandia National Laboratories and Los Alamos National Laboratory. The TOSS platform is used on the convenience hubs shared by these HPC centers.

The OpenHPC initiative seemed to be gaining ground a year later but a few more years passed, and at that time no one was talking about OpenHPC. Instead, Red Hat was creating its own Linux distribution tailored to run traditional HPC simulation and modeling programs and the world’s two largest supercomputers, “Summit” at Oak Ridge National Laboratory and “Sierra” at Lawrence Livermore, were running Red Hat Enterprise Linux 7. The OpenHPC effort was a little too Intel-centric for many, but that goal was understandable to some extent without AMD CPUs or GPUs and ARM CPUs in the HPC hunt. But the mixed nature of the stack was okay.

Our thought experiment on an HPC stack goes further than just allowing anything to connect to OpenHPC. What we want is something more like TOSS, which was presented four years ago at SC17. With TOSS, the labs created a derivative of Red Hat Enterprise Linux that used consistent source code across X86, Power, and Arm architectures and a build system to eliminate elements of RHEL that were foreign to HPC clusters and to add other software that was needed.

In a conversation about exascale systems in 2019, Bronis de Supinski, CTO of Livermore Computing, said that Lawrence Livermore extracted 4,345 packages from the more than 40,000 packages that make up Red Hat Enterprise Linux, then patched and repackaged 37 more of them, then added another 253 packages that the Tri-Lab systems require building a TOSS platform with 4,598 packages. The software area is obviously greatly reduced, while supporting various CPUs and GPUs for computing, various networks, various types of middleware abstractions, and the Luster parallel file system.

What is also interesting about the TOSS platform is that it has a complementary development environment that overlays compilers, libraries, etc., called Tri-Lab Compute Environment:

If three of the major HPC labs in the United States can create a Linux HPC variant and development toolset that provides consistency across architectures, enables application portability, and lowers the total cost of ownership of product clusters that they use, what additional effect might a unified HPC stack, with all current vendors of compilers, libraries, middleware, and other participants, have on the HPC industry as a whole? Imagine a community-shared build system that could only eject components needed for a particular set of HPC application use cases and limit the security exposure of the entire stack. used. Imagine if math libraries and other algorithmic speedups were more portable across architectures. (That’s a topic for another day.)

It’s good that each HPC compute engine or operating system vendor has its own complete and highly optimized stack. We applaud this, and for many customers in many cases this will be enough to design, develop and maintain HPC applications appropriately. But that most likely won’t be enough to support a diverse set of applications on a diverse set of hardware. Ultimately what you want is to be able to have a consistent framework across compiler and library vendors, which would allow any math library to be used with any compiler and for a adjustable linux platform.

Sponsored by Intel.

A framework for private hospitals to build institutional research capacity


With the establishment of several very large high-end and profitable private sector tertiary care hospitals in Bangladesh, it is time for them to start thinking about undertaking internal research initiatives to improve their performance in care delivery, increase clinician efficiency, improve service delivery standards, build a global reputation inside and outside the country, and help achieve international accreditation standards. These well-resourced hospitals can build and improve research capacity in their facilities. These private hospitals can take the initiative to initiate the building of a research infrastructure where clinical and other health professionals will be engaged, and apply health research that will benefit these hospitals, their patients and the community. society in general.

The development of research capacity in a tertiary level hospital can be planned at three different levels:

⦿ foundational skills in research use (e.g. how to seek, evaluate and deliberately apply research evidence to update practice),

⦿ participation in research (e.g. assisting in recruitment of research subjects and data collection led by external experts), and

⦿ conduct research (for example, develop research protocols, conduct research studies, publish research articles and seek external funding).

A hospital in Bangladesh may decide to undertake the following three sequential steps.

Step 1: It can help clinicians and other healthcare professionals develop their research knowledge, skills and confidence. A range of approaches they can take include: arranging relevant education and training to command aspects of the research process such as writing research proposals and submitting ethical requests; create opportunities to learn and apply skills such as collecting data for projects, identifying research questions, analyzing collected data, conducting small research projects, and attending seminars , workshops and book clubs; establish a research-friendly workplace that welcomes and values ​​the research interests, motivations, abilities, time commitments, and career paths of clinicians; encourage mentoring and coaching of experienced researchers; provide access to resources, including library, software, desktop, and computer use; arranging sheltered time and offering support in applying for external research funding; developing a reward and recognition system by providing greater career opportunities, research career paths and financial incentives; provide support to undertake formal higher education.

2nd step: Research capacity building is strengthened and enriched when hospital professionals work with others to exchange ideas, knowledge, skills and resources and to train a “critical mass” of personnel active in research. This can be accomplished by building:

tactical alliances, partnerships, connections and networks within and between teams, departments and organizations, including universities, NGOs, government and the pharmaceutical industry; mix of clinicians and non-clinicians with different levels of research skills within each team; coordinated and team projects; opportunities to share research expertise with other team members and with wider networks.

Step 3: To build research capacity, hospital professionals need to feel that their engagement in research is valued and contributes to excellent service delivery. This can be fostered by: demonstrating visible support and endorsement of research at the hospital leadership level, including developing structured processes and systems for research and restructuring clinical roles to include time for research; prioritize research as part of the hospital’s core business by including research in the hospital’s vision, mission, strategic plans, key performance indicators, and role descriptions; prioritize research projects that are more relevant to practice and in line with the hospital’s strategic priorities; reporting, disseminating and applying research results.

A previous research study proposed the following indicators that signify the creation of a research culture in a hospital and demonstrate its commitment to building research excellence:

1) a reformed performance appraisal system to recognize the importance of collaborative health research; 2) increased institutional support for health research through supervisory support, release time, incentives and rewards for research participation, and institutional funds to support a center, program or a central health research office; 3) established internal partnerships to conduct health research; 4) increased skills and involvement of staff and faculty in health research; 5) regular meetings for the project and other interested staff to discuss research topics; 6) new curricula related to health research; 7) a central research oversight committee.

In a previously proposed research capacity building model, the following stages of development were listed. First, the hospital will increase the research interest, awareness and skills of its staff who will then seize opportunities, collaborate with internal and external partners and participate in formal training provided by the hospital or on external platforms. . These will lead to raising the experience and qualifications of doctors and they will start publishing research articles in local or regional journals and some of them will gradually take on research supervisory roles. In the final stage, there will be a cadre of research professionals who will be involved in postgraduate supervision, mentoring junior clinicians in research, collaborating with internationally and nationally renowned researchers, securing funding competitive external research and publication in high-impact peer-reviewed international journals. .

Many young clinicians and health professionals in Bangladesh want more access to academic mentorship to develop and promote their research skills. They often cite factors such as personal attention, guidance, motivation and feedback from mentors as strengths that can influence their research training.

In the new reality of the rise of private sector enterprises and the general decline of public sector enterprises in Bangladesh, private sector tertiary care hospitals must take innovative and applied research seriously.

Hasnat M Alamgir is a professor of public health.

[email protected]

RDS and Aurora PostgreSQL Vulnerability Leads AWS to Deprecate Many Minor Versions


A researcher from security firm Lightspin recently explained how she obtained credentials for an internal AWS service using a PostgreSQL extension and exploiting a local file reading vulnerability on RDS. AWS has confirmed the issue and deprecated dozens of minor releases of Amazon Aurora and RDS for PostgreSQL.

According to Amazon, database users with sufficient permissions could use these credentials to gain elevated access to resources associated with the database cluster from which they were obtained and could not be used to gain access. to internal RDS services or move between databases or AWS accounts.

Gafnit AmigaDirector of Security Research at Lightspin, writes how she got credentials for an internal service Grover using a PostgreSQL extension, bypassing the log_fdw extension validation:

The log_fdw extension allows the user to access the database engine log using a SQL interface (…) I spent some time going through the system files until I find an interesting argument in the PostgreSQL configuration file which was not shown using psql(….) the apg_storage_conf_file which points to another configuration file with the name Grover_volume.conf (…) file content points to another file csd-grover-credentials.json.

This file allows Amiga to retrieve temporary Identity and Access Management (IAM) credentials, including a Public key and Private key that she could test and confirm that she is connected to an internal role called csd-grover-role. Amiga concludes:

Going through three different files, I was able to discover and access an internal AWS service. This is where my analysis and research ended. I haven’t attempted to enumerate IAM permissions or move laterally through the internal AWS environment.

Source: https://blog.lightspin.io/aws-rds-critical-security-vulnerability

According to the security firm, the vulnerability was reported to AWS on December 9, more than four months ago, when the RDS team began working on investigation and remediation. AWS rolled out an initial patch to the latest versions of Aurora and RDS on December 14, excluding older versions, and began contacting affected customers. In a safety bulletin published on April 13, the cloud provider claims:

AWS responded immediately to fix this issue when it was reported. As part of our mitigation, we updated Amazon Aurora PostgreSQL and Amazon RDS for PostgreSQL to prevent this issue. We have also deprecated minor releases Amazon Aurora PostgreSQL and Amazon RDS for PostgreSQL (…)

AWS review did not initially mention Lightspin and lack of attribution raised again questions in the community. The announcement does not specify what the internal service Grover is and how it works. Amiga confirms:

As for Grover, AWS is unable to disclose any internal service details.

Scott Piper, a cloud security consultant who maintains a repository of Cloud Service Provider Security Errors, tweet on the latest Lightspin findings:

Adding the latest Lightspin RDS issue to the “cloud service provider security errors”, I realized that Amiga found the RDS issue a week after finding the Sagemaker issue! How many hits do you still have online?

It is no longer possible to create an Aurora PostgreSQL or RDS for PostgreSQL instance with one of the following deprecated minor versions:

Aurora PostgreSQL

  • 10.11, 10.12, 10.13
  • 11.6, 11.7, 11.8

RDS for PostgreSQL

  • 13.2, 13.1
  • 12.6, 12.5, 12.4, 12.3, 12.2
  • 11.11, 11.10, 11.9, 11.8, 11.7, 11.6, 11.5, 11.5, 11.4, 11.3, 11.2, 11.1
  • 10.16, 10.15, 10.14, 10.13, 10.12, 10.11, 10.10, 10.9, 10.7, 10.6, 10.5, 10.4, 10.3, 10.1
  • 9.6.21, 9.6.20, 9.6.19, 9.6.18, 9.6.17, 9.6.16, 9.6.15, 9.6.14, 9.6.12, 9.6.11, 9.6.10, 9.6.9, 9.6. 8, 9.6.6, 9.6.5, 9.6.3, 9.6.2, 9.6.1
  • 9.5, 9.4 and 9.3

Government wants flexible framework for local participation in cryptocurrency sector Paige McCartney


Pinder was speaking following the release of the Davis administration’s policy white paper regarding the future of digital assets in the Bahamas.

He said that in addition to ensuring that Bahamians can be trained and educated for employment in the emerging industry, it is paramount that Bahamians can benefit from direct participation.

“One of the issues with Bahamians engaged in the industry now is exchange control. And the Central Bank will take the position you need to convert your Bahamian dollars through the international currency market and legitimate framework so that you can go and invest those in digital assets.This has always been, in my opinion and for many others, a serious impediment to foreign investment by Bahamians, due to the premiums they charge and the process and bureaucracy involved “said the attorney general.

“So you’ll see that one of our commitments in the white paper is to work with the Central Bank to make sure that we can have a more flexible framework for Bahamians to participate, using Bahamian dollars as part of the digital assets and cryptocurrency. The Central Bank has its thoughts on the issues, we have our thoughts on the matter and hopefully when the time comes we will come together on the matter.

The $3 trillion cryptocurrency industry has only become mainstream globally in recent years as major banks, investment firms, and other financial institutions begin investing and trading in large scale.

The recently released white paper projected that the Bahamas, one of the first jurisdictions to enact digital asset legislation and regulation, would significantly expand the sector by 2025.

Pinder said the Davis administration does not want the Bahamas or Bahamians to be outside of this financial revolution.

“As you know, we are setting up an advisory committee and a political committee that will work on this. The Policy Committee is headed by the Prime Minister and has both the Governor of the Central Bank and the Executive Director of the Securities Commission with him, to make separate policy recommendations on this,” he said. .

“We thought it was rather important to have the chief regulators at the table with the Prime Minister so that we could come to these decisions. We have the advisory committee that will make those recommendations and send them to the ultimate steering committee to make those decisions. That’s why you see the breakdown in the white paper between these committees and how we’re going to approach policy changes. But we said we were going to work for Bahamians to be able to invest in cryptocurrencies using Bahamian dollars, and that’s something we’re going to work with regulators.

The whitepaper’s nine-point policy adjectives include exploring new opportunities in decentralized finance (DeFi), non-fungible tokens (NFTs), stablecoins, and asset-referenced tokens; improve the attractiveness of the Bahamas as a well-regulated jurisdiction for digital asset management; and expanding the current legislative framework.

The document also promised that the government would begin this year allowing Bahamians to access digital assets using Bahamian dollars and allow the payment of taxes using digital assets.

No. 1-ranked New Boston Huron baseball dominates Divine Child with PHOTO GALLERY – The News Herald


Two of the area’s top baseball teams shared the field Thursday afternoon as Dearborn Divine Child traveled to New Boston Huron. The host Chiefs entered the game ranked No. 1 in the state in Division 2 and overall both teams entered the game with a combined record of 13-3 in the young season.

Divine Child at New Boston Huron Baseball Photo Gallery

It was a pitching duel throughout, but Huron, behind a dominant pitching performance from Cole Grunwald, managed to pull off a 5-1 victory over the Falcons.

Alex Muller – For MediaNews Group

Divine Child third baseman Owen Avery tries to knock out host New Boston Huron’s Matt Williams on Thursday afternoon. Williams slipped safely on play on a day when the visiting Falcons fell to the Huron 5-1. (Alex Muller – For MediaNews Group)

The low scores affair should have surprised no one.

Heading into the game, the Chiefs’ pitching team was allowing about three runs a game on average. The Divine Child pitchers had 19 total runs in the team’s first nine contests, including nine in Game 1 of a doubleheader the night before against the University of Detroit Jesuits.

It was Grunwald’s effort on the bump that ultimately put Huron (7-1, 2-1 Huron League) on top Thursday.

“He’s really something,” Chiefs coach Phil Yancey said. “He’s been our go-to man since last season. He’s just an all-around player, a good pitcher and a good hitter.”

Grunwald is one of many talented players returning from a 2021 Huron team that reached the D2 state semifinals.

Divine Child (7-3, 5-1 CHSL AA) scored his lone run Wednesday in the first period on a two-out single by Tyler Kostora. Grunwald started the game with two straight strikeouts, but an error and a hit by Owen Avery extended the inning.

Those first-inning hits were two of three total hits for the visitors. Grunwald at one point struck out 15 consecutive batters before giving up a single and a walk with two out in the sixth.

“We didn’t make any adjustments until our second and third at bats,” Falcons coach Dan Deegan said. “(Grunwald) is a good pitcher and he’s a good team. They went to the semi-finals last year for a reason.

“We were happy with our pitch. Our starting pitch has been pretty good so far this year. It was (John Millen’s) first start of the season and he pitched really well, gave us a chance to to win.”

Grunwald went the distance for Huron, giving up just one unearned run, walking one while striking out 11 batters for Divine Child. The senior spoke about the adjustments made after the first run.

“Our coach came up to me and said ‘hey, everything is fine,'” Grunwald said. “We made a mistake on the field and I kind of pulled myself together after that. I’m just trying to do my job as a pitcher and throwing strikes. I knew my team had my back.”

Offensively for the Chiefs, there were plenty of smallball plays — six stolen bases and three sacrifices, to be exact — to eliminate five points. After leveling things at 1-1 in the second, they took the lead with two points in the fourth before adding a point in the fifth and one in the sixth.

The hosts ended up hitting 10 hits in the win

Matt Williams, Rory Callahan and Connor Grant each had two hits. Callahan was responsible for the team’s only extra hit, a brace to start the rally in fourth. Grant and Jaden Morse each had an RBI while 9th overall Issac Smith had two RBIs.

Divine Child starter John Millen gave his team a chance to win, scattering those 10 hits and two walks in six innings of work.

For Huron, it was one of five games the team was scheduled to play over four consecutive days.

The Chiefs beat Huron League foe Monroe SMCC 6-2 the day before and will resume league play Friday with a game at Carleton Airport. On Saturday, Huron will visit Allen Park for a non-championship doubleheader.

The Chiefs entered the 2022 season ranked first in the state in D2, following their run to the state semifinals last spring.

Grunwald explained how high expectations resonated with the team at the start of this season.

“It’s always been on our minds,” he said. “We know we have a lot of good ball players here. But we’re just going to focus on now. Once we get closer to the end, we’ll really focus on our throwing. We know we have great personal throwing this season.”

Meanwhile, Divine Child lost three of four after winning six straight games to open the season.

“We’re a team in desperate need of practice,” Deegan said. “Defensively we really moved today. We haven’t trained for 12 days with this crazy weather and the holidays. Today and yesterday we made a ton of mistakes and it shows that we have to train .”

The previous day, the Falcons lost the front of a 9-4 doubleheader to UD Jesuit but then edged the Cubs 17-2 in the nightcap.

Next up for Divine Child is a league doubleheader on Tuesday at Ann Arbor Gabriel Richard. Two days later, the Falcons will hit the road for two games at Macomb Lutheran North.

Arcion Partners with Databricks to Bring Validated Data Replication to Users


Arcion announced a partnership to bring Databricks a CDC-based, cloud-based data replication platform. Arcion is the first partner to offer preconfigured and validated data replication for Databricks users through the company’s new Partner Connect program.

Arcion’s product enables faster, more agile analytics and AI/ML by enabling enterprises to integrate mission-critical transactional systems into their Databricks Lakehouse in real time, at scale, and with guaranteed transactional integrity. It is the only fully managed and distributed data replication service on the market, offering code-free and maintenance-free change data capture (CDC) pipelines that can be deployed in just minutes. It enables data teams to move big data from transactional databases such as Oracle and MySQL, without a single line of code.

Partner Connect allows customers to implement Arcion’s technology directly into their Databricks Lakehouse. With just a few clicks, Partner Connect automatically configures the resources needed to start using streaming data pipelines. Enable real-time data ingestion with powerful pipelines between Oracle, MySQL, and Snowflake (additional sources coming soon) to Databricks Lakehouse.

“Through Partner Connect, Arcion and Databricks are deepening our thriving relationship and working together to deliver a unified experience for our customers that delivers simplicity, security, rock-solid reliability and scalability,” said Gary Hagmueller, CEO of Arcion. “Companies around the world are using ML and advanced analytics to turn raw data into tangible business value, but they need the right tools to help them get there. Arcion helps companies unify their data by delivering it to Databricks, where everything is available in one place, without delay.

Arcion Cloud uses CDC to identify and track changes to data in transactional systems, whether deployed on-premises, in the cloud, or in a hybrid landscape. Arcion detects all changes to these systems and replicates them to Databricks in real time. Capable of handling petabyte-scale integration, Arcion easily handles high transaction volumes, without impacting the performance of the source system.

“Arcion’s replication for Databricks’ Lakehouse delivers extremely fast ROI for analytics and AI/ML,” said Adam Conway, senior vice president of product at Databricks. “By making Arcion available through Partner Connect, we are enabling thousands of Databricks customers to experience and take advantage of Arcion’s highly scalable, efficient and flexible CDC technology. With just a few clicks, users can create a trial account and begin streaming real-time data from transactional systems to their Lakehouse. »

Russia-Ukraine Live News: Biden announces $800 million in military aid


Russia’s greatest military loss so far in the Ukrainian war is also becoming something of a liability for the Kremlin’s propaganda machine.

After Russia’s Black Sea flagship Moskva sank last week, authorities said the entire crew of more than 500 had been rescued. But there has been no official update since, and the families of the missing crew members are increasingly demanding answers about their whereabouts.

“They don’t want to talk to us,” Maksim Savin, 32, said in an interview about the quest to find out the whereabouts of his youngest brother Leonid, 20, a conscript. “We are in mourning; they recruited our little brother and will probably never return him.

At least 10 families have publicly expressed their frustration at receiving conflicting information about whether their sons are alive, missing or dead. Their demands, made on social media or to news outlets, could hurt public support for the war effort ordered by Russian President Vladimir V. Putin.

The official silence on the fate of the Moskva crew is part of a wider Kremlin campaign to suppress bad news about the invasion and control the narrative Russians receive about its progress. Mr Putin blocked access to Facebook and many foreign news outlets, and enacted a law to jail anyone spreading “false information” about the war.

The cause of the sinking has been disputed, with Russia claiming that an ammunition magazine exploded and then the damaged ship sank while being towed in rough seas. Ukraine said it hit the vessel with two Neptune missiles, a claim US officials have corroborated. Either way, the loss of one of the largest warships since World War II has been a source of embarrassment for Russia.

Independent Russian media based outside the country reported that about 40 men died and 100 others were injured when the battleship was damaged and sank. These reports cite an unidentified official and the mother of a deceased sailor. Additionally, the wife of an older midshipman confirmed his death to Radio Liberty, a US government network based outside of Russia.

Credit…Maxar Technologies, via Associated Press

Many of the missing crew members were conscripts, a sensitive subject in Russia since the war in Chechnya, when poorly trained young soldiers were often thrown into battles and died en masse, eroding public support for the war. “A few hundred” soldiers from the first Chechen war in the mid-1990s have still not been found, said Alexander Cherkasov, the former president of the Memorial Human Rights Center, a Moscow-based group that disbanded this week. month because of a court. Ordered.

“Nobody cares about the soldiers,” he said, and restrictions on non-governmental organizations mean it is now virtually impossible for them to carry out research work, he said.

Mr Putin has repeatedly said that conscripts due to serve a year in the army will not be deployed to Ukraine, a statement contradicted by battlefield casualties.

The Union of Committees of Soldiers’ Mothers of Russia, which dates back to the Chechen wars, has confirmed that it receives requests to search for missing soldiers. The organization declined to comment further, citing a law prohibiting the sharing of information about soldiers with foreign organizations.

Parents of crew members of the Moskva, named after the Russian capital, expressed outrage at what they described as an official headlong rush.

“We parents are only interested in the fate of our children: why, being conscripted soldiers, did they end up in this military operation? said Dmitry Shkrebets, whose 19-year-old son Yegor worked as a cook on the Moskva.

Credit…Alexei Druzhinin/Sputnik, via Reuters

In an interview, Mr. Shkrebets was reluctant to speak further, but on Sunday he posted much harsher statements on VKontakte, the Russian equivalent of Facebook.

Initially, officers told him that Yegor was among the missing, he said.

“Guys, did you go missing on the high seas? !!! ” he wrote. “I asked directly why you officers are alive, and my son, a conscript soldier, is dead?”

Mr. Shkrebets has since started collecting testimonies from other families who are unable to locate their sons. “The more we write, the harder it will be for them to keep silent about what is happening,” he wrote on Wednesday.

Dmitry S. Peskov, the Kremlin spokesman, said on Tuesday he was not authorized to release information about the missing sailors and referred questions to the Defense Ministry.

The ministry did not respond to requests for comment. He posted a video on Saturday purporting to show Admiral Nikolai Yevmenov, the commander of the Russian Navy, meeting men described as the crew of the Moskva lined up in formation and wearing uniforms. The number of survivors of the attack was unclear and nothing was said about the casualties either in the video or in social media posts.

An indication of the official stance came Sunday night during Vesti Nedeli, the weekly news digest on state television. The three-hour show devoted about 30 seconds to the sinking, without mentioning the victims.

However, not all Kremlin spokespersons were so reluctant. A talk show host, Vladimir Solovyev, on Saturday demanded an explanation of how the ship was lost.


Maksim Savin said the family could not reach any officers in his brother’s unit by phone. His mother texted a number and received a reply that her son Leonid was missing.

Later, the family received a series of calls from a man who seemed to have served with Leonid and who kept changing his story. First, the man said Leonid died rushing to save a friend, Maksim Savin said. On the second call, he said there was no rescue, but Leonid was caught at the site of an explosion. The third time he called to say he had made a mistake and that Leonid had disappeared.

“It looks like the officers are trying to silence everyone,” Maksim Savin said.

Many reports of missing conscripts first appeared on social media. A woman wrote that her brother had worked in the engine room and was missing, but she was sure he was dead.

Anna Syromaysova, the mother of a missing conscript, told the independent Russian news agency Meduza that she could not see any official documents relating to the victims. “There are no lists,” she said. “We are looking for them ourselves. They don’t tell us anything. Reached by telephone, she refused to speak to a foreign press agency.

Tamara Grudinina told the BBC’s Russian-language service that her son, Sergei Grudinin, 21, was assigned to the ship straight after basic training.

Credit…Russian Defense Ministry, via Shutterstock

When she learned the ship had sunk, Ms Grudinina said, she called a Ministry of Defense hotline for relatives and was told her son was ‘alive and well and would get in touch at the first opportunity”.

Shortly after, a man who identified himself as the commanding officer of the Moskva contacted her and told her that her son had “essentially sunk with the ship”, according to the BBC.

After the war began on February 24, the family contacted naval officers to inquire about the ship and were told that it was not taking part in military actions and was soon to return to port, said Maksim Savin.

Leonid’s calls had stopped, but after speaking with officers they received a letter from him saying he planned to be home soon, his brother said.

He said his younger brother, who had trained as an auto mechanic at a vocational school, had been reluctant to join the army and had not supported the war. A family photo shows a lanky young man in a sailor uniform with a rifle slung across his chest, surrounded by his parents and three brothers.

According to his brother, Leonid Savin was much more comfortable hiking in the Crimean hills with the family dog, reading a book or tending to his plants. He had planted a palm tree and an avocado tree before leaving for his military service.

“In his letter home, he asked how his plants were doing,” Maksim Savin said. “He was worried about them.

Elabor8 helps a bancassurance client develop a new test framework


As part of its multi-year digital strategy, a major bancassurance institution in Australia has partnered with consultants from Elabor8 to develop a new enterprise test automation platform.

With major regulatory initiatives, rapidly changing consumer behavior and a rapidly changing digital marketplace, the company’s strategy was to enable an economy of speed, enabling rapid innovation, streamlined delivery and faster time to market. fast. The success was supported by the development of a modern testing strategy centered on automation.

As part of this digital surge, the company aimed to modernize its online customer portals, consolidate its products and services on a single application, provide a better customer experience and improve growth opportunities.

However, with a highly siloed environment and extensive manual testing processes in place, the scope of testing quickly exploded. “Teams would operate in isolation, so whenever they wanted to increase the scope of testing, they would either duplicate efforts to create a bespoke automation framework or add more testers to run those test suites manually,” recalled Craig Harvey, head of Elabor8. Automation who ran the project.

“They were constantly on the lookout for additional testers and that quickly became a risk to the organization.”

Shortly after, the bancassurance company realized that this model was not sustainable. It was then that Elabor8 entered the fold. “We helped them reshape their thinking into value thinking,” Craig said. “Automation can bring a lot of value to an organization, but it’s all about having the right testing strategy in place to ensure that automation activities are yielding good returns.”

“We partnered with them for two years to co-design and implement a testing strategy and automation framework that would work for them,” Craig added. “We started small, working on an infrastructure migration to experiment and validate ideas, while learning the culture of the organization. This was essential for the next phase where we expanded horizontally across the organization . »

“We worked with teams to build capacity through a test-driven approach, while continuing to learn, experiment and validate; and feed those ideas back into the evolution of the automation framework. It was this integrated growth process that really made the whole thing so successful.

“Learning the culture early on allowed us to take a systematic approach, where we could look at everything from working methods to existing technology and capabilities. We even looked at how teams were breaking the rules to complete their work. – we called it “black market engineering”, where teams circumvented complex red tape to enable them to deliver.

“Obviously this is not healthy behavior, but it allowed us to see the true flow of the organization as it was.”

But it is from this behavior that a true digital amplifier was born. “We started researching how to remove the tape. We started sharing code, to the point where we could upload code libraries to a repository for other areas to consume – basically an internal github. We also started building self-service portals to platforms, allowing teams to take ownership of their own development journey. »

This formalized version of black market engineering practices energized teams, which consistently raised the bar across all delivery teams. “We found that code reuse had skyrocketed and, in turn, code quality had increased, which was extremely refreshing to see.”

Reap the benefits

Fast forward to today, and the bancassurance company can make changes quickly, knowing with confidence the high level of quality. Craig: “They have a modern, adaptive testing capability, consisting of an enterprise automation framework focused on customer experience and providing business assurance, with delivery teams having the freedom to shape their testing needs individual depending on the value and context of the deliverable.”

“All of this is nicely wrapped in a lightweight governance layer designed to enable teams, not restrict them.”

Several benefits are reaped in the process. In addition to labor cost savings from a focus on automation and faster delivery times with greater engineering capabilities, “we are also seeing an improvement in the customer experience with higher quality deliverables, and there is greater confidence across the organization in the delivery process.”

“Not to mention the advantage of being able to develop APIs and test suites in parallel for shared learning between developers and testers,” concludes Craig.

The very first 2023 BMW i7 electric limousine


Alongside the all-new 7 Series, BMW has launched what is arguably the most significant version of its new flagship luxury car: the BMW i7. From the outside, it’s easy to tell that the i7 is just a 7-series with its engine thrown in and a few electric motors thrown in. Okay, that’s kind of it, actually, but that’s a crude way of putting it. In reality, the BMW i7 is the most technologically advanced and luxurious car the Bavarian brand has ever made and it’s the car BMW needs to take it into the future.

Radical new design

i7 xdrive60 23 830x553

Looking at the BMW i7, it looks a lot like the 7 Series, almost identical in fact. It was intentional. BMW’s design team did not want customers to choose between the two cars based on style or design. Instead, the Bavarians wanted their customers to choose the 7 Series and then just choose their powertrain.

At the front, the BMW i7 and 7 Series have the same grille and the same new split headlights. Sure, some model variants have subtle variations, like the 760i’s dark trim around the grille, but they’re all the same, for the most part. The new split headlight design also looks great, giving the front end more visual verticality, reducing the visual impact of the large grille. While it’s bigger and cheekier than the previous-gen 7 Series, this new front-end design is actually better looking and less offensive.

bmw i7 xdrive60 07 830x553

A neat little visual trick up the i7’s sleeve is its LED-lit grille trim. Rather than the X7 and X6’s kind of kidney grille cascading lighting effect, the i7 actually lights up the grille trim and it’s much more visually interesting than the grille lighting of the aforementioned cars.

Split headlights do exactly what they say they do on the box – splitting the lighting jobs. The upper part of each headlight is responsible for the daytime running lights and the indicators, but has also been designed to represent BMW’s characteristic dual light effect. Underneath, the lower part is responsible for the driving and driving lights but is also tinted, so as to somehow hide in the background until needed.

Along the sides of the car, flush door handles, aero wheels and honest Hofmeister Kinks flank the BMW i7. It also has sophisticated Rolls-Royce-style automatic doors, which open and close at the push of a button. These aero wheels are big too, sitting at 19″ as standard, with 20″ and 21″ wheel options, including M Performance wheels.

However, it’s inside the i7 that gets really interesting. Again, just as with the exterior, BMW didn’t want customers to have to sacrifice interior luxury or comfort when choosing either the gasoline-powered 7 Series or the all-electric i7. The cabins are therefore almost identical. But that’s not a bad thing.

Front passengers are treated to an all-new dashboard layout that includes crystal-like illuminated trim, dubbed the “interaction bar,” which can change color and is one of the most unique features of any interior. BMW of history. Not only can the driver customize their color scheme, but they can also choose how they react to certain events, such as phone calls or welcome/goodbye effects.

Just like the BMW iX, the i7 also gets a two-spoke steering wheel, but this time it’s not hexagonal and has a flat bottom. Just like the iX, the center console features a rocker-switch gear selector and the same set of buttons and rotary dial. In front of this small cluster of buttons and switches are two cupholders, which are individually covered. It is an unusual design; not a bad or a good one, just very different; but it looks interesting and each cup holder is both heated and cooled.

Managing all the technology up front is BMW’s iDrive 8. It’s the exact same system found in the BMW iX and X7 LCI, meaning the i7 gets the same new infotainment system and digital driver display screen, both hip-mounted.

Move backwards and the technology multiplies. Rather than a single screen, passengers have up to three, one of which is optional and larger than all the other BMW i7 screens combined. In a standard BMW i7 rear seat, there are two screens, one in each of the rear door panels, located just in front of the armrest. These screens control everything the rear passengers could want; ambient lighting, air conditioning, sun visors and sunroof. Everything that can be controlled is controlled by said screens.

However, if you add the Theater Screen option, you get a massive 31″ 8k widescreen that folds down from the car’s headliner for a literal theater-like effect. It incorporates Amazon Fire TV, which allows passengers to watch any type of streaming content they can imagine, via the car’s own 5G data connection. Being Fire TV based, data from your Amazon Fire TV home app is transferred to the car, so if you’re watching a movie at home, take a break at any time and get in the car, the movie will resume from the same place in the back of your i7.

When using the movie screen, rear passengers can listen to their movies or shows through the all-new available 36-speaker, 1,965-watt Bowers & Wilkins Diamond Surround sound system with 4D audio that uses exciters in the front and rear seats. If you don’t specify that option, you’re still getting a Bowers & Wilkins system, but it’s 18 speakers and 655 watts. Or, rear passengers can use Bluetooth headphones to listen in, if they choose to do so privately.

Using that same data connection, the BMW i7 – and the entire 7 Series range – can become a device on your T-Mobile service plan. Which means if you connect your car to your plan and your phone dies or breaks down, you can just make calls and text with your i7. It’s like having a car phone again, only better.

Forget technology, let’s talk speed

Unfortunately for you tech haters, power lovers and old-school car enthusiasts, tech and speed are one and the same in the i7. The BMW i7 xDrive60 is powered by two electric motors, made without any rare-earth materials. Peak output is 536 horsepower and 549 lb-ft of torque, which ironically (or not so ironically) gives it the same output as the BMW 760i. According to BMW, 0-60mph occurs in 4.5 seconds and the i7 has a top speed of 149mph.

Those two electric motors, which provide torque-vectoring all-wheel drive, draw their power from a 101.7kWh (usable) battery pack, which is said to be capable of a range of up to 300 miles. This range figure is a figure estimated by BMW, based on EPA testing procedures.

Charging the BMW i7 is similar to charging the BMW iX. It can be charged at 11 kW AC or up to 195 kW on a DC fast charger. However, what differentiates the i7 from its big brother is its flatter charging curve. Due to improved cooling and software efficiency, the BMW i7 can charge at 195kW longer than the iX, allowing it to claw back 80 miles in just ten minutes. BMW has also partnered with Electrify America, to provide all i7 customers with three years of unlimited 30-minute fast-charging sessions, enough to nearly recharge the battery.

Without a doubt, the BMW i7 is the most advanced flagship vehicle the brand has ever produced. It takes the 7 Series’ claim of being the most luxurious BMW ever and adds to it, by having the most high-tech powertrain of them all. When 7 Series customers walk into dealerships, they’ll have the choice of getting a car that looks and feels exactly like the standard 7 Series, just with a quieter, smoother and more polar bear-friendly powertrain.

CyRC vulnerability scan: CVE-2022-1271 in gzip, but it’s not as bad as it looks


CVE-2022-1271 is a new vulnerability affecting gzip, a widely used open source component for archiving, compressing and decompressing files.

CVE-2022-1271, also tracked in the Black Duck Knowledge Base™ as BDSA-2022-0958, is a bug in gzip, a file format and software application used to archive, compress, and decompress files. Although a vulnerability in gzip has the potential to be cataclysmic, this vulnerability is actually in zgrep, a command used to search for a string in a gzip archive.

Using filenames with newlines can break zgrep, which could allow an attacker to overwrite arbitrary files. When GNU sed is also installed, the attacker can get the ability to execute code. Most applications won’t have gzip bundled in this way, but they could make a runtime call to a command line to invoke zgrep. In such a case, if the application uses unsanitized user input for the filename, the vulnerability could be exposed.

Container images used for cloud deployments will almost certainly have gzip. However, if you do not use the zgrep command, you will not be affected by this vulnerability.

Remediation efforts for CVE-2022-1271

Analysis of software composition (SCA) are designed exactly for this kind of situation. An SCA tool analyzes application source code and container images and compiles a catalog of open source software components, known as Materials Bill of Materials software (SBOM). When new vulnerabilities are discovered, such as CVE-2022-1271, a good SCA tool will proactively notify you so you can fix the problem immediately.

If your application uses zgrep and an attacker could supply filenames with newlines, you should update gzip to the latest version as soon as possible, which is 1.12.

Discover our video on CVE-2022-1271, which includes a demo.

IBM launches framework to achieve ESG objectives


IBM unveiled IBM Impact, which the Armonk-based company described as a new framework for its environmental, social and governance (ESG) goals.

Unveiled as part of its IBM ESG 2021 report, the IBM Impact Framework offers a series of commitments that include achieving net zero greenhouse gas emissions by 2030, diverting 90% of non-hazardous waste of landfill and incineration by 2025 and the launch of 100 customer commitments or research projects with environmental benefits by 2025.

The framework also aims to increase diversity, equity and inclusion by providing 30 million people of all ages with new job skills by 2030, generating 4 million volunteer hours by 2025, investing $250 million in apprenticeship and “new collar” programs by 2025 and directing 15% of its Tier 1 vendor spend to Black-owned vendors by 2025.

In addition, the framework aims to engage 100% of IBM suppliers in what it describes as “sound practices: while continuing to pursue a diversity-related compensation modifier for senior executives.

“IBmers have always used their time, talent and technology to make a meaningful impact in the world, evolving the nature of their work over time to meet society’s most pressing needs,” Arvind said. IBM CEO Krishna in a press statement. “As always, we stand ready to work with our customers, partners and governments to build a safer, more equitable and peaceful future.”

The Greatest Strategy Games of All Time, According to Ranker


With the highly anticipated launch of Company of heroes 3 on the horizon at the end of 2022, we could say that it is now the golden age of strategy games. Recent versions such as Crusader Kings III, Humanityand Age of Empires IV have proven to be a bright spot over the past few otherwise turbulent years in the gaming industry.

RELATED: 10 Best Free FPS Games Of All Time, According To Ranker

However, it was in the late 1990s and early 2000s that many of these beloved franchises, like Civilization and Starcraft, have taken on their full meaning. More than private soldierThousands of Armchair Generals have voted to find out which strategy games are the best of the best.

ten Company of Heroes (2006)

Company of Heroes Gameplay

An innovator in the real-time strategy subgenre, A company of heroes is set during World War II and follows the 101st Airborne Division during the liberation of France in 1944. A company of heroes introduced a unique strategic control point system that gives reinforcement points based on controlling strategic points.

Upon its release, A company of heroes received near universal praise, with many reviewers praising its gritty historical setting and unique design, praising it as one of the best historically accurate WW2 games. A company of heroes quickly spawned a successful franchise, with Company of heroes 3which will be released at the end of 2022 with a revamped dynamic campaign.

9 Rise of Nations (2003)

Rise of Nations gameplay.  Tanks against stealth bombers.

The brainchild of prolific game designer Brian Reynolds, best known for his work on Civilization, Rise of Nations Uniquely blends real-time strategy and turn-based strategy elements. Players must guide one of 18 playable civilizations, as they traverse 8 different historical ages. Rise of Nations may not guarantee historical accuracy, but it allows players to forge their own history.

Upon its release, Rise of Nations won several Strategy Game of the Year awards. With reviewers praising its intuitive interface and addictive game design. In 2008, a scientific study found that Rise of Nations improved a number of “essential cognitive skills” in older adults, through “nation building and territorial expansion”.


8 Warcraft III: Reign of Chaos (2002)

Gameplay of Warcraft III: Reign of Chaos

The third entry into high fantasy Warcraft fictional universe, Warcraft III: Reign of Chaos uses a real-time strategy design as players build units, create bases, and collect resources to defeat an army of the undead that have invaded Azeroth.

Warcraft 3 also adds a multiplayer mode based on skill-based matchmaking. Many critics praised Warcraft 3 advanced 3D graphics and atmospheric soundtrack. In 2020, Warcraft 3 has been remastered as Warcraft III: Reforged. Although this upgrade featured improved visuals, some reviewers were disappointed with the technical issues and missing features that plagued the game upon release.

7 Command & Conquer: Red Alert (1996)

Gameplay of Command & Conquer: Red Alert, as forces clash in the snow.

A real-time strategy game set in an alternate reality version of the 1950s Cold War, Command & Conquer: Red Alert players mine resources, build bases, create vehicles, and train troops to fight the Soviets for control of Europe.

Which makes Command & Conquer: Red Alert so unique is its hilarious and convoluted plot, which takes Albert Einstein back in time to kill Hitler, but then prompts a new timeline where Joseph Stalin is about to invade Europe. This memorable story is brought to life by a number of humorous live-action cinematic sequences.

6 Medieval II: Total War (2006)

Gameplay of Medieval II: Total War.  An army standing against a castle.

The sequel to the incredibly successful first entry of the same name, Medieval II: Total War is arguably superior to its predecessor in every way. the total war uniquely combines elements of a strategic turn-based campaign and real-time tactical battles with thousands of soldiers.

RELATED: The 10 Best Total War Games, According To Metacritic

The campaign spans from the 11th to 16th centuries and allows players to control one of many playable nations from medieval Europe, North Africa or the Middle East. The game received much critical acclaim upon release, even from historians, who praised its realism and authenticity at the time.

5 Starcraft (1998)


A spin-off from Warcraft Blizzard Entertainment series, StarCraft takes the same real-time strategy mechanics but places them in space, blending military and sci-fi genres. The story revolves around three alien species fighting for dominance of the galaxy.

Widely regarded as one of the greatest RTS games, StarCraft and its sequel Starcraft II are still games worth playing, especially in South Korea where there is a multi-million dollar professional competition circuit for StarCraft and its sequels.

4 Rome: Total War (2004)

Total War Rome Remastered Header

Frequently touted as the greatest historical strategy game by critics and gamers alike, Rome: Total War perfected total warunique blend of “real-time tactical battles and strategic turn-based campaign”. In this game, players take control of one of Rome’s three great patrician houses and set out to conquer the known world.

Many elements have come together to create this masterpiece, from its stunning 3D graphics, to its historically accurate combat tactics, to its heart-pounding original soundtrack, which received a BAFTA award in recognition. In 2021, Rome: Total War has been remastered with a number of graphics and gameplay improvements.

3 Civilization V (2010)

Undoubtedly the most accessible and intuitive entrance to Sid Meier’s Civilization series, Civilization V built on lessons learned from its predecessors. As in previous versions, players take control of one of the world’s great civilizations and guide them through the ages of history.

RELATED: 10 Best Story-Based Games Releasing In 2021

Particularly, Civil 5 was built on a new engine that hexified the once square world of civil, giving gameplay a more dynamic flow. New features were also added such as city-states, revamped culture system and ideologies, which came together to make Civil 5 one of the top ranked Civilization series games.

2 Command & Conquer: Red Alert 2 (2000)

Command & Conquer: Red Alert 2 gameplay, as tanks attack a Kremlin building.

In a rare example of a sequel that surpasses the original in almost every way, Command & Conquer: Red Alert 2 follows a plot just as ridiculous as its predecessor, with players commanding Soviet or Allied troops in an alternate universe with advanced technology.

When he came out, Red Alert 2 was one of the best-selling games of the 2000 holiday season. Reviewers found much to like about the game, with its well-balanced armies, new building mechanics, and the perfect balance of fast-paced action and reflection noted as strengths.

1 Age of Empires II: Age of Kings (1999)

Gameplay of Age of Empires II - The Age of Kings, as a city slowly builds,

A classic 1990s RTS strategy game, Age of Empires II: Age of Kings takes place in the Middle Ages with players taking control of one of thirteen playable civilizations. In this game, players gather resources which they then use to build armies and build cities as they fight with enemy armies.

Upon its release, Age of Empires II was widely acclaimed and considered the gold standard for future RTS games. Many reviewers praised its attention to realism, epic atmosphere, and a host of new features. Over all, Age of Empires II proved for the first time that the video game could be a work of art, just like painting or cinema. The recently published Age of Empires IV allows players to continue their journey.

NEXT: 10 Best Strategy Games You Need To Play Before Age Of Empires IV

Split image showing Indiana Jones And The Staff Of Kings and X-Men Origins Wolverine game covers

Impressive forgotten video game mechanics

Metrics For Success—The Strategic Technology Framework: The OPEN MINDS Management Newsletter, April 2022


Growth Strategy = Technology Strategy

Read more

Tech For Success: How to assess the readiness of current technology capabilities for future growth

Read more

Metrics-Based Management: Using Analytics for Strategy Implementation and Business Optimization

Read more

The Four Pillars of Strategic Technology Success

Read more

Leveraging real-world data at Emory Healthcare


Ryan Haumschild, PharmD, MS, MBA: Well, I really want to talk with all of you about the innovative ways we’re leveraging real-world data to support personalized care. And I think personalized care has been a hot topic lately, especially since we’ve been talking about it forever, making sure that we’re inclusive for all types of patient populations and especially for patients who do not respond well to therapy. Over time, we see increased cost of care, poorer outcomes, and reduced patient-reported outcomes and quality of life. And so, that’s something that an integrated delivery network across the country as paying arms, really needs to start considering. It’s something that really hit the peak for us. When we think of a specific disease state like plaque psoriasis, there are a number of agents in space. And sometimes it’s very easy to focus on how the patients are doing, what are the main treatments we want to consider, what should our technical payer coverage be for certain selected agents, and how can we streamline our selection. Because at the end of the day, we always try to do the best on behalf of the patients and the employer group and considering the total cost of care.

One of the things we looked at when we started to dig a little deeper into this is that we found that there is a stronger link between metabolic syndrome and plaque psoriasis. If we look back at some of the primary literature that initiated this hypothesis, it really comes from the United States, but really also from the European world in terms of dermatology, where they saw a strong link in terms of scores and responses dermatological treatments for patients with metabolic syndrome. And they seem to be sort of disparate differences in responses between patient populations. So not only do you want to consider that, but when we look at the paying arm, we also want to consider what the cost of care is. If we have patients, as we talked about earlier in this session, who switch agents, that’s really a unique consideration we want to think about. We’ve talked about some of the downsides of switching, especially in patients with metabolic syndrome, because they may be less likely to go ahead and fill that medication, less likely to be supportive and continue on new drugs. There is also rehabilitation on medication. And all of this plays a role.

I think on top of that, as we start to switch these patients, there’s a period of re-induction that Dr. Lebwohl talked about. Really, when we think about this re-induction period, it also drives up the cost of care on the continuum for this patient population. If we have patients who might be more difficult to treat, with metabolic syndrome, how do we identify a more specific drug early on to make sure we get the best results right away, instead of taking them from maybe 2 to 3 therapies before finally choosing the right choice. One of the ways we really want to analyze that data and dig deeper is how to leverage our electronic medical record data, our specialty pharmacy data to see how patients are doing. I think through this investigation we were able to determine that the cost of care is higher in patients with metabolic syndrome as a comorbidity with plaque psoriasis. This hypothesis is something that we have definitely acknowledged.

We want to dig deeper to think about it, not only do we want to know more, we might have favorite products, but we might look at some drugs that treat metabolic syndrome and plaque psoriasis well that may not be the product favorite overall. And so how do we focus on creating care pathways so that we can get that patient the right medication sooner instead of putting them through different therapies or re-starting multiple different therapies when they fail to ultimately get there ? And I think that’s a key consideration that we’re looking at, especially in this patient population with plaque psoriasis. And we’re looking at some of the resurface data, and we’re looking at tildrakizumab, and we’re looking at some of these different clinical indicators, we’re seeing that there’s data starting to emerge that says, hey, if your patient population is starting this treatment sooner, they will get better overall results. And if they have better overall results, you’ll likely have a decrease in total cost of care, and you won’t have to initiate multiple different drugs throughout the process or biologics that result in a higher cost of care.
When we looked at tildrakizumab, we found that it seemed really appropriate. How do we create a pathway for this drug to see in the real world if we create better access to this drug earlier in therapy, do we see a reduction in care? Are we witnessing a better control of the disease? Are we seeing better control of some of these comorbidities as Dr. Shaw mentioned earlier with some of this quality of life data in terms of arthritis and some of these other things that tend to fill up within of this patient population? So those are the things that we’re trying to think about and how we’re evaluating a single pathway on the payer arm, as well as protocols on the health care side that would align to really improve overall care for the patient population.

So as we see that continue to grow and as we continue to look at some of these unique patient populations in oncology, plaque psoriasis, and rheumatology, that’s kind of where we think the forefront of research and patient treatment goes, and this has more of a personalized approach while considering the cost, but a more personalized approach with qualifying data there, maybe of 2 ICD-10 codes that indicate the metabolic syndrome and plaque psoriasis. And that can be a pre-qualifier for earlier access, earlier treatment, and ultimately more specific, higher-quality patient care.

Transcripts edited for clarity.

Browsers crash with error code 0xc0000022 after installing Windows April 2022 updates


Microsoft released updates for its Windows operating systems on April 2022 Patch Day. The company didn’t highlight any major issues in the release notes, and installation appears to have gone smoothly on most devices.

Some users report that they can no longer launch popular web browsers after installing the latest Windows updates. The error message “the application was unable to start correctly (0xc0000022)” is thrown on these devices, and the problem seems to affect browsers such as Firefox, Chrome, and even Microsoft’s own Edge browser.

Reports suggest that the issue does not affect all browsers, and users who are affected by it may want to try other ones, for example, Brave or Vivaldi, to see if those can be launched. Uninstalling updates, for example KB5012599, fixes the problem.

A search of Microsoft’s Feedback Hub returns multiple reports of the issue. Some reports were released in the last 24 hours, but others were released months ago in Insider builds.

After installing KB5012599 I got error 0xc0000022 when launching Edge, Firefox and Chrome, so they no longer work. Luckily, Vivaldi and Brave work perfectly, so I can still access the internet.
Uninstalling KB5012599 resolves this issue.

The low number of reports on the Feedback Hub suggests that the issue may not be widespread. Still, some users report crashes after installing updates.

Reports suggest that Windows 10 and Windows 11 devices are affected by the issue. Microsoft has yet to respond to the complaints.

Although this seems to be a problem caused by the latest Windows updates, some suggest that anti-virus products could also play a role. Windows Latest specifically mentions ESET, but it’s possible that other antivirus solutions are also causing the problem.

Affected users who have to use crashing browsers may need to uninstall the update to resolve the issue.

Point: See our instructions on uninstalling Windows updates if you need help.

Now you: are you affected by accidents?


Browsers crash with error code 0xc0000022 after installing Windows April 2022 updates

Article name

Browsers crash with error code 0xc0000022 after installing Windows April 2022 updates

The description

Learn how to fix browser opening issue with error code 0xc0000022 after installing recent Windows updates.


Martin Brinkman


Ghacks Technology News



Niti Aayog conducts workshop on India-UN cooperation framework


Government think tank Niti Aayog announced on Wednesday that it has organized a one-day national validation workshop on the upcoming India-UN Sustainable Development Cooperation Framework (UNSDCF) 2023-2027. The 2023-2027 cooperation framework will be signed as India completes 75 years of independence, he added.

The workshop provided an opportunity to revisit and revitalize the various contours of the partnerships between the Government of India and the UN to make them more robust and relevant to meet the demands of a new India, said the Vice President of Niti Aayog, Rajiv Kumar. Niti Aayog said in a statement that it was the first such congregation attended by officials from 30 Union ministries, heads of 26 UN agencies and representatives from all states and territories. of the Union of the country.

According to the statement, the 2023-2027 framework seeks to align the four pillars of the UN’s 2030 Agenda for Sustainable Development – People, Prosperity, Planet and Participation – with India’s national priorities. and to guide the efforts of all United Nations entities working across the country. The framework will contain the shared vision and strategies for a more resilient, inclusive and sustainable India, he said.

(This story has not been edited by the Devdiscourse team and is auto-generated from a syndicated feed.)

First Look at the 2023 Jeep Grand Wagoneer L


What is the Jeep Grand Wagoneer L?

The 2023 Jeep Grand Wagoneer L is a new stretched version of the large and luxurious Grand Wagoneer that debuted last year. From nose to tail, it’s a foot longer, with 7 of those inches added between the front and rear axles. Passenger space in the second and third rows remains the same as in the standard Grand Wagoneer, which is already roomy enough for adults in any seat. Cargo capacity is where the new L makes huge gains.

You can now fit up to 44.2 cubic feet of cargo behind the third row, compared to the regular Grand Wagoneer’s 27.4 cubic feet. That also translates to 88.8 cubic feet behind the second row (with the third row folded) and a maximum capacity of 130.9 cubic feet with both rows folded. The standard models contain 70.8 cubic feet and 116.7 cubic feet respectively. Jeep boasts that you can fit a full sheet of plywood behind the Grand Wagoneer L’s front seats with room to spare.

There are also changes under the hood, with the discontinuation of the 6.4-litre V8 from the previous Grand Wagoneer. The Grand Wagoneer L comes with the new 3.0-liter “Hurricane 510” inline-six engine, which is twin-turbocharged and rated here at 510 horsepower and 500 lb-ft of torque. That compares favorably to the old V8’s 471 hp and 455 lb-ft. Jeep also claims the new engine will improve fuel economy by 1 or 2 mpg.

Finally, there’s a Carbide package that adds gloss black exterior treatments. These include unique wheels, grille elements, mirror caps and headlight trim. Inside, you get similar treatments to the dashboard and seats.

Digitalage introduces the SocialSoundtrax™ suite of tools to


SocialSoundtrax™ enhances the platform’s capabilities through easy-to-use step-by-step tools to add up to five music tracks to your posts.

Temecula, Calif., April 12, 2022 (GLOBE NEWSWIRE) — via NewMediaWire — Hop-on, Inc. (OTC: HPNN) and Digitalage present SocialSoundtrax™ which will be available on the rising social media platform. Digitalage listens and provides the latest technology and easy-to-use tools for content creation.

Curt Doty, CCO, says, “SocialSoundtrax™ enhances the platform’s capabilities with easy-to-use step-by-step tools to add up to five music tracks to your posts. At launch, power users and casual users alike can create dynamic and engaging content that will add value to your follower base.

With the current popularity of TikTok and Facebook’s copy of Reels, adding music to your posts is a huge trend and with recent offerings, Digitalage has allowed more music than either platform. .

Over the past year, Digitalage has designed its own source code for its in-house developed platform using Web3 technologies, adding to its already extensive menu of features. Once published, creators and non-creators alike can create, distribute, and monetize content easily, quickly, and most importantly, efficiently. The Digitalage workspace will have more robust authoring tools as other platforms try to compete to keep creators within their new walled gardens.

Curt Doty continues: “SocialSoundtrax™ is reinventing the way to add music to user content to create explosive and catchy messages. Our goal was to create a GUI that was fairly easy to use, but produced great results. »

To see a demonstration of how to use SocialSoundtrax™, go to:


About Digitalization:

With offices based in Santa Fe, New Mexico, Digitalage’s mission is to lead the social media industry by fighting content piracy and empowering publishers, influencers and contributors. Digitalage is revolutionizing the economy of creators and will allow users to connect, download and share content, while remunerating rights holders through the use of decentralized Web3 blockchain technologies.









About Hop-on

Hop-on, Inc. (OTC: HPNN) is a US-based global leader in the development and manufacture of electronics, distributed software, and telecommunications hardware and services, capitalizing on its secure core license agreements for mobile and computer technologies. Since 1993, the Company has a proven track record of innovation and market development. From the development of the world’s first CDMA disposable cellphone to the upcoming Digitalage decentralized social media platform promoting data portability and freedom of expression and the essential engineering tools for content protection and royalty management on social platforms and devices, the company works closely with inventors and patent holders to bring the latest technologies to demanding markets.





Peter Michaels, CEO

[email protected]


Forward-looking statements: https://www.hop-on.com/forward-looking-statements

Certain statements in this press release may contain forward-looking information within the meaning of Rule 175 of the Securities Act of 1933 and are subject to Rule 3B-6 of the Securities Exchange Act of 1934, and are subject to the safe harbor created by these rules. All statements, other than statements of fact, included in this release, including, without limitation, statements regarding the Company’s potential future plans and objectives, are forward-looking statements that involve risks and uncertainties. There can be no assurance that such statements will prove to be accurate and other subsequent results and events could differ materially from those anticipated in such statements. Future events and actual results could differ materially from those stated, contemplated or underlying the forward-looking statements.

Aircraft Turbine Engine Flow Meter and Pressure Sensors Market Size, Scope and Forecast


New Jersey, United States – This Aircraft Turbine Engine Pressure and Flow Meters Market The report provides a comprehensive overview of significant aspects that will drive market growth such as market drivers, restraints, prospects, opportunities, restraints, current trends, and technical and industrial advancements. The detailed study of the industry, development and improvement of the industrial sector and the new product launches described in this report on the market report is an extraordinary help for that the new key players in the commercial market are entering the market. This Aircraft Turbine Engine Pressure and Flow Meters Market report performs a careful assessment of the market and provides expert analysis of the market considering the trajectory of the market considering the current market situation and projections future. This Aircraft Turbine Engine Pressure and Flow Meter Market report study further highlights the market driving factors, market overview, industry volume and market share. Since this Aircraft Turbine Engine Pressure and Flow Meters Market report provides an effective market strategy leading players can earn huge profits by making the right investments in the market. As this report on Aircraft Turbine Engine Flow Meters and Pressure Sensors market depicts the ever-changing needs of consumers, vendors, and buyers across different regions, it becomes easy to target specific products and achieve significant revenues in the global market.

Get Sample Full PDF Copy of Report: (Including Full TOC, List of Tables & Figures, Chart) @ https://www.verifiedmarketreports.com/download-sample/?rid=514686

This Aircraft Turbine Engine Pressure and Flow Meters Market report sheds light on few key sources which can be applied in the business to get the best results and revenue. It also covers some essential ways to manage global freedoms on the prowl and grow the business. With this well-founded market research, key players can easily earn a visible spot on the prowl. It also captures the global impact of COVID-19 on various industries and nations. This exploration report paints a fair picture of the future development drivers, restraints, fierce scene, section survey and insightful market size of Country and District Surveys for the definition period 2022- 2029. This market report also provides information on industry patterns, slices of the pie, development openings and difficulties. It further conducts the market review to indicate the progression patterns, strategies, and procedures followed by the major participants.

Key Players Mentioned in the Aircraft Turbine Engine Flow Meters and Pressure Sensors Market Research Report:

AMETEK, Crane, Eaton, Flow Technology, Senior Aerospace Ketema, HarcoSemco, Meggitt Sensing Systems, Rolls-Royce Controls, Titan Aviation

Global Aircraft Turbine Engine Flowmeter and Pressure Sensors Market Segmentation:

By Product Type, the market is primarily split into:

• Flow meter and pressure sensors for turbofan
• Flow meter and pressure sensors for turboprops

By application, this report covers the following segments:

• Narrow-body aircraft engine
• Wide body aircraft engine

The strategic analysis performed in this Aircraft Turbine Engine Flow Meters and Pressure Sensors Market analysis includes aggregate information regarding market environment, pricing structure, customer buying behavior and micro trends. and macro. Also, it aims to cover the geographical analysis of major regions such as Asia-Pacific, North America, Europe, Latin America, Middle East and Africa. Some of the key players are mentioned in this Aircraft Turbine Engine Pressure Sensors and Flow Meters Market report along with their strengths, weaknesses and the strategies they are adopting. It further talks about major segments, market shares, market size, and secondary drivers. Detailed data about the current market developments and the overall market scenario are presented here.

Get a discount on the purchase of this report @ https://www.verifiedmarketreports.com/ask-for-discount/?rid=514686

Scope of Aircraft Turbine Engine Flow Meters and Pressure Sensors Market Report

UNITY Value (million USD/billion)
SECTORS COVERED Types, applications, end users, and more.
REPORT COVER Revenue Forecast, Business Ranking, Competitive Landscape, Growth Factors and Trends
BY REGION North America, Europe, Asia-Pacific, Latin America, Middle East and Africa
CUSTOMIZATION SCOPE Free report customization (equivalent to up to 4 analyst business days) with purchase. Added or changed country, region and segment scope.

Geographic segment covered in the report:

The Aircraft Turbine Engine Flowmeter and Pressure Sensors report provides information about the market, which is segmented into sub-regions and countries/regions. In addition to the market share in each country and sub-region, this chapter of this report also contains information on profit opportunities. This chapter of the report mentions the market share and growth rate of each region, country and sub-region over the estimated period.

• North America (USA and Canada)
• Europe (UK, Germany, France and rest of Europe)
• Asia-Pacific (China, Japan, India and the rest of the Asia-Pacific region)
• Latin America (Brazil, Mexico and rest of Latin America)
• Middle East and Africa (GCC and Rest of Middle East and Africa)

Answers to key questions in the report:

1. Who are the top five players in the Aircraft Turbine Engine Flow Meters and Pressure Sensors market?

2. How will the Aircraft Turbine Engine Flow and Pressure Sensor Market change in the next 5 years?

3. Which products and applications will occupy the lion’s share of the Aircraft Turbine Engine Flow Meters and Pressure Sensors market?

4. What are the drivers and restraints of Aircraft Turbine Engine Flow Meter and Pressure Sensors Market?

5. Which regional market will show the strongest growth?

6. What will be the CAGR and size of the Aircraft Turbine Engine Flow Meter and Pressure Sensors market throughout the forecast period?

For more information or query or customization before buying, visit @ https://www.verifiedmarketreports.com/product/aircraft-turbine-engine-flowmeter-and-pressure-sensors-market-size-and-forecast/

Visualize Aircraft Turbine Engine Flow Meters and Pressure Sensors Market Using Verified Market Intelligence:-

Verified Market Intelligence is our BI platform for market narrative storytelling. VMI offers in-depth forecast trends and accurate insights on over 20,000 emerging and niche markets, helping you make critical revenue-impacting decisions for a bright future.

VMI provides a global overview and competitive landscape with respect to region, country and segment, as well as key players in your market. Present your market report and results with an integrated presentation function that saves you more than 70% of your time and resources for presentations to investors, sales and marketing, R&D and product development. products. VMI enables data delivery in Excel and interactive PDF formats with over 15+ key market indicators for your market.

Visualize the Aircraft Turbine Engine Flow Meter and Pressure Sensor Market Using [email protected] https://www.verifiedmarketresearch.com/vmintelligence/

Most Popular Reports

Global Golf GPS Handheld Devices Market Size and Forecast

Global Golf GPS Wristwatch Market Size and Forecast

Global Water COD Testing Instruments Market Size and Forecast

Global Water TOC Testing Instruments Market Size and Forecast

Global Near Infrared Spectrum Analyzer Market Size and Forecast

Global Aircraft Turbine Engine Pressure and Flow Meters Market Size and Forecast

Global Narrow Body Aircraft Engine Market Size and Forecast

Global Aviation Life Rafts Market Size and Forecast

Global Pin Connector Market Size and Forecast

Global Motorized Uncoiling Machines Market Size and Forecast

About Us: Verified Market Reports

Verified Market Reports is a leading global research and advisory company serving over 5000 global clients. We provide advanced analytical research solutions while delivering information-enriched research studies.

We also provide insight into the strategic and growth analytics and data needed to achieve business goals and critical revenue decisions.

Our 250 analysts and SMEs offer a high level of expertise in data collection and governance using industry techniques to collect and analyze data on over 25,000 high impact and niche markets. Our analysts are trained to combine modern data collection techniques, superior research methodology, expertise and years of collective experience to produce informative and accurate research.

Our research spans a multitude of industries, including energy, technology, manufacturing and construction, chemicals and materials, food and beverage, and more. Having served many Fortune 2000 organizations, we bring a wealth of reliable experience that covers all kinds of research needs.

Contact us:

Mr. Edwyne Fernandes

USA: +1 (650)-781-4080
UK: +44 (753)-715-0008
APAC: +61 (488)-85-9400
US toll free: +1 (800)-782-1768

E-mail: [email protected]

Website: – https://www.verifiedmarketreports.com/

How to uninstall apps on Windows 11: Remove system, hidden and frame apps


Although Windows 11 is packed with new features, it’s also true that it includes a lot of preloaded apps that you don’t actually need. That’s why we wrote a tutorial on how to deflate Windows 11 to speed up your computer. If you don’t want to go down the unblocking route and are just looking to uninstall unnecessary apps, you’ve come to the right place. In this guide, we’ve included several ways to uninstall apps on Windows 11, from removing Microsoft Store apps to system apps that you can’t uninstall from Control Panel or Windows Settings. So, on that note, let’s go ahead and learn how to uninstall apps on Windows 11.

Uninstall Apps on Windows 11: 5 Methods Explained (2022)

We have mentioned five easy ways to uninstall apps on Windows 11 in this guide. The first three methods are built into Windows 11, but if you want more options and want to remove system, hidden, and frame apps, skip to the fourth section of this tutorial using the table below.

The easiest way to uninstall apps installed on your Windows 11 computer is from the Start menu. This is how it works:

1. Open the Start menu and simply right click on the app you want to remove if it’s pinned here and click “Uninstall”. The app will be deleted immediately.

2. You can also click on “All Apps” in the Start menu and uninstall all installed applications from your computer.

Uninstall Apps on Windows 11 from Start Menu

2. If you uninstall a Win32 app from the Start menu, you will be redirected to the Control Panel. I have explained below how to uninstall apps from Control Panel, so follow the instructions given there.

Uninstall Apps on Windows 11 from Start Menu

Uninstall Apps on Windows 11 from Control Panel

Another simple and one of the most popular ways to uninstall apps on Windows 11 is to use the good old Control Panel. This is how it works:

1. Use the Windows 11 keyboard shortcut “Windows + R” to open the Run prompt. Here, type appwiz.cpl and press Enter.

Uninstall Apps on Windows 11 from Control Panel

2. This will directly open the Programs and Features window. Here, right-click on the app you want to remove and select “Uninstall“.

Uninstall Apps on Windows 11 from Control Panel

3. Now follow the on-screen instructions, and that’s all. You have successfully uninstalled a program from your Windows 11 PC.

Uninstall Apps on Windows 11 from Control Panel

Uninstall Programs on Windows 11 from Settings

Apart from Control Panel, you can also uninstall apps from Windows 11 Settings page. The good thing about this method is that Windows Settings lists all system apps and Microsoft Store in one place. You can uninstall all Microsoft Store apps on Windows 11 and some system apps can also be removed. Here’s how to remove apps and programs on Windows 11 from the Settings app.

1. Use the keyboard shortcut “Windows + I” to open Settings and navigate to the “Applications” section on the left sidebar. Then click “Apps and features” in the right pane.

Uninstall Programs on Windows 11 from Settings

2. The Settings app will load all system and third-party apps installed on your Windows 11 PC. Here, click on the three-dot menu and choose “Uninstall” for the app you want to remove.

To note: Not all system apps can be uninstalled from Windows Settings. So, if you want to uninstall them, proceed to the next section.

Uninstall Programs on Windows 11 from Settings

3. Again, click “Uninstall” in the context menu, and you’re done. In a few seconds, the program will be removed from your Windows 11 computer.

Uninstall Programs on Windows 11 from Settings

Remove system and hidden apps on Windows 11 with O&O AppBuster

If you are looking for a utility to remove system and hidden apps on Windows 11, I highly recommend O&O AppBuster. It’s a 1.5 MB program which does not require installation. Just run it and the program will scan your PC and show all programs including user installed apps, hidden system required apps, Store apps and framework apps. You can choose your choice of apps and remove them from Windows 11 with just one click. O&O AppBuster also creates a system restore point if something goes wrong, and you can roll back to the original state.

1. First, go ahead and download O&O AppBuster from the link here. It’s a free app from O&O, just like ShutUp10 that we used to make Windows 11 a privacy-friendly operating system.

2. Next, run the AppBuster program. Instantly, it will scan your PC and list all removable applications. Now select apps and click “Eliminate“. Here you can select and remove system apps that were previously unremovable from Windows settings.

Remove system and hidden apps on Windows 11 with O&O AppBuster

3. At the next prompt, just click “OKAY“.

Remove system and hidden apps on Windows 11 with O&O AppBuster

4. After that, click “Yes” to automatically create a system restore point.

Remove system and hidden apps on Windows 11 with O&O AppBuster

5. And that’s about it. Selected apps will be uninstalled from your Windows 11 PC immediately.

Remove system and hidden apps on Windows 11 with O&O AppBuster

6. If you want to dig deeper and uninstall framework apps and other system apps from Windows 11, click “View” on the top bar and enable them. After that, select the apps and uninstall them.

O&O App Buster

7. Finally, if you uninstalled a program by mistake and want it back, select it and choose “Install”. AppBuster will immediately restore that specific app for you.

O&O App Buster

Delete Windows 11 apps with PowerShell

Besides EXE programs, Windows 11 comes with Appx packages that require uninstallation from the PowerShell terminal. If you want to remove these Windows 11 apps with PowerShell, follow the steps below:

1. First, press the Windows key once and search for “Powershell”. Now click on “Execute as administrator ” on the right pane.

Delete Windows 11 apps with PowerShell

2. In the PowerShell window, run the command below to view all installed apps. Now write down the name of the app you want to uninstall.

Get-AppxPackage | Select Name
Delete Windows 11 apps with PowerShell

3. Then run the below command to uninstall the app using Powershell on Windows 11. Here make sure to replace the appname with the actual app name you noted above.

Get-AppxPackage *appname* | Remove-AppxPackage -AllUsers
Delete Windows 11 apps with PowerShell

4. That’s it. The program will be uninstalled immediately from your Windows 11 PC.

Uninstall Microsoft Store apps, system apps and more from Windows 11

So here are the five ways to uninstall programs including Camera app, Xbox app, Store apps, etc. from Windows 11. ‘application’, use O&O AppBuster or PowerShell to remove these apps immediately. Anyway, it all comes from us. If you want to boot Windows 11 in safe mode and uninstall apps from isolated environment, you can follow our linked article. And if you want to factory reset your Windows 11 PC without any data loss, we have a detailed guide in place for that as well. Finally, if you have any questions, let us know in the comments section below.

Driving east to the Front Range soon? Here’s what to expect on I-70.

Work on exit 205 has been postponed until Thursday. Several projects will take place on Interstate 70 this spring and summer.
Tripp Fay/For the Summit Daily News

This week marks the first part of the Colorado Department of Transportation’s large-scale Frisco-Silverthorne project. This work begins under Interstate 70 at exit 205, but there are other projects travelers should be aware of before planning trips along the corridor in the spring and summer.

Originally scheduled for Monday, April 11, work under the I-70 bridge was delayed due to winter weather forecast for Tuesday and Wednesday. If the wintry weather continues for the rest of the week, it could be delayed further. For the most part, crews will work this area at night, but there is a possibility of daytime work.

Elise Thatcher, regional communications manager for CDOT’s northwest region, said the department is planning work starting Thursday, April 14. For the project, the left-turn lanes from the exit onto I-70 will be shortened. Even if there will be mainly night work, the lanes will be shortened day and night. They will return to their original length by July 1, Thatcher said.

“Most of the above work on I-70 will take place next season in 2023,” Thatcher said. “I-70 lane closures will also be limited to the CDOT Lane Closure Strategy, which is overnight work and typically 7 p.m. to 9 a.m. for eastbound I-70. There may be traffic impacts just because the crane is visible. If there is daytime construction on I-70 eastbound, there should be two lanes open.

Exact hours for night work depend on location, Thatcher added. On the eastbound portion, estimated working hours are 7:00 p.m. to 9:00 a.m. Specifically for work on exit 205, hours are scheduled for 8 p.m. to 6 a.m. after the traffic volume decreases at the end of the ski season.

“All US 6 and Colorado 9 lane closures will be recovered by 6 a.m., regardless of traffic volumes, to avoid impacting morning rush hour traffic,” Thatcher wrote in a statement. E-mail.

Due to other construction, drivers traveling between Denver and the West Slope will see several of the department’s projects on the highway. Grant Anderson, a CDOT engineer, told Silverthorne City Council during its last business session that the department is aware of back-to-back projects and that construction crews will contact the public in the event of traffic delays.

“(Some work will) run into this project on the east end,” Anderson said. “To the east, we will complete the replacement of the structure during the rotation of the crates. Everyone has seen this since last summer. For the public, really our problem and our challenge as a team is that it’s going to feel like a giant work area. We will receive complaints in a single complaint line for unrelated projects, and we will have to manage this. »

In addition to projects west of Summit County, such as on Vail Pass, CDOT is looking to work on several projects east of the county.

Replacement of the structure west of the Eisenhower-Johnson Memorial Tunnels

Teams from this project are also expected to return in April. This project is to replace a single-lane concrete culvert, or drainage structure, that was constructed in the late 1960s during the original construction of I-70. Located 2.6 miles west of the tunnels, this project began last year. From May to September, two westbound and three eastbound lanes will be open, but there will be various lane closures.

“The project will initially consist of constructing the remaining eastbound bridge, the median guardrail and the concrete barrier. Once construction of the bridge and median is complete, crews will repave and repaint I-70 through the project boundaries,” CDOT’s project information reads.

The Colorado Department of Transportation plans to pursue a project that will close at least one lane of Interstate 70 just west of Silverthorne.
Colorado Department of Transportation/Courtesy Photo

CDOT will also complete a new underpass and the reconstruction of approximately 1,900 feet of the access road under I-70.

“When work resumes in the spring, another main focus will be finer detail work; namely erosion control measures, landscaping and aesthetic elements,” the project information continues. “Much of this work is weather dependent and needs to be done during warmer temperatures.”

Speed ​​limit signs between Empire and Idaho Springs

Beginning in 2021, this project focused on installing electronic variable speed limit signs along I-70. Using the LED display, the speed limit can be changed to better suit highway conditions as needed depending on traffic speed and volume, weather conditions, roads and traffic incidents.

In 2022, drivers should expect to see the department begin testing signs between Empire and Idaho Springs. Detection tests for these panels are expected to continue throughout the spring.

The Colorado Department of Transportation will test its variable speed limit signs between Empire and Idaho Springs in the spring of 2022.
Colorado Department of Transportation/Courtesy Photo

Clear Creek Greenway near Idaho Springs

Crews will construct a trail network that includes two project segments near I-70 between Idaho Springs and Dumont at mileposts 235 and 242. No I-70 lane closures are planned for this project, but roadside operations Traffic control and signage will be in effect. to mobilize heavy machinery via Riverside Drive.

Caesars Sportsbook Promo Code Activates $1,100 Risk-Free Sunday Bonus


A weekend like this arouses all the feelings of sports fans. The current Caesars Sportsbook promo code available here adds an extra level of excitement to an already thrilling few days. The latest sign-up offer for new Caesars members gives them a risk-free, insured first bet up to $1,100. With seemingly endless games this weekend, bettors will no doubt find something worth a carefree attempt like the one on offer here.

Follow any link on this page and enter the Caesars Sportsbook promo code AMNYCZR for a risk-free first bet. With this unparalleled promotion, Caesars replenishes your account for up to $1,100 in lost site credit.

It doesn’t matter if you are an NBA, MLB, NHL, football fan or love watching The Masters. This weekend features the sports you crave and more, offering heavy action in each of these sports. Using the current Caesars Sportsbook promotional code, registrants wager on the event of their choice risk-free up to $1,100. It’s hard to imagine many things more exciting than a shot at that kind of risk-free money.

New registrants get a risk-free first bet up to $1,100 by clicking here and using Caesars Sportsbook promo code AMNYCZR.

A worry-free $1,100 bet is yours using the Caesars Sportsbook promo code

Caesars Sportsbook promo code AMNYCZR offers a risk-free first bet of up to $1,100 to people who sign up. This weekend is arguably the best time to take advantage, as the promotion is good for any betting market. Between the Masters, MLB, NBA, NHL and European football, most bettors have something in mind that they consider a lock.

Upon registration, new Caesars customers using this promotional code place this initial bet risk-free, knowing that it is insured up to $1,100. With sportsbook refunding all lost bets in this promotion in full with site credit, registrants can bet aggressively. Find your ideal first bet and if it somehow loses, Caesars gives you that second chance to pick a winner.

Caesars Sportsbook pays those who win that first bet immediately in cash. These earnings are immediately available for reinvestment or withdrawal, as you see fit. However, even if your first bet is a misstep, Caesars protects your money up to $1,100 in site credit.

Follow these steps to redeem Caesars Sportsbook promo code

Caesars Sportsbook ran this amazing promotion for new users, but didn’t stop there. They also made acquiring the listing offer a quick and painless process. Just follow these easy steps and a risk-free first bet up to $1100 will be yours in minutes:

  • First, click here or use a link on this page, entering the Caesars Sportsbook promo code AMNYCZR when prompted.
  • Next, register with Caesars Sportsbook as a new user. Fill in all the required data fields, such as name, address, date of birth, etc.
  • Make your first deposit into your account, keeping in mind how much you’ll need to cover your initial risk-free stake.
  • Finally, place that first bet risk-free, knowing that Caesars will refund you up to $1,100 in bonus funds if you lose.

Residents of New YorkNew Jersey, LouisianaMichigan and Illinois, to name a few, are eligible for this offer.

How do odds boosts work in your favor?

After taking advantage of this significant risk-free initial bet using Caesars Sportsbook promo code AMNYCZR, the bookmaker offers even more. Caesars constantly keeps the coffers full with deposit matches, bonus offers and daily odds increases.

Caesars Sportsbook members should check regularly for the latest benefits in their account. The Promos and Boosts tabs, as well as the banners running on the app, are great places to find these deals.

The aforementioned odds increases skew the odds in favor of the player. There are dozens available every day on the Caesars app in different games from various sports. In fact, even cross-sport odds increases are released occasionally.

After collecting Caesars huge first risk free bet, use all these bonuses to create even more advantages.

New registrants get a risk-free first bet up to $1,100 by clicking here and using Caesars Sportsbook promo code AMNYCZR.

Explaining Mitch McConnell’s distorted moral framework


[In an MSNBC appearance on April 8, 2022, Tim Miller discussed Mitch McConnell’s political-moral framework. This came in the wake of an interview in which Jonathan Swan asked the Senate majority leader where McConnell draws “moral red lines” and about the apparent contradiction between his Feb. 13, 2021 statement about Trump being responsible for the Jan. 6th insurrection and his subsequent statements saying he would support Trump if the Republican party nominates him again for president. Miller’s remarks are transcribed below.]

I want to, if you don’t mind, try to step back and try to explain Mitch McConnell and maybe look at his February 13 remarks in a little different context.

Look, throughout history, anyone in politics has to balance their values, their moral beliefs with what they believe to be politically expedient. And sometimes those things conflict, don’t they? It’s politics. Politics is not a poof, as they say. And sometimes people decide to do what is politically expedient over what they think is morally correct. No matter your party.

Look at Mitch’s predecessor, Harry Reid. When he lied on Mitt Romney’s tax returns, he wasn’t thinking about morals, he was thinking about what was politically expedient at the time. What Jonathan’s interview with Mitch revealed is that Mitch McConnell is a class difference from all those other politicians. Mitch McConnell is not at all trying to balance what moral values ​​he may or may not have with what is politically expedient.

What he believes is that whatever is politically expedient is moral. . . . What he said is actually not a contradiction because on February 13, what he thought was politically expedient for his party was to signal to swing voters, to signal to Remaining Republicans with a conscience that this party does not isn’t all thrown in with domestic terrorists, with the people responsible for the deaths on Capitol Hill.

Two weeks later, when the politics started to change, what he was doing was signaling to MAGA voters that they shouldn’t break the party, that they could stay with it – that in the end, he would do anything MAGA voters want him to do as he has for the past five years. And so for Mitch McConnell, his actions were consistent because his whole moral framework is all I need to do to advance my power and the power of my party right now is the moral thing.

And, why this interview is so important, why John’s interview is so important, is because Mitch is winning this argument right now. Throughout Republican Washington and many Republican voters, they live in this bubble where, in the post-Trump era, they no longer consider morality. They decided that owning the libraries is the most important thing, the highest and best goal.

And so by asking that question, Jonathan kind of pulled it off [McConnell] of this bubble and this moral framework in which he had to kind of reflect on this and answer a question: do I have a morality that replaces politics? And the answer was that it doesn’t matter to Mitch McConnell. You could just see it. You just see him shaking his head. He honestly couldn’t even understand Jonathan’s question. He was confused. Because for him, what is politically right is what is moral, and that was tested on January 6. He saw the dead at the Capitol and he still said, meh, I don’t care.

Voyah Dreamer launched in China as the fastest production MPV


The Voyah Dreamer, launched in production form in Wuhan last night, appears to be the fastest production minivan on sale with a 0-60 mph time of just 5.9 seconds.

The anticipation for the Dreamer has been wild since the extravagant and luxurious concept was launched in Guangzhou last year and the final production version remains close to the concept, at least on the outside.

As with most large MPVs, the front features a gigantic grille and abundant use of chrome. Plus, the two-tone paint adds a layer of class, while the Dreamer appears to sit incredibly low to the ground.

Voyah Dreamer Interior – Aft reclining captain’s chairs

Voyah dream big

Measuring 5315mm long, 1985mm wide and 1820mm high, the Dreamer is a big beast. A 3200mm wheelbase means there’s interior space for seven, with reclining captain’s chairs in the first two rows and a three-person bench in the rear.

There’s even enough space for four 24-inch suitcases with all seats up, enough for a comfortable weekend getaway.

Alternatively, you can spec your Dreamer in ultra-luxury four-seater mode which Voyah claims is similar to a mobile office.

Voyah Dreamer Dashboard
Voyah Dreamer Dashboard

Like the FREE SUV, the Dreamer retains the front tri-screen layout, heated, ventilated and massaging front row seats, air suspension and a premium DYNAudio sound system, while adding dual power sliding rear passenger doors for good measure. OEKO-TEX leatherette in the cabin keeps things vegan.

A Qualcomm 8155 chipset, 5G network capability and over-the-air updates keep the Dreamer at the forefront of the tech game. Level L2+ driving assistance, including adaptive cruise control and automatic lane centering, is added to remote parking and gesture recognition functions.

Voyah Dreamer second row
Voyah Dreamer second row captain’s chairs

The fastest minivan on sale

Under the hood, the Dreamer is available in full-battery electric and extended-range EV (EREV) forms. EV versions use two 160kW motors, one on each axle, which combine to produce 320kW and 620Nm enabling 0-60mph sprints in 5.9 seconds. This makes the Dreamer the fastest production MPV since the Mercedes-Benz AMG R63.

In EREV form, a 1.5-litre turbocharged engine recharges the battery, while twin motors with a slightly lower combined output of 290 kW and 610 Nm allow the Dreamer to accelerate from 100 km/h one second in 6.9 seconds.

The full EV claims a range of 600km with the EREV at 700km. Both versions are electronically limited to a top speed of 200 km/h and weigh 2625 kg and 2540 kg respectively.

A choice of six exterior colors will be available, including dark purple on the concept. Inside, the cabin can be specified in light brown or cream.

Prices are quoted between 380,000 and 480,000 RMB, with the specialized four-seat custom option starting at 600,000 RMB.

The Dreamer will take on upcoming premium electrified minivans from Zeekr, Denza and Hongqi.

Image credits: XCar

Voyah Dreamer Rear
Voyah Dreamer Rear

Self-proclaimed $47 billion bitcoin inventor’s prize disputed by ex-partner’s estate


A bitcoin logo is seen at the entrance to the Miami Beach Convention Center during the 2022 Bitcoin Conference in Miami Beach, Florida, U.S. April 6, 2022. REUTERS/Marco Bello

Join now for FREE unlimited access to Reuters.com


  • David Kleiman’s Estate Won $143M, But Lost More Valuable Bitcoin Holdings
  • Kleiman’s brother says inventor’s lawyers biased jury against him

(Reuters) – The estate of computer scientist David Kleiman on Friday appealed a Florida court award to Kleiman’s former business partner, self-proclaimed bitcoin creator Craig Wright, in a dispute over intellectual property rights and bitcoin holdings now worth billions of dollars.

A Miami federal jury awarded $100 million to Kleiman and Wright’s former partnership in December, finding that Wright had taken intellectual property rights related to bitcoin, such as source code that belonged to the partnership.

But the jury also rejected the estate’s claim of ownership over disputed bitcoin holdings worth billions of dollars, and it cleared Wright of the theft and fraud allegations. The jury did not award damages to Kleiman’s estate.

Join now for FREE unlimited access to Reuters.com


Kleiman’s brother, Ira, filed a lawsuit on behalf of the estate in 2018 and said at the time that bitcoin was worth more than $10 billion. Today, the 1.1 million bitcoins involved in the case are worth more than $47 billion.

Kleiman appeals a decision who rejected his bid for a new trial based on his claims that Wright’s attorneys had biased the jury against him, a March final judgment awarding the partnership a total of $143 million and “all prior orders” to the final judgment.

Kleiman had requested a new trial on the grounds that Wright’s lawyers had repeatedly told jurors the brothers were estranged, including noting that Ira had not seen David in more than three years when he died in 2013 He argued that this was an attempt to convince the jury. that he was “somehow unworthy” of a verdict in his favour.

U.S. District Judge Beth Bloom denied Kleiman’s request in February, in part because he did not dispute the statements at trial. Bloom also said she was not convinced the statements were prejudicial enough to warrant a new trial.

The bitcoin at the heart of the matter is said to have been mined by Satoshi Nakamoto, who wrote a white paper outlining the framework for what would become the cryptocurrency. Wright said he was Nakamoto, which has been disputed.

“I won the first time and I expect to win again,” Wright said in a statement Friday. His lawyer Andrés Rivero de Rivero Mestre said the trial was “eminently fair”.

Kleiman’s attorneys did not immediately respond to a request for comment.

The case is Kleiman v. Wright, US District Court for the Southern District of Florida, No. 9:18-cv-80176.

For Kleiman: Velvel Freedman and Kyle Roche of Roche Freedman, Andrew Brenner, Maxwell Pritt and Alexander Holtzman of Boies Schiller Flexner

For Wright: Andrés Rivero de Rivero Mestre

Read more:

Self-proclaimed bitcoin inventor wins big in $54 billion bitcoin lawsuit

Verdict against self-proclaimed Bitcoin inventor climbs to $143 million

Join now for FREE unlimited access to Reuters.com


Our standards: The Thomson Reuters Trust Principles.

11 myths about Vulkan | Electronic design


What you will learn:

  • What is Vulkan?
  • Details on Vulkan SC Security Critical Standard.
  • How do Vulkan and the Vulkan SC variant differ?

March 1, 2022 marked a pivotal day in the world of security systems: Khronos Group ratified the Vulkan SC API Standard. “Commercial” Vulkan has been available for some time. It is used in a wide range of graphics and compute applications to optimize the capabilities and performance of the underlying GPU architecture. It also provides a fast and efficient way, based on open standards, to evolve on various architectures.

However, the security-critical (SC) variant promises to bring those same vectors to security system developers while also providing a way to certify the software stack to meet various industry security standards, such as ISO 26262 (automotive), IEC 61508 (industrial) and DO-178C (avionics). The following aims to dispel some of the common myths surrounding the Vulkan API standard.

1. Using Vulkan SC allows a design to be certified for safety.

It is important to keep in mind that the Vulkan SC specification was designed to enable application developers to write security-critical and functional software. However, this does not mean that any implementation of Vulkan SC is automatically certifiable. The implementation of Vulkan SC should be designed according to the objectives of software security standards such as ISO 26262 or DO-178C.

Additionally, replacing your existing GPU driver in an insecure system with Vulkan SC will not automatically make your entire platform functionally secure. Other system software such as RTOS, BSP, and application software must be functionally safe, and hardware must also be designed with functional safety.

2. Vulkan requires thousands of lines of startup code before it can draw anything.

Vulkan and Vulkan SC require you to be very explicit about what resources you want from the GPU and how you want the GPU to render. This means that a lot of “starter” code is involved to set up the initial state and the graphics/compute pipeline required by an application.

Most of this code can be extracted into a custom library specific to the type of applications you are building. Alternatively, you can use third-party libraries such as LunarG’s Vulkan framework from its tutorials or AMD’s Virtual Memory Allocator (VMA) to simplify resource allocation.

Once you’ve completed your starter code, the code to render objects can be as simple as OpenGL SC. When you push your uniform state, you bind the correct resources and then make a single pull call. Overall, this allows an app to be more flexible and gives app developers the flexibility to tailor their starter code to their specific app if needed.

3. Vulkan is just a GUI API.

The Vulkan standard allows an implementation to expose only compute functionality without exposing graphics capabilities. This allows vendors to implement a compliant Vulkan driver capable of running compute shaders only.

Vulkan’s compute pipeline is quite powerful and can be used on its own for applications that have no visualization requirements. For applications that have visualization requirements, the API enables easy sharing of data between the compute and graph parts of their pipeline.

4. Vulkan Compute is not powerful enough and it is only meant to support graphics.

  • Vulkan, as a spec, is only growing, and with each new iteration, its computing capabilities increase.
  • The Khronos Vulkan Machine Learning (ML) working group continues to deliver Vulkan extensions capable of supporting compute-centric AI and ML solutions.
  • The Khronos group is exploring a security-critical version of the SYCL parallel programming API that will be compatible with Vulkan computing.
  • CoreAVI builds a robust AI/ML framework that can parallel capabilities available in well-known frameworks like TensorFlow and Caffe using Vulkan SC as a computational acceleration layer.

5. You cannot have a Vulkan compute-only implementation.

In fact, the spec says you can’t have a graphics-only implementation of Vulkan. However, you can certainly have a compute-only implementation.

6. Vulkan and Vulkan SC are quite different.

Vulkan SC is very similar to Vulkan. The bulk of the differences exist in some common function settings, where Vulkan SC introduces additional structures that define things like resource usage.

These structures allow an application to provide the Vulkan SC implementation with a clear picture of the resources the application will need at runtime. This is important because Vulkan SC disallows freeing memory grants to prevent fragmentation of memory resources. Allowing the application to specify the resources it needs ensures that the implementation will not run out of resources at runtime.

Besides memory management, the biggest difference between SC and standard Vulkan is the pipeline compilation done offline in Vulkan SC. This means that a Vulkan SC application will compile all shaders in Vulkan SC pipelines in an offline compilation process. While the runtime is running, the application can then choose to load and bind a precompiled pipeline object.

The advantage of offline compilation for SC software is that since the compiler/linker steps are not part of the runtime, this code does not need to be certified for every target system on which the Vulkan SC implementation is deployed. There is also a well-defined and deterministic way to track which shader code will run in the target device (e.g. GPU), as new/untested shader code cannot be compiled and run at the time of execution.

7. Vulkan is designed for GPU programming experts only.

One of the design goals of the Vulkan specification was to make it more accessible, so that people unfamiliar with GPU programming could read the specification and understand how to control the GPU.

Additionally, Vulkan was designed to more easily abstract the GPU with a simpler interface. Previous GPU APIs required the driver to implement complex constructs such as shader compilers. This means that drivers could easily have bugs and quirks in the way they interpret shader code, and building compilers becomes a difficult problem. With Vulkan’s streamlined approach to control, it’s easier for driver developers to squash bugs and quirks and have a consistent experience across different GPUs.

Finally, Vulkan was designed to enable functional reuse. Therefore, more novice developers can use third-party libraries or pull their own code into libraries to simplify the development process.

8. Offline pipelines in Vulkan SC are less configurable and flexible than compiling online pipelines in Vulkan.

Some offline pipeline states, such as number of render passes or shaders used, are fixed at compile time. They provide some security benefits, such as preventing shaders from loading and unverified render passes on the GPU. Other pipeline states, for example a light color, can be accessed through the dynamic state command.

Extensions such as “VK_EXT_extended_dynamic_state” give applications even more control over the offline pipeline, such as the ability to control disposal mode, viewport dimensions, scissor state, and more. This lets you control all the usual states of an offline pipeline, making them quite configurable and flexible.

Additionally, commercial Vulkan supports “dynamic build” pipelines while an application is running. However, this is a use case to be avoided, as it can be quite expensive to build pipelines while the application is running. Therefore, a well-designed Vulkan application should be able to transfer to offline pipelines with little impact.

9. Vulkan does not have wide adoption.

That’s not true – commercial Vulkan is widely adopted across the industry, from game engine developers to content creation tools. Every major GPU vendor has a Vulkan implementation for their hardware. Thus, application developers can be sure that if they use Vulkan, their application will be able to run on a wide variety of hardware.

Vulkan SC also began to be widely adopted for mission-critical and functional graphics and computing, with Intel and Arm adopting the API as the standard platform for secure graphics and computing applications. Developers of security-critical applications can be confident that the only security-critical API capable of providing graphics and computing support will be available on a variety of hardware.

10. Vulkan only works on modern high-end and powerful GPUs.

The Vulkan standard was designed to support many different hardware with disparate capabilities. Khronos themselves said the standard would be supported by GPUs that can run OpenGL ES 3.1. This standard was designed for low-end, low-power mobile GPUs that were designed eight or more years ago. In fact, Vulkan may be a better choice for less powerful and less capable GPUs because the application developer has more control over the GPU and can choose the optimal execution path for this low-end hardware.

11. Vulkan is too low a level for the average app developer.

Vulkan gives app developers the ability to access the “lower tier” of the GPU if needed, but it was also designed with a “platform approach”. This means that developers can easily create abstract layers on top of Vulkan to simplify the application development process. These can range from comprehensive frameworks, to building Vulkan applications, to small libraries to make some aspect of using Vulkan easier. As a result, developers can take a high-level approach to speed up development and then more easily switch to low-level access when they need to improve performance.

An added benefit of Vulkan’s platform-level approach is that it allows developers to implement other APIs on top of Vulkan. For example, the “DXVK” project lets you build Direct-X apps on Vulkan, and CoreAVI’s VkCoreGL SC product lets you build OpenGL SC apps on Vulkan SC.

EDPB announces transatlantic data privacy framework


On April 7, 2022, the European Data Protection Board (the “EDPB”) issued a statement on the announcement of a new Transatlantic Data Privacy Framework (the “Statement”).

A new framework for personal data transfers between the EU and the US is needed since the previous EU-US Privacy Shield framework was overturned by the Court of Justice of the Union European Union (“CJEU”) in the Schrem II judgment in July 2020. Discussions on a possible enhanced framework for the EU-US Privacy Shield have recently intensified.

In the statement, the EDPS welcomes the announcement of a political agreement in principle between the European Commission and the United States and indicates that he considers the commitment of the United States authorities to implement measures aimed at protecting the privacy and personal data of EU citizens as a positive first step in the right direction. The EDPS recalls, however, that the joint announcement by the European Commission and the United States does not yet constitute a legal framework on which one can rely to legitimize transfers between the EU and the United States. For now, businesses should continue to take the necessary steps to comply with the transfer requirements of the EU General Data Protection Regulation and the Schrem II judgement.

Once available, the EDPS will review the European Commission’s draft adequacy decision for the US in light of EU law, CJEU case law and its previous recommendations on this subject. In particular, the EDPS will verify how the reforms suggested by the US authorities ensure that the collection of personal data for national security purposes is limited to what is strictly necessary and proportionate, and that an independent redress mechanism is put in place. available to provide EU citizens with a remedy and fair trial.

Read the EDPB statement and press release.

Copyright © 2022, Hunter Andrews Kurth LLP. All rights reserved.National Law Review, Volume XII, Number 97

Dealpath Announces Integration Partnership with MRI Software


NEW YORK–(BUSINESS WIRE)–Transaction path– the most trusted and specialized real estate platform in the industry, allowing hundreds of leading institutions, including Blackstone, AEW, Oxford Properties, Nuveen, Principal Real Estate and Bridge Investment Group, to invest in the built world – announced an integration partnership with MRI software, a global leader in real estate solutions. This key partnership connects leading front-end and back-end systems to deliver simplified and effortless data integration. Ultimately, this brings Dealpath closer to achieving its core mission of serving as the command center for the pipeline through portfolio management.

“Dealpath is constantly looking to the future to further empower its customers as well as today’s broader market with accurate, real-time data integration and deep insights,” said Dealpath CEO . mike sroka. “In order to continue to display this commitment, we constantly take the pulse of the key PropTech players to partner with, with the aim of offering best-in-class technology. Our partnership with MRI will enable our users to enhance portfolio data visibility, accuracy and governance while eliminating duplicate entries.

Through this partnership, Dealpath plans to programmatically bring together active deal pipeline data with portfolio data held by the respective systems to enable a holistic view of the portfolio and better inform investment decisions. This decision also paves the way for future innovation between Dealpath, MRI and their shared CRE investment clients. For asset managers, the future integration will allow them to see their data in an actionable way through the command center. For transaction teams, the future integration will strengthen their decision-making power through access to information on the assets held.

“We are thrilled to welcome Dealpath to our partner program,” said Sean Slack, vice president of Partner Connect at MRI Software. “In today’s dynamic marketplace, CRE companies are challenged to drive data integration, streamline stakeholder collaboration, and make strategic decisions quickly. Open and connected solutions are key to achieving this, and the addition of Dealpath to the IRM ecosystem gives IRM customers even more flexibility and control over their business.

Protected by institutional-grade security, in accordance with SOC 2 Type 2, Dealpath enables investment managers to operate at scale with speed and accuracy through easy access to data and efficient internal and external collaboration across teams. , partners and suppliers. With out-of-the-box efficiency and ease of use that enables today’s cross-functional teams to seamlessly engage with centralized data that will be updated in real time from anywhere — Dealpath offers flexible configuration to meet specific team and workflow preferences.

To date, Dealpath has supported over $10 trillion in transactions worldwide. Designed from the ground up as an open platform, Dealpath easily interacts and integrates with other digital tools and systems in the modern real estate technology stack. Dealpath is built by real estate experts and backed by market leaders Blackstone, JLL, Nasdaq and 8VC.

About Dealpath:

Dealpath is the industry’s most trusted cloud-based real estate investment management platform, providing real-time access to verified, secure, and up-to-date investment data to drive collaboration, strategic, and predictive decisions. Investment and development firms use Dealpath as the command center for intelligent pipeline tracking, powerful deal analytics, and collaborative workflows, optimizing pipeline performance to portfolio management. Founded in 2014, Dealpath has backed over $10 trillion in deals with top-tier institutions around the world.

For more information visit our website at www.dealpath.com and follow us on LinkedIn.

About IRM software:

MRI Software is a leading provider of real estate software solutions that transform the way communities live, work and play. MRI’s open and connected AI-driven platform enables owners, operators and occupiers of commercial and residential real estate organizations to innovate in rapidly changing markets. MRI has been a pioneer in the PropTech industry for over five decades, serving over two million users worldwide. Through innovative solutions and a rich ecosystem of partners, MRI gives real estate companies the freedom to realize their vision of building thriving communities and stronger businesses.

For more information, visit mrisoftware.com

How GitOps Meant Fewer Application Crashes and Failures for an Online Bank


Courage of NatWest falls squarely into the category of an online banking startup. With no legacy equipment to manage, it started out one step ahead of its competitors: established banks and financial service providers with data archives on server equipment often decades old. The bank’s DevOps team was already able to reap the benefits of cloud-native infrastructure to build apps and deliver services to customers online faster, in ways that many established financial institutions struggle to achieve. today.

For a company that was fundamentally born in the cloud, one would assume that there wasn’t much room to improve the productivity of its service delivery.

And even.

Soon after it began operations and the company began to grow, so did its developer and operations team. However, instead of delivering new applications and application updates at an ever-increasing cadence, the DevOps team began to suffer from a demonstrable lag in CI/CD productivity. One of the major pain points was how developers continued to build and commit code to production at an adequate rate, but there were unacceptable and increasing delays between when the developer released code and when it was released. when the code was deployed to production.

Much of the CI-related delays were due to testing. A developer would create code and then run preliminary tests on their laptop or workstation. After the code ran as it should on the developer’s laptop or workstation, the code was then validated. Load and other performance tests were run in another environment, out of the hands of the developer.

Code validation, testing, and application deployment was largely a manual process. As manual testing was done by Mettle’s operations team, the developer’s work would stall, waiting for code to be deployed or returned to the developer for fixing, a back-and-forth process which added even more latency to CI . When applications didn’t perform as they should in production and were returned to the developer for fixing, the latency only increased for the development and deployment cycle. Round trips don’t matter too much when only a few developers are involved, but can lead to an exponential drop in productivity as more developers are added to the team to meet the demand for a higher throughput. high number of updates and application versions. .

Missing speed

It can be said that Mettle suffered largely from a speed problem. Coined by Google as DevOps Research and Evaluation (DORA), DORA’s velocity metrics show that companies that develop and deploy software more efficiently are twice as likely to achieve their business and organizational goals. These metrics cover:

  • Deployment frequency: How many deployments performed per month or per year.
  • Change deadline: How quickly applications can run successfully from the time a validation is completed through deployment.
  • Modify the failure rate: The percentage of deployments that fail and need to be rolled back.
  • Service recovery time: The meanwhile to restore (MTTR) application crash in production.

GitOps put to the test

Mettle’s answer to his CI/CD lag problem in hopes of seeing quantifiable speed improvements measured by DORA metrics was to embrace GitOps. She started relying on GitOps to standardize workflow and to deploy, configure, monitor, update, and manage applications in production.

One of the most recent developments in GitOps is how it can be used not only for applications, but also for setting up and managing Kubernetes clusters, now applicable to multiple clusters. This ability extends from how Git is the only source of truth, as the desired configuration is declared here. There is a GitOps agent running in Kubernetes, which constantly compares the actual state in Kubernetes with the desired state stored in Git. Any new changes merged into the monitored branch in Git are automatically applied to Kubernetes. Conversely, any manual changes directly applied to Kubernetes are automatically reverted to the desired state declared in Git. Configuration drift is eliminated.

With GitOps, Mettle began to see quantifiable improvements measured by DORA metrics. Testing became automated such that a commit not only started the build process, but that same commit could then be used to update the deployment manifest on Git. Although testing a single container or application can be done by the developer alone, testing that developer’s application or container in concert with the other containers and microservices provides a more realistic assessment of the how the code will run in production.

With the entire environment declared in GitOps, starting or maintaining an integration environment is simple. This environment can be “long-lived”, which means that the integration environment can be accessed 24/7 (which is also useful for distributed developer teams that are in different time zones ). An integration test environment can also be provisioned on demand if needed.

Developers can also create the integration test environment themselves, rather than entrusting this task to a dedicated Ops team. In this case, developers can act faster if they don’t have to wait for a test environment to be created for them.

With applications and containers declared with GitOps, as well as the cluster itself, integration test management is simplified and accelerated. The requirement for full integration testing can be handled directly by developers or DevOps teams, reducing the time it takes to provision the environment.

With a major software push that may include around 20 development teams, different containers from different teams are tested and validated in Git and tagged. The tag represents the version of all versions of the container while all versions of the source code.

The validated and tested code is then automatically put into production from Git. The updated code also remains independent and accessible and can be audited on Git (which reflects the same code commit in the cluster). In other words, deployments can be completed in minutes, which previously could take hours or even days. In an online cloud-native world, this productivity gain means that features are completed and made available to the end user more quickly. Measurable productivity improvements across CI/CD are achieved, for both development and operations teams.

Faster deployments and improved DORA metrics also pose no security risks. Indeed, GitOps provides an essential framework for DevSecOps, for security checks that span the entire CI/CD, as well as during the post-deployment stages of managing applications on Kubernetes clusters. With the tag, a full audit trail is available and accessible. Source code, build, deploy, and test can all be produced with the tag. As a result, Mettle was able to test, secure, and deploy code across its entire environment much, much faster – that’s where the biggest gains and productivity came from.

This whole process can be completed by Weaving GitOps Enterprisewhich became the first GitOps platform that automates continuous application delivery and automated operational control for Kubernetes at scale.

Good numbers

In total, Mettle reported substantial improvements based on all DORA metrics. Developer productivity alone improved time savings by 65%, thanks to the ability of the DevOps team to develop, build, test and deploy much faster and ultimately deliver improved services more quickly to bank customers.

This improvement in developer productivity is particularly important for cost savings given the high salaries that Kubernetes application developers typically command (the more productive a developer is, the fewer developers the organization needs to employ), which is a good news for the CTO. It’s win-win: measured in productivity, the developer does better. The CIO can easily show how developer costs are cut in half. Mettle is also not the only company seeing massive productivity frequency improvements for developer productivity, reductions in MTTR, deployment speed, and more. – thanks to GitOps.

Amid unyielding fire danger, Coloradans are on heightened awareness – CBS Denver


LOVELAND, Colorado (CBS4) – Following the historic Cameron Peak and Marshall fires in Colorado, many communities and their fire departments are becoming increasingly aware of dry, windy days. The 2020 Cameron Peak Fire, Colorado’s largest fire in recorded history, was largely fueled by dry conditions and gusty winds.

The 2021 Marshall Fire, the state’s most destructive blaze on record, was also fueled by dry terrain and hurricane-force winds.

(credit: CBS)

Loveland Fire Battalion Chief Kevin Hessler told CBS4 that many people in his community have been sensitized following the fires, as have firefighters tasked with protecting the community.

“I think these incidents have shown what they can look like, how quickly they can happen, which has raised awareness,” Hessler told CBS4’s Dillon Thomas. “On a day-to-day basis, it’s much more important to pay attention to the weather.”

Colorado’s Front Range has seen strong gusts of wind in recent days, causing power outages and overturning tractor-trailers on highways.

Hessler said he’s noticed an increase in residents calling 911 lately to report relatively minor fires, likely out of fear of a rapid spread on their properties.

“(We’re getting calls) from a planter fire that was here on 4th Street to something bigger. They make a phone call to the department.

The rapid spread of the fire on Colorado’s dry and windy days has caused several agencies to be more prepared for any potential fires.

(credit: CBS)

The Larimer County Sheriff’s Office told CBS4 following the Cameron Peak Fire that they have reallocated funds and manpower to ensure resources are on standby for any response in case of fire necessary.

Loveland Fire, on windy days, also doubles its resources for calls involving grass and wildfires. When sent to a grass or forest fire, the service automatically sends two different engines to respond instead of the single engine they would send on most other calls.

“If we can deal with (a fire) when it’s small, rather than when it’s big, the more trucks, the fewer trucks. The biggest (fire), it just requires resources from everywhere like you saw not only with the Marshall (Fire), but also with the Cameron Peak Fire,” Hessler said.

Hessler encouraged community members to pay attention to their surroundings and be sure to report any smoke or fire sightings they do.

“If you see something, say something because we’ve seen from recent fires how quickly they spread and how quickly they do their damage,” Hessler said.

EU temporary framework for state aid in response to the conflict in Ukraine and to support the banking sector


This GT Alert covers the following:

  • Legal basis and types of measures under the Temporary Framework for Ukraine
  • Previous State aid Temporary Framework cases
  • The banking sector in the Ukrainian Temporary Framework and the revision of banking rules on state aid
  • Notification of aid under the Temporary Framework for Ukraine

Following Russia’s invasion of Ukraine, the European Union (EU) adopted a wide range of sanctions against Russian and Belarusian individuals and companies, including export and import restrictions. access to financial markets. Similar measures have also been adopted by the EU’s international partners, notably the United States, the United Kingdom and Japan. While the Russian economy will suffer a substantial setback due to the sanctions, a significant slowdown in European GDP is also expected in the coming months, in particular due to the increase in energy costs and the difficulties in supplying certain raw materials, such as cereals, oilseeds and fertilizers.

In this context, the European Commission (the Commission) adopted on 23 March 2022 a communication on a temporary crisis framework for State aid measures (temporary framework for Ukraine) in order to support companies and sectors severely affected EU Member States.

I. Legal basis and types of measures in the temporary framework of Ukraine

The Commission based its proposal on Article 107(3)(b) of the Treaty on the Functioning of the European Union (TFEU), which allows the granting of aid to remedy “a serious disturbance in the economy of a Member State”. Therefore, state measures adopted under Ukraine’s Temporary Framework must be notified to the Commissionwho will assess, through an accelerated procedure, the compatibility of the aid with the specific criteria described below and with the rules of the EU Treaties. In any case, help cannot be granted to persons and entities subject to EU sanctions.

It would be complement existing instruments of EU state aid law (for example de minimis regulationBlock Exemption Regulation), as well as the possibility under Article 107(2)(b) TFEU for Member States to mitigate the damage directly caused by Russian military aggression or by the following economic sanctions.

In particular, the Temporary Framework provides several types of aid:

1. limited aid: Member States can provide up to €35,000 for companies active in the agriculture, fisheries and aquaculture sectors and up to €400,000 per company for all other sectors (thresholds are expressed in gross values). Such measures can be granted to businesses affected by the crisis in any form, including repayable advances, guarantees, loans and equity;

2. liquidity support: this could be granted either as:

(I) loan guarantees. The premiums will not be less than 25 bps – 100 bps for SMEs and 50 bps – 200 bps for large companies, gradually increasing according to the duration of the guaranteed loan. The duration of the guarantee is limited to six years and can reach a maximum of 90% of the underlying loan or 35% for first loss guarantees;

(ii) subsidized interest rates on business investment and/or working capital loans. Discounted interest rates must not be less than the base risk-free rate (one-year IBOR) plus the above-mentioned minimum premium.

In both cases, the maximum amount of loans to be guaranteed or subsidized per beneficiary is set as follows: (a) 15% of the average total annual turnover for the last three closed financial years; (b) 50% of the cost of energy over the last 12 months; or c) the total amount of cash needed for the next 12 months for SMEs and six months for large companies. Reduced interest rates and public guarantees cannot be granted for the same underlying loan, but can be cumulated for different loans (if they do not exceed the limits of the total amount of loans per beneficiary);

3. aid for additional costs due to rising energy prices: temporary aid can be granted in all its forms (direct subsidies, tax advantages, guarantees, loans, etc.) to mitigate exceptionally severe increases in the prices of natural gas and electricity. The aid cannot exceed 30% of the eligible costs for each beneficiary, up to a maximum of two million euros. Eligible costs are calculated as the difference between (a) the unit price of electricity and natural gas paid by the beneficiary (as final consumer) in a given month during the period between the 1st February and December 31, 2022, and (b) double (200%) the unit price paid by the company on average for the reference period between January 1 and December 31, 2021. Additional aid may be granted when this is necessary to ensure the continuation of the economic activity of “intensive undertakings” (as defined in Article 17(1)(a) of the Energy Tax Directive), until 25 million euros, and companies active in specific sectors, such as aluminum and metal production, fiberglass, paper pulp, fertilizers, hydrogen and other chemicals, up to 50 million euros. Aid can be granted in advance, before the eligible costs have been incurred, provided that Member States verify the relevant thresholds ex-post (within six months) and claim any excess amount.

In addition, Member States are invited to consider the introduction of environmental protection requirements for granting aid. This could be done, for example, by imposing on beneficiaries minimum thresholds for the use of renewable energy sources or investment requirements for increased energy efficiency and reduced use of natural gas, such as electrification or circular solutions using renewable energy or waste gas.

Assistance under the Temporary Framework for Ukraine has to be granted (and disbursed) before December 31, 2022, when this instrument should end. The Commission will consider at a later date whether to extend its duration.

II. Previous State aid Temporary Framework cases

This is not the first time which the Commission used exceptional state aid schemes to deal with a serious crisis. During the 2008 financial crisis. the Commission has adopted a series of communications on aid to the financial sector, as well as a communication for a temporary framework for state aid to support access to finance for companies and SMEs (temporary framework 2009).

Moreover, already on March 20, 2020, at the start of the Covid-19 pandemicthe Commission has created a State aid temporary framework for companies impacted by the economic consequences (COVID-19 Temporary Framework). The temporary COVID-19 framework, which was originally scheduled to expire on December 31, 2020, was later extended until June 30, 2022, and has proven to be a powerful tool in supporting the European economy. Indeed, between March 2020 and September 2021, the Commission adopted more than 650 clearance decisionsfor a total of more than 3 trillion euros in potential aid. Germany granted the largest amount of aid, corresponding to more than half of the total amounts approved, followed by Italy and France, both slightly less than 15% of the total aid approved.

It should be noted that under the COVID-19 Temporary Framework, aid could only be granted to companies which were not already in financial difficulty before the start of the pandemic, while no limitation concerning Beneficiary viability does not appear to be provided for the Ukrainian Temporary Framework.

The Commission points out that the aid measures adopted under the The temporary framework of Ukraine can be combined with those already approved under the COVID-19 Temporary Framework, provided the respective conditions are met. However, Member States should avoid the overlapping of different support measures for the same liquidity need of the beneficiaries.

III. The banking sector in the Ukrainian Temporary Framework and the revision of banking rules on state aid

Ukraine’s Temporary Framework focuses on credit institution acting as an intermediary for State aid measuressuch as loans and guarantees, to the final beneficiaries and clarifies that these measures cannot be aimed directly at maintaining or restoring banks’ liquidity.

On the other hand, the aid granted directly to banks and financial institutions to deal with the consequences of the Russian invasion and the resulting sanctions not be considered as “extraordinary public financial supportunder the Bank Recovery and Resolution Directive (BRRD) or Single Resolution Mechanism Regulation (SRM), which would otherwise determine the bank’s placement in resolution. In addition, recapitalizations or impaired asset measures does not lead to designation of a credit institution as a “defaulter or likely to default” or it would trigger burden-sharing procedures between shareholders and subordinated creditors.

In addition, the Commission, on 17 March 2022, launched a public consultation on state aid rules for banks in difficultyto gather feedback from various stakeholders.15 In this context, the Commission will assess whether the current state aid banking rules are still fit for purpose. The consultation will close on June 9, 2022 and the results of the Commission’s review are expected to be published in the second half of 2023.

IV. Notification of assistance under the temporary framework for Ukraine

Ukraine’s Temporary Framework applies retroactively from February 1, 2022. As was the case with the temporary COVID-19 framework, additional support measures could be added in the coming weeks or months, depending on the future evolution of the war and its economic impact in the EU.

The Commission ensured a rapid assessment of the measures granted under the Temporary Framework for Ukraine upon receipt of clear and complete notifications.

Ask a Soldier: Have a plan if the car is submerged – Austin Daily Herald


By Sergeant. Troy Christianson

Question: I saw your recent article on flooded roads. Do you have any advice on what a person should do if their vehicle is submerged in water?

To respond: The dynamics of such an incident are constantly changing, so there is no single answer that will cover everything. Having witnessed and intervened in these kinds of situations, here is what I would recommend.

Most vehicles float on the surface of water for 30-60 seconds. If your vehicle enters deep water, do everything you can to get out immediately. If possible, get out of the vehicle through the open windows before the water reaches window level.

If your vehicle is submerged, try not to panic. The vehicle doors cannot be opened until the water pressure inside the car is equal to the pressure outside. When the vehicle is completely filled, the doors can be opened, if there is no structural damage.

The weight of the engine will cause the front of the car to sink first. The rear cabin can provide an air pocket while you plan your escape strategy. If there are other people in the vehicle, determine their condition and try to get out of the vehicle together.

I would advise everyone to take swimming lessons. It’s a life skill that can save your life and someone else’s.

You can avoid a ticket — and an accident — if you just buckle up, drive at safe speeds, be careful, and always drive sober. Help us lead Minnesota to zero deaths. If you have any questions regarding Minnesota traffic laws or issues, send your questions to Sgt. Troy Christianson – Minnesota State Patrol at 2900 48th Street NW, Rochester MN 55901-5848. (Or contact him at, [email protected])